End of Abundance in Tech - How IT Leaders Can Find Efficiencies to Drive Business Value
Ben DeBow
Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms
Dr. Hidaia Mahmood Alassoulii
Common Windows Linux and Web Server Systems Hacking Techniques
Dr. Hidaia Mahmood Alassoulii
Footprinting Reconnaissance Scanning and Enumeration Techniques of Computer Networks
Dr. Hidaia Mahmood Alassoulii
Comparison between Internet Fax Services
Dr. Hidaia Mahmood Alassoulii
Configuration of Apache Server To Support ASP
Dr. Hidaia Mahmood Alassoulii
Starting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus
Dr. Hidaia Mahmood Alassoulii
Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection
Dr. Hidaia Mahmood Alassoulii
Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services
Dr. Hidaia Mahmood Alassoulii
Hacking of Computer Networks - Full Course on Hacking of Computer Networks
Dr. Hidaia Mahmood Alassoulii
Creation of Postfix Mail Server Based on Virtual Users and Domains
Dr. Hidaia Mahmood Alassoulii
Configuration of a Simple Samba File Server Quota and Schedule Backup
Dr. Hidaia Mahmood Alassoulii
Quick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory
Dr. Hidaia Mahmood Alassoulii
Creation and Deployment of Smart Contracts on Ethereum Blockchain
Dr. Hidaia Mahmood Alassoulii
Some Tutorials in Computer Networking Hacking
Dr. Hidaia Mahmood Alassoulii
Ultimate Pentesting for Web Applications - Unlock Advanced Web App Security Through Penetration Testing Using Burp Suite Zap Proxy Fiddler Charles Proxy and Python for Robust Defense
Dr. Rohit Gautam, Dr. Shifa Cyclewala
Basic Setup of FortiGate Firewall
Dr. Hidaia Mahmood Alassoulii
Network Engineer's Bible - Mastering 100 Protocols For Communication Management And Security
Rob Botwright
Ultimate Linux Network Security for Enterprises - Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services
Adarsh Kant
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Mastering AWS Security - Strengthen your cloud environment using AWS security features coupled with proven strategies
Laurent Mathieu
Enterprise-Grade Hybrid and Multi-Cloud Strategies - Proven strategies to digitally transform your business with hybrid and multi-cloud solutions
Sathya AG
Ultimate Microservices with Go - Combine the Power of Microservices with Go to Build Highly Scalable Maintainable and Efficient Systems
Nir Shtein
Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap
Travis Deforge
ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills
Clint Bodungen
Mastering Go - Leverage Go's expertise for advanced utilities empowering you to develop professional software
Mihalis Tsoukalos
Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture
Sasha Kranjac, Omar Kudović
Mastering Linux Administration - Take your sysadmin skills to the next level by configuring and maintaining Linux systems
Alexandru Calcatinge, Julian Balog
Customizing and Extending SharePoint Online - Design tailor-made solutions with modern SharePoint features to meet your organization's unique needs
Matti Paukkonen
Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects
Aspen Olmsted