Games
Apps
Movies
Books
Kids
google_logo Play
Games
Apps
Movies
Books
Kids
none
search
help_outline
Sign in with Google
play_apps
Library & devices
payment
Payments & subscriptions
reviews
My Play activity
redeem
Offers
Play Pass
Personalization in Play
settings
Settings
Privacy Policy
ā¢
Terms of Service
Games
Apps
Movies
Books
Kids
Similar ebooks
Zero Trust Security: Building Cyber Resilience & Robust Security Postures
ā¬7.99
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
ā¬11.99
Cloud Security & Forensics Handbook: Dive Deep Into Azure, AWS, And GCP
ā¬7.99
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
ā¬17.37
OSINT 101 Handbook: Expert-Level Intelligence Gathering: Advanced Reconnaissance, Threat Assessment, And Counterintelligence
ā¬7.99
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
ā¬13.89
Gray Hat: Vulnerability Scanning & Penetration Testing
ā¬7.99
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
ā¬26.27
Wireless Security Masterclass: Penetration Testing For Network Defenders And Ethical Hackers
ā¬7.99
Hacking: The Core of Hacking: An Easy Guide to Open Secret Knowledge of Hacker
ā¬23.17
Bug Hunting 101: Novice To Virtuoso: Web Application Security For Ethical Hackers
ā¬7.99
Penetration Testing with Raspberry Pi
ā¬21.79
ā¬15.25
Cyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers
ā¬7.99
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
ā¬45.19
NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library
ā¬7.99
CUCKOO'S EGG
ā¬16.22
Blue Team Operations: Defense: Operatonal Security, Incident Response & Digital Forensics
ā¬7.99
Latest Microsoft Azure Administrator AZ-104 Exam Questions and Answers
ā¬10.52
Cryptography And Computer Science: Design Manual For Algorithms, Codes And Ciphers
ā¬7.99
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
ā¬28.33
ā¬19.83