Comparison between Internet Fax Services
Dr. Hidaia Mahmood Alassoulii
Hacking of Computer Networks - Full Course on Hacking of Computer Networks
Dr. Hidaia Mahmood Alassoulii
Some Tutorials in Computer Networking Hacking
Dr. Hidaia Mahmood Alassoulii
Hands-On Ethical Hacking Tactics - Strategies tools and techniques for effective cyber defense
Shane Hartman
Implementing Palo Alto Networks Prisma® Access - Learn real-world network protection
Tom Piens Aka 'Reaper'
Ultimate Pentesting for Web Applications - Unlock Advanced Web App Security Through Penetration Testing Using Burp Suite Zap Proxy Fiddler Charles Proxy and Python for Robust Defense
Dr. Rohit Gautam, Dr. Shifa Cyclewala
Basic Setup of FortiGate Firewall
Dr. Hidaia Mahmood Alassoulii
Network Engineer's Bible - Mastering 100 Protocols For Communication Management And Security
Rob Botwright
Ultimate Linux Network Security for Enterprises - Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services
Adarsh Kant
The Ultimate Kali Linux Book - Harness Nmap Metaspolit Aircrack-ng and Empire for cutting-edge pentesting
Glen D. Singh
Mastering AWS Security - Strengthen your cloud environment using AWS security features coupled with proven strategies
Laurent Mathieu
Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap
Travis Deforge
ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills
Clint Bodungen
Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture
Sasha Kranjac, Omar Kudović
Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects
Aspen Olmsted
Mastering Microsoft Intune - Deploy Windows 11 Windows 365 via Microsoft Intune Copilot and advance management via Intune Suite
Christiaan Brinkhoff, Per Larsen
Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape
Harpreet Singh, Himanshu Sharma
AWS Cloud Automation - Harnessing Terraform For AWS Infrastructure As Code
Rob Botwright
Cloud Forensics Demystified - Decoding cloud investigation complexities for digital forensic professionals
Ganesh Ramakrishnan, Mansoor Haqanee
Defending APIs - Uncover advanced defense techniques to craft secure application programming interfaces
Colin Domoney
Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications
Rob Botwright
Mastering Cloud Security Posture Management (CSPM) - Secure multi-cloud infrastructure across AWS Azure and Google Cloud using proven techniques
Qamar Nomani
Kubernetes Secrets Handbook - Design implement and maintain production-grade Kubernetes Secrets management solutions
Emmanouil Gkatziouras, Rom Adams, Chen Xi
Azure Penetration Testing - Advanced Strategies For Cloud Security
Rob Botwright
Oracle Linux Cookbook - Embrace Oracle Linux and master Linux Server Management
Erik Benner, Erik B. Thomsen, Jonathan Spindel
Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security
Jit Sinha
Next-Generation switching OS configuration and management - Troubleshooting NX-OS in Enterprise Environments
Mamta Devi
Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch
Mamta Devi
Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hedaya Alasooly