ETHICAL HACKING GUIDE-Part 3 - Comprehensive Guide to Ethical Hacking world
Poonam Devi
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking
Poonam Devi
CYBER SECURITY HANDBOOK Part-2 - Lock Stock and Cyber: A Comprehensive Security Handbook
Poonam Devi
Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Malware Science - A comprehensive guide to detection analysis and compliance
Shane Molinari
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
The Essential Guide to Web3 - Develop deploy and manage distributed applications on the Ethereum network
Vijay Krishnan
Cloud Penetration Testing for Red Teamers - Learn how to effectively pentest AWS Azure and GCP applications
Kim Crawley
Cryptography And Computer Science - Design Manual For Algorithms Codes And Ciphers
Rob Botwright
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Practical Cybersecurity Architecture - A guide to creating and implementing robust designs for cybersecurity architects
Diana Kelley, Ed Moyle
Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers
Rob Botwright
Gray Hat - Vulnerability Scanning & Penetration Testing
Rob Botwright
Information Security Handbook - Enhance your proficiency in information security program development
Darren Death
Ethical Hacking Workshop - Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
Rishalin Pillay, Mohammed Abutheraa
Windows 11 for Enterprise Administrators - Unleash the power of Windows 11 with effective techniques and strategies
Steve Miles, Thomas Lee, Richard Diver, Jeff Stokes, Manuel Singer
Malware Analysis - Digital Forensics Cybersecurity And Incident Response
Rob Botwright
Zero Trust Security - Building Cyber Resilience & Robust Security Postures
Rob Botwright
Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques
Muhiballah Mohammed
Burp Suite Cookbook - Web application security made easy with Burp Suite
Dr. Sunny Wear
How To Grow Your Facebook Page Following Fast Like a Pro - The Jono Armstrong's Secrets to Rapid Facebook Page Growth
Miller Allen A.
Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO
Sambit Kumar Dash
Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses
Rob Botwright
REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic
Mamta Devi
The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity
Cesar Bravo, Desilda Toska
Automotive Cybersecurity Engineering Handbook - The automotive engineer's roadmap to cyber-resilient vehicles
Dr. Ahmad MK Nasser
Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain
Taha Sajid