Join us on a literary world trip!
Add this book to bookshelf
Grey

Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications

Stian Thorgersen, Pedro Igor Silva

Mastering Microsoft 365 Defender - Implement Microsoft Defender for Endpoint Identity Cloud Apps and Office 365 and respond to threats

Ru Campbell, Viktor Hedberg

Evaluation of Some SMTP Testing Email Verification Header Analysis SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools

Dr. Hidaia Mahmood Alassoulii

Python for Security and Networking - Leverage Python modules and tools in securing your network and applications

José Manuel Ortega

Windows Ransomware Detection and Protection - Securing Windows endpoints the cloud and infrastructure using Microsoft Intune Sentinel and Defender

Marius Sandbu

Microsoft Defender for Endpoint in Depth - Take any organization's endpoint security to the next level

Paul Huijbregts, Joe Anich, Justen Graves

Cybersecurity Blue Team Strategies - Uncover the secrets of blue teams to combat cyber threats in your organization

Kunal Sehgal, Nikolaos Thymianis

Cybersecurity Threats Malware Trends and Strategies - Discover risk mitigation strategies for modern threats to your organization

Tim Rains

Machine Learning Security Principles - Keep data networks users and applications safe from prying eyes

John Paul Mueller

Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response

Gerard Johansen

An Ethical Guide to Cyber Anonymity - Concepts tools and techniques to protect your anonymity from criminals unethical hackers and governments

Kushantha Gunawardana

Basic Setup of FortiMail Mail Server

Dr. Hidaia Mahmood Alassoulii

Cybersecurity – Attack and Defense Strategies 3rd edition - Improve your security posture to mitigate risks and prevent attackers from infiltrating your system

Yuri Diogenes, Dr. Erdal Ozkaya

Hack the Cybersecurity Interview - A complete interview preparation guide for jumpstarting your cybersecurity career

Ken Underhill, Christophe Foulon, Tia Hopkins

Operationalizing Threat Intelligence - A guide to developing and operationalizing cyber threat intelligence programs

Kyle Wilhoit, Joseph Opacki

The Foundations of Threat Hunting - Organize and design effective cyber threat hunts to meet business needs

Chad Maurice, Jeremy Thompson, William Copeland

iOS Forensics for Investigators - Take mobile forensics to the next level by analyzing extracting and reporting sensitive evidence

Gianluca Tiepolo

Incident Response Techniques for Ransomware Attacks - Understand modern ransomware attacks and build an incident response strategy to work through them

Oleg Skulkin

Practical Memory Forensics - Jumpstart effective forensic analysis of volatile memory

Oleg Skulkin, Svetlana Ostrovskaya

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide - Manage monitor and respond to threats using Microsoft Security Stack for securing IT systems

Joe Anich, Trevor Stuart

The Cybersecurity Playbook for Modern Enterprises - An end-to-end guide to preventing data breaches and cyber attacks

Jeremy Wittkop

Agile Security Operations - Engineering for agility in cyber defense detection and response

Hinne Hettema

Cybersecurity Leadership Demystified - A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO

Dr. Erdal Ozkaya

Mastering Defensive Security - Effective techniques to secure your Windows Linux IoT and cloud infrastructure

Cesar Bravo

Penetration Testing Azure for Ethical Hackers - Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments

David Okeyode, Karl Fosaaen

Privilege Escalation Techniques - Learn the art of exploiting Windows and Linux systems

Alexis Ahmed

Cybersafe For Humans - A Simple Guide to Keep You and Your Family Safe Online

Patrick Acheampong

Cybersafe for Business - The Anti-Hack Handbook for SMEs

Patrick Acheampong

Cybersecurity Career Master Plan - Proven techniques and effective tips to help you advance in your cybersecurity career

Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, Kim Nguyen

Antivirus Bypass Techniques - Learn practical techniques and tactics to combat bypass and evade antivirus software

Nir Yehoshua, Uriel Kosayev