Join us on a literary world trip!
Add this book to bookshelf
Grey

Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools

Dr. Hedaya Alasooly

LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking

Poonam Devi

Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools

Dr. Hedaya Alasooly

CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity

Poonam Devi

LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking

Poonam Devi

Basic Setup of FortiMail Mail Server

Dr. Hedaya Alasooly

Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Ultimate VMware NSX for Professionals - Leverage Virtualized Networking Security and Advanced Services of VMware NSX for Efficient Data Management and Network Excellence

Vinay Aggarwal

Virtualization Power Pack: Novice To Ninja - Mastering VMware Virtualbox Parallels Citrix

Rob Botwright

Pentesting Active Directory and Windows-based Infrastructure - A comprehensive practical guide to penetration testing Microsoft infrastructure

Denis Isakov

Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers

Rob Botwright

AZ-104: Azure Administrator Mastery

Rob Botwright

Gray Hat - Vulnerability Scanning & Penetration Testing

Rob Botwright

Ethical Hacking Workshop - Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Rishalin Pillay, Mohammed Abutheraa

Malware Analysis - Digital Forensics Cybersecurity And Incident Response

Rob Botwright

Zero Trust Security - Building Cyber Resilience & Robust Security Postures

Rob Botwright

Burp Suite Cookbook - Web application security made easy with Burp Suite

Dr. Sunny Wear

Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques

Muhiballah Mohammed

Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO

Sambit Kumar Dash

IT Networking: A Comprehensive Guide

Christopher Ford

Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses

Rob Botwright

The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity

Cesar Bravo, Desilda Toska

Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain

Taha Sajid

LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking

Poonam Devi

Shadows of the Abyss: Unveiling the Dark Web

Christopher Ford

Safeguarding the Digital Fortress: A Guide to Cyber Security

Christopher Ford

Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps

Ashish Mishra

Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting

Glen D. Singh

Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications

Stian Thorgersen, Pedro Igor Silva