Join us on a literary world trip!
Add this book to bookshelf
Grey

End of Abundance in Tech - How IT Leaders Can Find Efficiencies to Drive Business Value

Ben DeBow

Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms

Dr. Hidaia Mahmood Alassoulii

Common Windows Linux and Web Server Systems Hacking Techniques

Dr. Hidaia Mahmood Alassoulii

Footprinting Reconnaissance Scanning and Enumeration Techniques of Computer Networks

Dr. Hidaia Mahmood Alassoulii

Comparison between Internet Fax Services

Dr. Hidaia Mahmood Alassoulii

Configuration of Apache Server To Support ASP

Dr. Hidaia Mahmood Alassoulii

Starting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus

Dr. Hidaia Mahmood Alassoulii

Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection

Dr. Hidaia Mahmood Alassoulii

Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services

Dr. Hidaia Mahmood Alassoulii

Hacking of Computer Networks - Full Course on Hacking of Computer Networks

Dr. Hidaia Mahmood Alassoulii

Creation of Postfix Mail Server Based on Virtual Users and Domains

Dr. Hidaia Mahmood Alassoulii

Configuration of a Simple Samba File Server Quota and Schedule Backup

Dr. Hidaia Mahmood Alassoulii

Quick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory

Dr. Hidaia Mahmood Alassoulii

Creation and Deployment of Smart Contracts on Ethereum Blockchain

Dr. Hidaia Mahmood Alassoulii

Some Tutorials in Computer Networking Hacking

Dr. Hidaia Mahmood Alassoulii

Ultimate Pentesting for Web Applications - Unlock Advanced Web App Security Through Penetration Testing Using Burp Suite Zap Proxy Fiddler Charles Proxy and Python for Robust Defense

Dr. Rohit Gautam, Dr. Shifa Cyclewala

Basic Setup of FortiGate Firewall

Dr. Hidaia Mahmood Alassoulii

Network Engineer's Bible - Mastering 100 Protocols For Communication Management And Security

Rob Botwright

Ultimate Linux Network Security for Enterprises - Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services

Adarsh Kant

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright

Mastering AWS Security - Strengthen your cloud environment using AWS security features coupled with proven strategies

Laurent Mathieu

Enterprise-Grade Hybrid and Multi-Cloud Strategies - Proven strategies to digitally transform your business with hybrid and multi-cloud solutions

Sathya AG

Ultimate Microservices with Go - Combine the Power of Microservices with Go to Build Highly Scalable Maintainable and Efficient Systems

Nir Shtein

Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap

Travis Deforge

ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen

Mastering Go - Leverage Go's expertise for advanced utilities empowering you to develop professional software

Mihalis Tsoukalos

Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture

Sasha Kranjac, Omar Kudović

Mastering Linux Administration - Take your sysadmin skills to the next level by configuring and maintaining Linux systems

Alexandru Calcatinge, Julian Balog

Customizing and Extending SharePoint Online - Design tailor-made solutions with modern SharePoint features to meet your organization's unique needs

Matti Paukkonen

Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects

Aspen Olmsted