Cybersecurity Ops With Bash: Attack, Defend, and Analyze From ...
Paul Troncone & Carl Albing Ph. D.
Harry Potter and the Half-Blood Prince
J. K. Rowling
Harry Potter (6)
Kubernetes Patterns
Bilgin Ibryam & Roland Huß
Pani Jeziora
Andrzej Sapkowski
Wiedźmin Geralt z Rivii (7)
Steve Jobs
Walter Isaacson