Implementing Multifactor Authentication - Protect your applications from cyberattacks with the help of MFA
Marco Fanti
Mastering Linux Security and Hardening - A practical guide to protecting your Linux system from cyber attacks
Donald A. Tevault
Implementing Cellular IoT Solutions for Digital Transformation - Successfully develop deploy and maintain LTE and 5G enterprise IoT systems
Dennis McCain, Cameron Coursey
Mastering Python Networking - Utilize Python packages and frameworks for network automation monitoring cloud and management
Eric Chou
Demystifying Ansible Automation Platform - A definitive way to manage Ansible Automation Platform and Ansible Tower
Sean Sullivan
Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark
Lisa Bock
Learn Computer Forensics – 2nd edition - Your one-stop guide to searching analyzing acquiring and securing digital evidence
William Oettinger
iOS Forensics for Investigators - Take mobile forensics to the next level by analyzing extracting and reporting sensitive evidence
Gianluca Tiepolo
Zabbix 6 IT Infrastructure Monitoring Cookbook - Explore the new features of Zabbix 6 for designing building and maintaining your Zabbix setup
Nathan Liefting, Brian van Baekel
The Ultimate Kali Linux Book - Perform advanced penetration testing using Nmap Metasploit Aircrack-ng and Empire
Glen D. Singh
AWS Certified Cloud Practitioner Exam Guide - Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)
Rajesh Daswani
Red Hat Enterprise Linux 8 Administration - Master Linux administration skills and prepare for the RHCSA certification exam
Scott McCarty, Pablo Iranzo Gómez, Miguel Pérez Colino
Linux for Networking Professionals - Securely configure and operate Linux network services for the enterprise
Rob VandenBrink
Python Network Programming Techniques - 50 real-world recipes to automate infrastructure networks and overcome networking challenges with Python
Marcel Neidinger
Industrial Cybersecurity - Efficiently monitor the cybersecurity posture of your ICS environment
Pascal Ackerman
Nmap Network Exploration and Security Auditing Cookbook Third Edition - Network discovery and security scanning at your fingertips
Paulino Calderon
Securing Remote Access in Palo Alto Networks - Practical techniques to enable and protect remote users improve your security posture and troubleshoot next-generation firewalls
Tom Piens
Mastering Linux Administration - A comprehensive guide to installing configuring and maintaining Linux systems in the modern data center
Alexandru Calcatinge, Julian Balog
Zscaler Cloud Security Essentials - Discover how to securely embrace cloud efficiency intelligence and agility with Zscaler
Ravi Devarasetty
Cisco Certified CyberOps Associate 200-201 Certification Guide - Learn blue teaming strategies and incident response techniques to mitigate cybersecurity incidents
Glen D. Singh
Infosec Strategies and Best Practices - Gain proficiency in information security using expert-level strategies and best practices
Joseph MacMillan
Fundamentos de Seguridad de la Red
NUMA EDITORIAL
Practical Hardware Pentesting - A guide to attacking embedded systems and protecting them against the most common hardware attacks
Jean-Georges Valle
Configuration of Apache Server to Support Asp
Dr. Hidaia Mahmood Alassoulii
Linux Kernel Programming Part 2 - Char Device Drivers and Kernel Synchronization - Create user-kernel interfaces work with peripheral I O and handle hardware interrupts
Kaiwan N Billimoria
Linux Kernel Programming - A comprehensive guide to kernel internals writing kernel modules and kernel synchronization
Kaiwan N Billimoria
Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services
Dr. Hidaia Mahmood Alassoulii
Cloud Native with Kubernetes - Deploy configure and run modern cloud native applications on Kubernetes
Alexander Raul
Evaluation of Some Websites that Offer Remote Desktop Protocol (RDP) Services Virtual Phone Numbers for SMS Reception and Virtual Debit Credit Cards
Dr. Hidaia Mahmood Alassoulii
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide - Begin a successful career in networking with CCNA 200-301 certification
Glen D. Singh