Gestión de incidentes de seguridad informática
Gómez Vieites, Álvaro(Author)
La era del capitalismo de la vigilancia: La lucha por un futuro ...
Shoshana Zuboff
Introduction to Containers, Kubernetes, and Red Hat OpenShift ...
Zach Gutterman, Dan Kolepp, Eduardo Ramirez Ronco, Jordi Sola ... & Connie Petlitzer
Cybersecurity - Attack and Defense Strategies
Yuri Diogenes, Erdal Ozkaya
Proletkult
Wu Ming
Sams Teach Yourself JavaScript in 21 Days
Andrew Watt & Jonathan Watt & Jinjer L. Simon & Jim O'Donnell
Podman in Action
Daniel Walsh
Securing Network Infrastructure and Switched Networks
Richard Wagner
The Browser Hacker's Handbook
Wade Alcorn, Christian Frichot, Michele Orru
Red Hat Services Management and Automation - Student Workbook
Victor Costea, George Hacker, Herve Quatremain, Dallas Spohn & Steven Bonneville
¿Y los pobres sufren lo que deben?
Yanis Varoufakis
Plus Ultra.
Alberto Varela
Pyongyang
Hernán Vanoli
Linux Hardening in Hostile Networks: Server Security from TLS ...
Unknown
Red Hat Enterprise Linux Automation with Ansible - Student Workbook
Trey Feagle, Hervé Quatremain, Dallas Spohn, Adolfo Vazquez, ... & David O'Brien
Red Hat System Administration III: Linux Automation - Student ...
Trey Feagle, Herve Quatremain, Dallas Spohn, Adolfo Vazquez, ... & Nicole Muller
¡Viva el socialismo!
Thomas Piketty
Vida 3.0: Ser humano en la era de la Inteligencia Artificial
Max Tegmark
Caída libre
Joseph E. Stiglitz
Capitalismo progresista: La respuesta a la era del malestar
Colectivizaciones, la obra constructiva de la revolución española
Agustin Souchy
Metasploit Penetration Testing Cookbook
Abhinav Singh
Ansible Playbook Essentials
Gourav Shah
Ética para máquinas
José Ignacio Latorre Sentís
Black Hat Python
Justin Seitz
The use of playbooks in the incident response process
Andreas Seiler
Pro Git
Scott Chacon, Ben Straub
OSCP Notes Active Directory
Jose Antonio Dos Santos
Practical Packet Analysis, 3E
Chris Sanders
Red Hat RHCSA 8 Cert Guide: EX200, 2nd edition
Sander van Vugt
OpenCTI
HASSINE Samuel
Web application Pentesting Methodology
Francisco Caballero S21sec
Learning eBPF
Liz Rice
CISO MindMap 2022
Rafeeq Rehman
CIVILIZACION HACKER
Alberto Quian
OWASP Top 10
Secure Coding Best Practices
Horizontes
James Poskett
Practical Statistics for Data Scientists
Peter Bruce, Andrew Bruce & Peter Gedeck
Steganography in Commonly Used HF Radio Protocols
Paul Drapeau, Brent Dukes
Nmap 6: Network Exploration and Security Auditing Cookbook
Paulino Calderon Pale
Armas de destrucción matemática: Cómo el Big Data aumenta la ...
Cathy O'Neil
Graph Algorithms
Mark Needham & Amy E. Hodler
Web Penetration Testing With Kali Linux - Third Edition: Explore ...
Gilberto Najera-Gutierrez & Juned Ahmed Ansari
Las flechas del tiempo
Richard Morris
Python Penetration Testing Essentials: Techniques for Ethical ...
Mohit
La muerte de la verdad
Michiko Kakutani
Hands-on DevOps with Linux
Alisson Machado de Menezes
Handbook of Applied Cryptography
Alfred J. Menezes & Paul C. van Oorschot & Scott A. Vanstone
Penetration Testing with Raspberry Pi - Second Edition
McPhee, Michael & Beltrame, Jason
Mastering Docker: Master This Widely Used Containerization Tool
Russ McKendrick
Learning Python
Mark Lutz
Agile Methodologies In-Depth
Sudipta Malakar
Penetration Testing With the Bash Shell
Keith Makan
Liquidación (Spanish Edition)
Ling Ma
Python Pocket Reference
The Little Black Book of Computer Viruses
Mark A. Ludwig
Sniffing & Password Cracking
Luca
Secure the Border and Build the Wall
Patrick Louis
Estrellas rotas
Ken Liu & Xia Jia & Cixin Liu & Tang Fei & Han Song & Chen Jingbo & Baoshu & Hao Jingfang & Fei Dao & Zhang Ran & Anna Wu & Ma Boyong & Gu Shi & Regina Kanyu Wang & Chen Qiufan
Contemporary Chinese Science Fiction in Translation (2)
El zoo de papel y otros relatos
Ken Liu
El bosque oscuro (Trilogía de los Tres Cuerpos 2)
Cixin Liu
Trilogía de los Tres Cuerpos (2)