Join us on a literary world trip!
Add this book to bookshelf
Grey

LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking

Poonam Devi

Basic Setup of FortiMail Mail Server

Dr. Hedaya Alasooly

Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools

Dr. Hedaya Alasooly

CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity

Poonam Devi

LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking

Poonam Devi

Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Ultimate VMware NSX for Professionals - Leverage Virtualized Networking Security and Advanced Services of VMware NSX for Efficient Data Management and Network Excellence

Vinay Aggarwal

Virtualization Power Pack: Novice To Ninja - Mastering VMware Virtualbox Parallels Citrix

Rob Botwright

Pentesting Active Directory and Windows-based Infrastructure - A comprehensive practical guide to penetration testing Microsoft infrastructure

Denis Isakov

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright

Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers

Rob Botwright

AZ-104: Azure Administrator Mastery

Rob Botwright

Gray Hat - Vulnerability Scanning & Penetration Testing

Rob Botwright

Ethical Hacking Workshop - Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Rishalin Pillay, Mohammed Abutheraa

Malware Analysis - Digital Forensics Cybersecurity And Incident Response

Rob Botwright

Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques

Muhiballah Mohammed

Burp Suite Cookbook - Web application security made easy with Burp Suite

Dr. Sunny Wear

Zero Trust Security - Building Cyber Resilience & Robust Security Postures

Rob Botwright

Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO

Sambit Kumar Dash

Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses

Rob Botwright

IT Networking: A Comprehensive Guide

Christopher Ford

The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity

Cesar Bravo, Desilda Toska

Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain

Taha Sajid

LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking

Poonam Devi

Shadows of the Abyss: Unveiling the Dark Web

Christopher Ford

Safeguarding the Digital Fortress: A Guide to Cyber Security

Christopher Ford

Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps

Ashish Mishra

Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting

Glen D. Singh

Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications

Stian Thorgersen, Pedro Igor Silva