کتاب های Andress

Coding for Penetration Testers: Building Better Tools
Jason Andress, Ryan Linn, 2011
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Thomas Wilhelm, Jason Andress, 2010
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Thomas Wilhelm, Jason Andress, 2010
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Thomas Wilhelm, Jason Andress, 2010
Cyber Warfare. Techniques, Tactics and Tools for Security Practitioners
Jason Andress, 2014
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Jason Andress, 2011
When marriage ends: economic and social consequences of partnership dissolution
Hans-Jürgen Andress, 2009
Provider's Coding Notes: Billiing and Coding Pocket Guide
Alice Ann Andress, 2007
Provider's Coding Notes: Billiing and Coding Pocket Guide (Davis's Notes)
Alice Anne Andress, 2007
CISSP Exam Cram
Mandy Andress, 2001
Building a Practical Information Security Program
Jason Andress, 2017
Cyber warfare : techniques, tactics and tools for security practitioners
Jason Andress, 2011
Coding for Penetration Testers 2nd Edition
Jason Andress,Ryan Linn & Ryan Linn
Coding for penetration testers: building better tools
Andress, Jason, Linn, Ryan & Ryan Linn, 2012
Coding for Penetration Testers
Ryan Linn, Jason Andress, 2016
LibGDX游戏开发指南(第二版): Learning LibGDX Game Development, Second Edition
[印]Suryakumar Balakrishnan Nair; [德]Andress Oehlke, 2017
Foundations of Information Security: A Straightforward Introduction
Jason Andress, 2019
French Society in Revolution, 1789-1799
David Andress, 1999
Foundations of Information Security: A Straightforward Introduction
Jason Andress, 2019