Join us on a literary world trip!
Add this book to bookshelf
Grey

Pentesting Active Directory and Windows-based Infrastructure - A comprehensive practical guide to penetration testing Microsoft infrastructure

Denis Isakov

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright

Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers

Rob Botwright

AZ-104: Azure Administrator Mastery

Rob Botwright

Gray Hat - Vulnerability Scanning & Penetration Testing

Rob Botwright

Ethical Hacking Workshop - Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Rishalin Pillay, Mohammed Abutheraa

Malware Analysis - Digital Forensics Cybersecurity And Incident Response

Rob Botwright

Burp Suite Cookbook - Web application security made easy with Burp Suite

Dr. Sunny Wear

Zero Trust Security - Building Cyber Resilience & Robust Security Postures

Rob Botwright

Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques

Muhiballah Mohammed

Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO

Sambit Kumar Dash

Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses

Rob Botwright

IT Networking: A Comprehensive Guide

Christopher Ford

The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity

Cesar Bravo, Desilda Toska

LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking

Poonam Devi

Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain

Taha Sajid

Shadows of the Abyss: Unveiling the Dark Web

Christopher Ford

Safeguarding the Digital Fortress: A Guide to Cyber Security

Christopher Ford

Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps

Ashish Mishra

Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting

Glen D. Singh

Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications

Stian Thorgersen, Pedro Igor Silva

Mastering Microsoft 365 Defender - Implement Microsoft Defender for Endpoint Identity Cloud Apps and Office 365 and respond to threats

Ru Campbell, Viktor Hedberg

Security Orchestration Automation and Response for Security Analysts - Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture

Benjamin Kovacevic

Evaluation of Some SMTP Testing Email Verification Header Analysis SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools

Dr. Hidaia Mahmood Alassouli

Implementing Multifactor Authentication - Protect your applications from cyberattacks with the help of MFA

Marco Fanti

10 Machine Learning Blueprints You Should Know for Cybersecurity - Protect your systems and boost your defenses with cutting-edge AI techniques

Rajvardhan Oak

Mastering Veeam Backup & Replication - Design and deploy a secure and resilient Veeam 12 platform using best practices

Chris Childerhose

Digital Forensics with Kali Linux - Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022x 3rd Edition

Shiva V. N. Parasram

Zed Attack Proxy Cookbook - Hacking tactics techniques and procedures for testing web applications and APIs

Ryan Soper, Nestor N Torres, Ahmed Almoailu