Deep Learning (Adaptive Computation and Machine Learning series)
CEH Certified Ethical Hacker Practice Exams
CEH Certified Ethical Hacker Bundle
Algorithms to Live by: The Computer Science of Human Decisions
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
How Linux Works, 3rd Edition: What Every Superuser Should Know
Cybersecurity Blue Team Toolkit (English Edition)
The Elements of Computing Systems, second edition: Building a Modern Computer from First Principles
The PARA Method: Simplify, Organise and Master Your Digital Life
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Quantum Computing for Everyone (Mit Press)
Getting Started with FPGAs
Pegasus: The Secret Technology that Threatens the End of Privacy and Democracy
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
The Android Malware Handbook: Detection and Analysis by Human and Machine
Job (Job, 3)
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
Cyber Security: Threats and Responses for Government and Business (Praeger Security International)
Hacker Culture a to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking
Metasploit, 2nd Edition
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity
Smart Government: Practical Uses for Artificial Intelligence in Local Government
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
Weekagenda 2024: Nederlandse agenda - 1 week op 2 pagina's - klein formaat A5 - zwart - horizontale weergave
Targeted: The Cambridge Analytica Whistleblower's Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again (English Edition)
Perceptrons, Reissue of the 1988 Expanded Edition with a new foreword by Léon Bottou: An Introduction to Computational Geometry (Mit Press)
Hacking Growth: How Today's Fastest-Growing Companies Drive Breakout Success (English Edition)
Making Sense of Cybersecurity
Reconnaissance for Ethical Hackers: Focus on the starting point of data breaches and explore essential steps for successful pentesting (English Edition)
Permanent Record: A Memoir of a Reluctant Whistleblower (English Edition)
Designing Secure Software: A Guide for Developers
Artificial Intelligence – The Practical Legal Issues (Third Edition)
Algorithms To Live By
The Art of Deception: Controlling the Human Element of Security (English Edition)
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (English Edition)
CEH Certified Ethical Hacker Practice Exams, Fourth Edition (English Edition)
Foundations of Machine Learning, second edition (Adaptive Computation and Machine Learning series)
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Black Hat GraphQL: Attacking Next Generation APIs
The Ultimate Kali Linux Book: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire, 2nd Edition
Real-World Bug Hunting: A Field Guide to Web Hacking (English Edition)
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century!
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (English Edition)
Machine Learning: A Probabilistic Perspective (Adaptive Computation and Machine Learning series)
Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities
James Bond's Aston Martin DB5
Designing Interactions (Mit Press)
Open Sources: Voices from the Open Source Revolution
Computing: A Concise History (The MIT Press Essential Knowledge Series)
This Is How They Tell Me the World Ends: Winner of the FT & McKinsey Business Book of the Year Award 2021
Rust for the IoT: Building Internet of Things Apps with Rust and Raspberry Pi
Hacking APIs: Breaking Web Application Programming Interfaces
Russian Information Warfare: Assault on Democracies in the Cyber Wild West
The Godzilla Art of Kaida Yuji
Programming with 64-Bit ARM Assembly Language: Single Board Computer Development for Raspberry Pi and Mobile Devices
RP2040 Assembly Language Programming: ARM Cortex-M0+ on the Raspberry Pi Pico
Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (English Edition)
Hackers & Painters: Big Ideas from the Computer Age
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
This Is How They Tell Me the World Ends: A True Story
Sexual Violence in a Digital Age (Palgrave Studies in Cybercrime and Cybersecurity)
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (English Edition)
Computer Hacking: 2 Books in 1: Hacking Tools for Computers with Linux Mint, Linux for Beginners and Kali Linux Tools and Hacking with Kali Linux with Basic Security Testing (English Edition)
Types and Programming Languages (The MIT Press)
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (English Edition)
Social Engineering: The Science of Human Hacking (English Edition)
Weber Carburetors: Select, Install & Tune Weber Sidedraft & Downdraft Carburetors for Performance or Economy
Deep Learning (Adaptive Computation and Machine Learning series)
CEH Certified Ethical Hacker Practice Exams
CEH Certified Ethical Hacker Bundle
Algorithms to Live by: The Computer Science of Human Decisions
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters
How Linux Works, 3rd Edition: What Every Superuser Should Know
Cybersecurity Blue Team Toolkit (English Edition)
The Elements of Computing Systems, second edition: Building a Modern Computer from First Principles
The PARA Method: Simplify, Organise and Master Your Digital Life
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Quantum Computing for Everyone (Mit Press)
Getting Started with FPGAs
Pegasus: The Secret Technology that Threatens the End of Privacy and Democracy
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
The Android Malware Handbook: Detection and Analysis by Human and Machine
Job (Job, 3)
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
Cyber Security: Threats and Responses for Government and Business (Praeger Security International)
Hacker Culture a to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking
Metasploit, 2nd Edition
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity
Smart Government: Practical Uses for Artificial Intelligence in Local Government
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
Weekagenda 2024: Nederlandse agenda - 1 week op 2 pagina's - klein formaat A5 - zwart - horizontale weergave
Targeted: The Cambridge Analytica Whistleblower's Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again (English Edition)
Perceptrons, Reissue of the 1988 Expanded Edition with a new foreword by Léon Bottou: An Introduction to Computational Geometry (Mit Press)
Hacking Growth: How Today's Fastest-Growing Companies Drive Breakout Success (English Edition)
Making Sense of Cybersecurity
Reconnaissance for Ethical Hackers: Focus on the starting point of data breaches and explore essential steps for successful pentesting (English Edition)
Permanent Record: A Memoir of a Reluctant Whistleblower (English Edition)
Designing Secure Software: A Guide for Developers
Artificial Intelligence – The Practical Legal Issues (Third Edition)
Algorithms To Live By
The Art of Deception: Controlling the Human Element of Security (English Edition)
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (English Edition)
CEH Certified Ethical Hacker Practice Exams, Fourth Edition (English Edition)
Foundations of Machine Learning, second edition (Adaptive Computation and Machine Learning series)
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Black Hat GraphQL: Attacking Next Generation APIs
The Ultimate Kali Linux Book: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire, 2nd Edition
Real-World Bug Hunting: A Field Guide to Web Hacking (English Edition)
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century!
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (English Edition)
Machine Learning: A Probabilistic Perspective (Adaptive Computation and Machine Learning series)
Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities
James Bond's Aston Martin DB5
Designing Interactions (Mit Press)
Open Sources: Voices from the Open Source Revolution
Computing: A Concise History (The MIT Press Essential Knowledge Series)
This Is How They Tell Me the World Ends: Winner of the FT & McKinsey Business Book of the Year Award 2021
Rust for the IoT: Building Internet of Things Apps with Rust and Raspberry Pi
Hacking APIs: Breaking Web Application Programming Interfaces
Russian Information Warfare: Assault on Democracies in the Cyber Wild West
The Godzilla Art of Kaida Yuji
Programming with 64-Bit ARM Assembly Language: Single Board Computer Development for Raspberry Pi and Mobile Devices
RP2040 Assembly Language Programming: ARM Cortex-M0+ on the Raspberry Pi Pico
Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (English Edition)
Hackers & Painters: Big Ideas from the Computer Age
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
This Is How They Tell Me the World Ends: A True Story
Sexual Violence in a Digital Age (Palgrave Studies in Cybercrime and Cybersecurity)
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (English Edition)
Computer Hacking: 2 Books in 1: Hacking Tools for Computers with Linux Mint, Linux for Beginners and Kali Linux Tools and Hacking with Kali Linux with Basic Security Testing (English Edition)
Types and Programming Languages (The MIT Press)
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (English Edition)
Social Engineering: The Science of Human Hacking (English Edition)
Weber Carburetors: Select, Install & Tune Weber Sidedraft & Downdraft Carburetors for Performance or Economy