Games
Apps
Books
Kids
google_logo Play
  • Sign in with Google
  • play_appsLibrary & devices
  • paymentPayments & subscriptions
  • reviewsMy Play activity
  • redeemOffers
  • Play Pass
  • Personalization in Play
  • settingsSettings
  • Privacy Policy • Terms of Service
Games
Apps
Books
Kids
Similar ebooks
Icon image The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
€52.99
Icon image Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks
€33.99
Icon image Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
€46.99
Icon image Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
€34.48
Icon image Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
€9.49
Icon image Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
€27.77
Icon image Kali Linux 2: Windows Penetration Testing
Kali Linux 2: Windows Penetration Testing
€35.96€25.17
Icon image The Shellcoder's Handbook: Discovering and Exploiting Security Holes, Edition 2
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, Edition 2
€35.99
Icon image Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
€10.55
Icon image User Story Mapping: Discover the Whole Story, Build the Right Product
User Story Mapping: Discover the Whole Story, Build the Right Product
€29.43
Icon image Black Hat Go: Go Programming For Hackers and Pentesters
Black Hat Go: Go Programming For Hackers and Pentesters
€30.65
Icon image Just Enough Software Architecture: A Risk-Driven Approach
Just Enough Software Architecture: A Risk-Driven Approach
€10.08
Icon image Cyber Security
Cyber Security
€20.71
Icon image Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
€42.99
Icon image Crafting Interpreters
Crafting Interpreters
€40.30
Icon image 🔒Hacking: The Core of Hacking: An Easy Guide to Open Secret Knowledge of Hacker🔓
🔒Hacking: The Core of Hacking: An Easy Guide to Open Secret Knowledge of Hacker🔓
€22.21
Icon image Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
€30.99
Icon image An Introduction to Cyber Security: A Beginner’s Guide
An Introduction to Cyber Security: A Beginner’s Guide
Book 2
€0
Icon image Building Large Scale Web Apps: A React field guide
Building Large Scale Web Apps: A React field guide
€25.21
Icon image Learning Patterns: Patterns for building powerful web apps with vanilla JavaScript and React
Learning Patterns: Patterns for building powerful web apps with vanilla JavaScript and React
€0
Google Play

Play Pass

Play Points

Gift cards

Redeem

Refund policy

Kids & family

Parent Guide

Family sharing

Terms of Service

Privacy

About Google Play

Developers

Google Store

All prices include VAT.