dm_e95dda4fd8c564dbee9ba810b72c8569
@raycen.dejon
[NEWS] Ceh V9: Certified Ethical Hacker Version 9 Study Guide by Sean-Philip
4 years ago
[RECOMMENDATION] This Machine Kills Secrets: How WikiLeakers, Cypherpunks,
4 years ago
[RECOMMENDATION] Violent Python: A Cookbook for Hackers, Forensic Analysts,
4 years ago
[NEWS] The Robert Collier Letter Book by Robert Collier Free Acces
4 years ago
[RECOMMENDATION] Principles of Information Security by Michael E. Whitman
4 years ago
[NEWS] The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the
4 years ago
[BEST BOOKS] Listening In: Cybersecurity in an Insecure Age by Susan Landau
4 years ago
[BEST BOOKS] Dataclysm: Who We Are (When We Think No One's Looking) by
4 years ago
[BEST BOOKS] Webbots, Spiders, and Screen Scrapers: A Guide to Developing
4 years ago
[RECOMMENDATION] CREATE Blog and Editorial Planner by Meera Kothand Full
4 years ago