Join us on a literary world trip!
Add this book to bookshelf
Grey

Attacking and Exploiting Modern Web Applications - Discover the mindset techniques and tools to perform modern web attacks and exploitation

Simone Onofri, Donato Onofri

Microsoft 365 Security Compliance and Identity Administration - Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising

Mastering Information Security Compliance Management - A comprehensive handbook on ISO IEC 27001:2022 compliance

Adarsh Nair, Greeshma M. R.

Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting

Glen D. Singh

Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications

Stian Thorgersen, Pedro Igor Silva

Security Orchestration Automation and Response for Security Analysts - Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture

Benjamin Kovacevic

Building a Next-Gen SOC with IBM QRadar - Accelerate your security operations and detect cyber threats effectively

Ashish M Kothekar

Python for Security and Networking - Leverage Python modules and tools in securing your network and applications

José Manuel Ortega

Digital Forensics with Kali Linux - Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022x 3rd Edition

Shiva V. N. Parasram

Advanced Network Simulations Simplified - Practical guide for wired Wi-Fi (80211n ac ax) and LTE networks using ns-3

Dr Anil Kumar Rangisetti

Azure Security Cookbook - Practical recipes for securing Azure resources and operations

Steve Miles

Windows APT Warfare - Identify and prevent Windows APT attacks effectively

Federico Maggi, Sheng-Hao Ma, Ziv Chang

Executive's Cybersecurity Program Handbook - A comprehensive guide to building and operationalizing a complete cybersecurity program

Jason Brown

The Vulnerability Researcher's Handbook - A comprehensive guide to discovering reporting and publishing security vulnerabilities

Benjamin Strout

Combating Crime on the Dark Web - Learn how to access the dark web safely and not fall victim to cybercrime

Nearchos Nearchou

Cybersecurity Threats Malware Trends and Strategies - Discover risk mitigation strategies for modern threats to your organization

Tim Rains

An Ethical Guide to Cyber Anonymity - Concepts tools and techniques to protect your anonymity from criminals unethical hackers and governments

Kushantha Gunawardana

Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response

Gerard Johansen

Cybersecurity and Privacy Law Handbook - A beginner's guide to dealing with privacy and security while keeping hackers at bay

Walter Rocchi

Network Protocols for Security Professionals - Probe and identify network-based vulnerabilities and safeguard against network protocol breaches

Yoram Orzach, Deepanshu Khanna

Learn Computer Forensics – 2nd edition - Your one-stop guide to searching analyzing acquiring and securing digital evidence

William Oettinger

Hack the Cybersecurity Interview - A complete interview preparation guide for jumpstarting your cybersecurity career

Ken Underhill, Christophe Foulon, Tia Hopkins

Microsoft Defender for Cloud Cookbook - Protect multicloud and hybrid cloud environments manage compliance and strengthen security posture

Sasha Kranjac

Incident Response with Threat Intelligence - Practical insights into developing an incident response capability through intelligence-based threat hunting

Robert Martinez

The Foundations of Threat Hunting - Organize and design effective cyber threat hunts to meet business needs

Chad Maurice, Jeremy Thompson, William Copeland

Mobile App Reverse Engineering - Get started with discovering analyzing and exploring the internals of Android and iOS apps

Abhinav Mishra

iOS Forensics for Investigators - Take mobile forensics to the next level by analyzing extracting and reporting sensitive evidence

Gianluca Tiepolo

Cloud Security Handbook - Find out how to effectively secure cloud environments using AWS Azure and GCP

Eyal Estrin

Malicious URL Detection - Introduction

Dr. N. Jayakanthan

The Cybersecurity Playbook for Modern Enterprises - An end-to-end guide to preventing data breaches and cyber attacks

Jeremy Wittkop