![book Advanced Penetration Testing for Highly-Secured Environments](/covers/files_170/2162000/b460e95766351037c4f88243154f29f6-d.jpg)
- Author: Lee Allen Kevin Cardwell
- Language: English
- Year: 2016
![book Practical Linux Security Cookbook](/covers/files_170/2162000/f575866bfed57193e8133b957b26506d-d.jpg)
- Author: Tajinder Kalsi
- Language: English
- Year: 2016
![book Mastering Mobile Forensics](/covers/files_170/2162000/f810e8025fbc08908e0578d983392303-d.jpg)
- Author: Soufiane Tahiri
- Language: English
- Year: 2016
![book Practical Digital Forensics](/covers/files_170/2162000/caeee497b5d2b66653386aa8f73fb687-d.jpg)
- Author: Richard Boddington
- Language: English
- Year: 2016
![book Hardware IP Security and Trust](/covers/files_170/2162000/62148dc9dbc089a84b9f962de2a2265c-d.jpg)
- Author: Prabhat Mishra Swarup Bhunia Mark Tehranipoor
- Language: English
- Year: 2017
![book Cyberspace and Cybersecurity](/covers/files_170/2162000/fae8e2ed73ae123d8b31c7f3a40b3852-d.jpg)
- Author: George Kostopoulos
- Language: English
- Year: 2012
![book Agile Application Security: Enabling Security in a Continuous Delivery Pipeline](/covers/files_170/2147000/b4a62415b5265a49aefef03241dd1de4-d.jpg)
- Author: Laura Bell Michael Brunton-Spall Rich Smith Jim Bird
- Language: English
- Year: 2017
![book Kali Linux - An Ethical Hacker’s Cookbook](/covers/files_170/2146000/7f6d5a44fb1e50e1f70aa8207514d628-d.jpg)
- Author: Himanshu Sharma
- Language: English
- Year: 2017