THELIB
Category Rules Rules Log in
  • Books
  • Tag: vulnerability analysis

Books — vulnerability analysis

EN
Android™ Hacker's Handbook

Android™ Hacker's Handbook

A

Joshua J. Drake, Pau Oliva Fora, Zach Lanier, Collin Mulliner, Stephen A. Ridley, Georg Wicherski

Cybersecurity
RU
Practical IoT Hacking. A Comprehensive Guide to Attacking Internet of Things Devices

Practical IoT Hacking. A Comprehensive Guide to Attacking Internet of Things Devices

A

Фотиос Чанцис, Иоаннис Стаис, Паулино Кальдерон, Евангелос Деирменцоглу, Бо Вудс

Cybersecurity
RU
Hacking on Linux

Hacking on Linux

A

Колисниченко Д. Н.

Cybersecurity
RU
Networks Through the Hacker's Eyes

Networks Through the Hacker's Eyes

B

Магама Базаров

Cybersecurity
RU
Hacking. Techniques, Tricks, and Secrets of Hackers

Hacking. Techniques, Tricks, and Secrets of Hackers

B

Иван Мисаров, Герман Наместников

Cybersecurity
RU
Oracle Security Through an Auditor's Eyes: Attack and Defense

Oracle Security Through an Auditor's Eyes: Attack and Defense

A

А. М. Поляков

Databases
EN
Gray Hat Hacking: The Ethical Hacker’s Handbook, Sixth Edition

Gray Hat Hacking: The Ethical Hacker’s Handbook, Sixth Edition

A

Dr. Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Daniel Fernandez, Huáscar Tejeda, Moses Frost

Cybersecurity
RU
Fundamentals of Web Hacking. How to Make Money with Ethical Hacking. Analysis of Over 30 Paid Reports!

Fundamentals of Web Hacking. How to Make Money with Ethical Hacking. Analysis of Over 30 Paid Reports!

A

Питер Яворски, перевод: Евгений Бурмакин

Cybersecurity
RU
Black Hat Python: Programming for Hackers and Pentesters

Black Hat Python: Programming for Hackers and Pentesters

A

Джастин Зейтц, Тим Арнольд

Cybersecurity
THELIB

IT book library with translation into 8 languages.

Catalog

  • Books
  • Categories
  • Rules
  • Agreement

Account

  • Register
  • Log in
  • Support

Info

  • thelib.cc
  • v0.1
© 2026 THELIB 8 languages · AI translation on the fly