Join us on a literary world trip!
Add this book to bookshelf
Grey

Lido DAO (LDO) - The Emergence of Decentralized Finance

Penelope I.

Intro to Stacks (STX) - A Comprehensive Guide

Penelope I.

ChainLink - The New Age Cryptocurrency

Penelope I.

Demystifying VeChain - Cryptocurrency for Businesses

Penelope I.

Cryptocurrency Uncovered - Investing in the Future with TRON (TRX)

Penelope I.

Bitcoin - The Groundbreaking Cryptocurrency

Penelope I.

Hedera Hashgraph - Disrupting Blockchain

Penelope I.

Investing in Binance Coin - The Future of Cryptocurrency

Penelope I.

From Bitcoin to Tether (USDT) - The Evolution of Cryptocurrencies

Penelope I.

Driving Innovation with Solana - The Evolution of Financial Systems

Penelope I.

Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape

Harpreet Singh, Himanshu Sharma

Microsoft Unified XDR and SIEM Solution Handbook - Modernize and build a unified SOC platform for future-proof security

Raghu Boddu, Sami Lamppu

Mastering Cloud Security Posture Management (CSPM) - Secure multi-cloud infrastructure across AWS Azure and Google Cloud using proven techniques

Qamar Nomani

Azure Penetration Testing - Advanced Strategies For Cloud Security

Rob Botwright

TLS Cryptography In-Depth - Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz

Microsoft Intune Cookbook - Over 75 recipes for configuring managing and automating your identities apps and endpoint devices

Andrew Taylor

Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security

Jit Sinha

Learn Azure Administration - Explore cloud administration concepts with networking computing storage and identity management

Kamil Mrzygłód

Machine Learning Security with Azure - Best practices for assessing securing and monitoring Azure Machine Learning workloads

Georgia Kalyva

Bitcoin & Cryptocurrency Investing - Top 10 DeFi Altcoins to Change the World and Your Finances Blockchain Cold StorageNFT & Mining ExplainedSmart Contracts & Decentralized Finance for Swing Trading

vitali lazar

REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic

Mamta Devi

Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps

HenkJan de Vries, Lovisa Stenbäcken Stjernlöf

AZURE AZ 500 STUDY GUIDE-2 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500

Mamta Devi

Implementing DevSecOps Practices - Supercharge your software security with DevSecOps excellence

Vandana Verma Sehgal

AZURE AZ 500 STUDY GUIDE-1 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500

Mamta Devi

LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking

Poonam Devi

LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking

Poonam Devi

CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity

Poonam Devi

CYBER SECURITY HANDBOOK Part-2 - Lock Stock and Cyber: A Comprehensive Security Handbook

Poonam Devi

ETHICAL HACKING GUIDE-Part 3 - Comprehensive Guide to Ethical Hacking world

Poonam Devi