![book Sudo Mastery: User Access Control for Real People](/covers/files_170/2717000/bc8d9f9a78b514a5ef868a906fe23700-g.jpg)
- Author: Lucas Michael Warren
- Language: English
- Year: 2013
![book Simple steps to data encryption: a practical guide to secure computing](/covers/files_170/2716000/235cd68839d395180ee14b30f7e8d798-g.jpg)
- Author: Loshin Peter
- Language: English
- Year: 2013
![book Location Privacy Protection in Mobile Networks](/covers/files_170/2715000/7143224525ba073187ae8345122772e8-g.jpg)
- Author: Li Xiaolin, Liu Xinxin
- Language: English
- Year: 2013
![book A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security](/covers/files_170/2703000/05c279523505e5edc4b9095bc080d704-g.jpg)
- Author: Will Arthur, David Challener, With Kenneth Goldman
- Language: English
- Year: 2015
![book A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security](/covers/files_170/2703000/603eb676f9e42a17c43cbcbd3823d4c4-g.jpg)
- Author: Will Arthur, David Challener, With Kenneth Goldman
- Language: English
- Year: 2015
![book From Hacking to Report Writing: an Introduction to Security and Penetration Testing](/covers/files_170/2703000/cd1a8863fc44bde6308e66f22d3bc834-g.jpg)
- Author: Svensson Robert
- Language: English
- Year: 2016
![book Beginning Ethical Hacking with Python](/covers/files_170/2703000/95f95eddbb9666e72ad540d39936a570-g.jpg)
- Author: Sinha Sanjib
- Language: English
- Year: 2017