Gestión de incidentes de seguridad informática
Gómez Vieites, Álvaro(Author)
Red Hat RHCSA 8 Cert Guide: EX200, 2nd edition
Sander van Vugt
Red Hat Enterprise Linux Automation with Ansible - Student Workbook
Trey Feagle, Hervé Quatremain, Dallas Spohn, Adolfo Vazquez, ... & David O'Brien
Red Hat Enterprise Linux 9 Managing networking infrastructure ...
Desconocido
Realismo capitalista. ¿No hay alternativa?
Mark Fisher (k-punk)
R Notes for Professionals
GoalKicker.com
La quinta columna digital
Andoni Alonso & Iñaki Arzoz
Python Pocket Reference
Mark Lutz
Python Penetration Testing Essentials: Techniques for Ethical ...
Mohit
Python for Offensive PenTest: A practical guide to ethical hacking ...
Hussam Khrais
Python Challenge
Pyongyang
Hernán Vanoli
Psicopolítica
Byung-Chul Han
Proletkult
Wu Ming
El problema de los tres cuerpos
Liu Cixin
Trilogía de los Tres Cuerpos (1)
Pro Git
Scott Chacon, Ben Straub
Los premios Hugo 1973-1975
Varios Autores
Gran Super Ficción (14)
Pragmatic AI: An Introduction to Cloud-Based Machine Learning
Noah Gift
Practical Statistics for Data Scientists
Peter Bruce, Andrew Bruce & Peter Gedeck
Practical Packet Analysis, 3E
Chris Sanders
Podman in Action
Daniel Walsh
Planetas Invisibles
Phishing Windows Credentials
Pentesting Cheat Sheet
Pentest Best Practices Checklist
Pensar rápido, pensar despacio
Daniel Kahneman
Penetration Testing With the Bash Shell
Keith Makan
Penetration Testing with Raspberry Pi - Second Edition
McPhee, Michael & Beltrame, Jason
Penetration Testing Guide
Payload Processing
Password Cracking
Password
Martin Paul Eve
Pagar (Con la misma moneda)
Margaret Atwood
OWASP Top 10 API Security Risks
OWASP Top 10
Secure Coding Best Practices
OSINT landscape 2022
OSCP Notes Active Directory
Jose Antonio Dos Santos
OpenShift All Versions User Guide
OpenCTI
HASSINE Samuel
La nueva piel del capitalismo
Xosé Carlos Arias & Antón Costas
Nmap Scan with Timing Parameters
Nmap 6: Network Exploration and Security Auditing Cookbook
Paulino Calderon Pale
NGINX Cookbook
Derek DeJonghe
Network Segmentation Users on Multiuser Servers Networks
Ryan Cox
Network Security Model
Josh Backfield
Network Security Best Practices
Network Pentest Training
Network forensics analysis using Wireshark
Jaikumar
Network Automation Cookbook
Karim Okasha
Nessus for pentest
La muerte de la verdad
Michiko Kakutani
MongoDB Cheat Sheet
Modernidad líquida
Zygmunt Bauman
Metasploit Penetration Testing Cookbook
Abhinav Singh
Memory Forensics Volatility
Mastering Docker: Master This Widely Used Containerization Tool
Russ McKendrick
Malware Analysis By ChatGPT
Machine Learning Design Patterns
Valliappa Lakshmanan
Liquidación (Spanish Edition)
Ling Ma
Linux Notes for Professionals
Linux Networking