Join us on a literary world trip!
Add this book to bookshelf
Grey

Implementing Multifactor Authentication - Protect your applications from cyberattacks with the help of MFA

Marco Fanti

Mastering Linux Security and Hardening - A practical guide to protecting your Linux system from cyber attacks

Donald A. Tevault

Implementing Cellular IoT Solutions for Digital Transformation - Successfully develop deploy and maintain LTE and 5G enterprise IoT systems

Dennis McCain, Cameron Coursey

Mastering Python Networking - Utilize Python packages and frameworks for network automation monitoring cloud and management

Eric Chou

Demystifying Ansible Automation Platform - A definitive way to manage Ansible Automation Platform and Ansible Tower

Sean Sullivan

Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark

Lisa Bock

Learn Computer Forensics – 2nd edition - Your one-stop guide to searching analyzing acquiring and securing digital evidence

William Oettinger

iOS Forensics for Investigators - Take mobile forensics to the next level by analyzing extracting and reporting sensitive evidence

Gianluca Tiepolo

Zabbix 6 IT Infrastructure Monitoring Cookbook - Explore the new features of Zabbix 6 for designing building and maintaining your Zabbix setup

Nathan Liefting, Brian van Baekel

The Ultimate Kali Linux Book - Perform advanced penetration testing using Nmap Metasploit Aircrack-ng and Empire

Glen D. Singh

AWS Certified Cloud Practitioner Exam Guide - Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)

Rajesh Daswani

Red Hat Enterprise Linux 8 Administration - Master Linux administration skills and prepare for the RHCSA certification exam

Scott McCarty, Pablo Iranzo Gómez, Miguel Pérez Colino

Linux for Networking Professionals - Securely configure and operate Linux network services for the enterprise

Rob VandenBrink

Python Network Programming Techniques - 50 real-world recipes to automate infrastructure networks and overcome networking challenges with Python

Marcel Neidinger

Industrial Cybersecurity - Efficiently monitor the cybersecurity posture of your ICS environment

Pascal Ackerman

Nmap Network Exploration and Security Auditing Cookbook Third Edition - Network discovery and security scanning at your fingertips

Paulino Calderon

Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users improve your security posture and troubleshoot next-generation firewalls

Tom Piens

Mastering Linux Administration - A comprehensive guide to installing configuring and maintaining Linux systems in the modern data center

Alexandru Calcatinge, Julian Balog

Zscaler Cloud Security Essentials - Discover how to securely embrace cloud efficiency intelligence and agility with Zscaler

Ravi Devarasetty

Cisco Certified CyberOps Associate 200-201 Certification Guide - Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents

Glen D. Singh

Infosec Strategies and Best Practices - Gain proficiency in information security using expert-level strategies and best practices

Joseph MacMillan

Fundamentos de Seguridad de la Red

NUMA EDITORIAL

Practical Hardware Pentesting - A guide to attacking embedded systems and protecting them against the most common hardware attacks

Jean-Georges Valle

Configuration of Apache Server to Support Asp

Dr. Hidaia Mahmood Alassoulii

Linux Kernel Programming Part 2 - Char Device Drivers and Kernel Synchronization - Create user-kernel interfaces work with peripheral I O and handle hardware interrupts

Kaiwan N Billimoria

Linux Kernel Programming - A comprehensive guide to kernel internals writing kernel modules and kernel synchronization

Kaiwan N Billimoria

Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services

Dr. Hidaia Mahmood Alassoulii

Cloud Native with Kubernetes - Deploy configure and run modern cloud native applications on Kubernetes

Alexander Raul

Evaluation of Some Websites that Offer Remote Desktop Protocol (RDP) Services Virtual Phone Numbers for SMS Reception and Virtual Debit Credit Cards

Dr. Hidaia Mahmood Alassoulii

Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide - Begin a successful career in networking with CCNA 200-301 certification

Glen D. Singh