Python for Offensive PenTest: A practical guide to ethical hacking ...
Hussam Khrais
La era de la supernova
Cixin Liu
La era del capitalismo de la vigilancia: La lucha por un futuro ...
Shoshana Zuboff
La esfera luminosa
Estrellas rotas
Ken Liu & Xia Jia & Cixin Liu & Tang Fei & Han Song & Chen Jingbo & Baoshu & Hao Jingfang & Fei Dao & Zhang Ran & Anna Wu & Ma Boyong & Gu Shi & Regina Kanyu Wang & Chen Qiufan
Contemporary Chinese Science Fiction in Translation (2)
Eugénesis: I Antología Ciencia Ficción Cruce De Caminos
Carter Damon & Alicia Del Rosario & Mar Rojo & Jordi Rocandio Clua & Luis Mazzarello & Tony Jim & José Vicente Mañas Montalbo
Exhalación
Ted Chiang
Exploiting Active Directory With Linux
Desconocido
El fin de la muerte
Liu Cixin
Trilogía de los Tres Cuerpos (3)
El fin del Primer Mundo
David Lizoain Bennett
El fin del «Homo sovieticus»
Svetlana Aleksievich
Las flechas del tiempo
Richard Morris
Fully Automated Luxury Communism
Aaron Bastani;
Generative Deep Learning
David Foster
Gestión de incidentes de seguridad informática
Gómez Vieites, Álvaro(Author)
Git Notes for Professionals
GoalKicker.com
Graph Algorithms
Mark Needham & Amy E. Hodler
Guía del autoestopista galáctico: edición definitiva
Douglas Adams
Guía del autoestopista galáctico (1)
Hacker Guide to Python
Hacking Point of Sale: Payment Application Secrets, Threats, ...
Slava Gomzin
Handbook of Applied Cryptography
Alfred J. Menezes & Paul C. van Oorschot & Scott A. Vanstone
Hands-on DevOps with Linux
Alisson Machado de Menezes
Head First JavaScript Programming
Eric Freeman & Elisabeth Robson
Head First Series (1)
La historia de tu vida
Horizontes
James Poskett
How We Learn
Stanislas Dehaene
Incident Response Reference Guide
Incidents Response Playbook
Instructor Notes
Introduction to Containers, Kubernetes, and Red Hat OpenShift ...
Zach Gutterman, Dan Kolepp, Eduardo Ramirez Ronco, Jordi Sola ... & Connie Petlitzer
IOT Cybersecurity framework
Javascript: The Definitive Guide: The Definitive Guide
David Flanagan
Kernel Exploit
Kubernetes For Everyone
Kubernetes Native Microservices with Quarkus and MicroProfile
John Clingan & Ken Finnigan
Learn OpenShift
Denis Zuev
Learning eBPF
Liz Rice
Learning Python
Mark Lutz
Linux Hardening in Hostile Networks: Server Security from TLS ...
Unknown
Linux IP Masquerade HOWTO
Linux Networking
Linux Notes for Professionals
Liquidación (Spanish Edition)
Ling Ma
Machine Learning Design Patterns
Valliappa Lakshmanan
Malware Analysis By ChatGPT
Mastering Docker: Master This Widely Used Containerization Tool
Russ McKendrick
Memory Forensics Volatility
Metasploit Penetration Testing Cookbook
Abhinav Singh
Modernidad líquida
Zygmunt Bauman
MongoDB Cheat Sheet
La muerte de la verdad
Michiko Kakutani
Nessus for pentest
Network Automation Cookbook
Karim Okasha
Network forensics analysis using Wireshark
Jaikumar
Network Pentest Training
Network Security Best Practices
Network Security Model
Josh Backfield
Network Segmentation Users on Multiuser Servers Networks
Ryan Cox
NGINX Cookbook
Derek DeJonghe
Nmap 6: Network Exploration and Security Auditing Cookbook
Paulino Calderon Pale
Nmap Scan with Timing Parameters