Metasploit penetration testing.pdf
18.7 MB
Metasploit Penetration Testing Cookbook
Daniel Teixeira, 2018
Daniel Teixeira, 2018
The Blender Python API (en).pdf
3.9 MB
The Blender Python API
Chris Conlan, 2017
Chris Conlan, 2017
❤4👍3
Computer Networking: A Top-Down Approach.pdf
21.2 MB
Computer Networking: A Top-Down Approach 6th edition, James F. Kurose & Keith W. Ross
This is a very classic book about computer networking. And it is selected by many top-tier universities as their textbooks. Hope that this book can help y'all.
This is a very classic book about computer networking. And it is selected by many top-tier universities as their textbooks. Hope that this book can help y'all.
❤5🔥5👍2
sparc-flow-how-to-hack-like-a-legend.pdf
5.7 MB
How to Hack Like a Legend
Sparc Flow, 2022
Sparc Flow, 2022
switching-and-finite-automata-theory-third-edition-3rd.pdf
3.1 MB
Switching and Finite Automata Theory
Zvi Kohavi, 2010
Zvi Kohavi, 2010
❤3👍1🔥1
Mastering_Linux_Device_Driver_Development_Write.pdf
3.5 MB
Mastering Linux Device Driver Development
John Madieu, 2021
John Madieu, 2021
❤2👍1
Red Hat Enterprise Linux 9 Administration - Pablo Gomez P.pdf
24.6 MB
Red Hat Enterprise Linux 9 Administration
Pablo Iranzo Gómez, 2022
Pablo Iranzo Gómez, 2022
❤1👍1
Certified_Ethical_Hacker_CEH_Preparation_Guide.pdf
7.7 MB
Certified Ethical Hacker (CEH) Preparation Guide
Ahmed Sheikh, 2021
Ahmed Sheikh, 2021
👍7❤3
👍8❤2