Games
Apps
Books
Children
google_logo Play
  • Sign in with Google
  • play_appsLibrary & devices
  • paymentPayments & subscriptions
  • reviewsMy Play activity
  • redeemOffers
  • Play Pass
  • Personalization in Play
  • settingsSettings
  • Privacy Policy • Terms of Service
Games
Apps
Books
Children
Similar ebooks
Icon image Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
€40.32€28.22
Icon image Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
€11.99
Icon image CUCKOO'S EGG
CUCKOO'S EGG
€14.82
Icon image Ransomware and Cyber Extortion: Response and Prevention
Ransomware and Cyber Extortion: Response and Prevention
€38.14€26.70
Icon image Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
€24.01
Icon image We Are Anonymous
We Are Anonymous
€14.99
Icon image Penetration Testing with Raspberry Pi
Penetration Testing with Raspberry Pi
€21.79€15.25
Icon image Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect, and avoid malware
€28.33€19.83
Icon image Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
€34.57
Icon image Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
€42.99
Icon image Mastering Metasploit
Mastering Metasploit
€35.96€25.17
Icon image Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, Edition 2
Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principles, Edition 2
€41.41€28.99
Icon image Network Analysis using Wireshark Cookbook
Network Analysis using Wireshark Cookbook
€35.96€25.17
Icon image Wireshark Essentials
Wireshark Essentials
€18.52€12.96
Icon image Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking
€34.57
Icon image Kali Linux 2: Windows Penetration Testing
Kali Linux 2: Windows Penetration Testing
€35.96€25.17
Icon image Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing
€40.32€28.22
Icon image Kali Linux Cookbook
Kali Linux Cookbook
€30.51€21.36
Icon image Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux
Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux
€29.42€20.59
Icon image Mastering Veeam Backup & Replication: Design and deploy a secure and resilient Veeam 12 platform using best practices, Edition 3
Mastering Veeam Backup & Replication: Design and deploy a secure and resilient Veeam 12 platform using best practices, Edition 3
€32.69€22.88
Google Play

Play Pass

Play Points

Gift cards

Redeem

Refund policy

Children and family

Parent guide

Family sharing

Terms of Service

Privacy

About Google Play

Developers

Google Store

All prices include VAT.