Join us on a literary world trip!
Add this book to bookshelf
Grey

Evaluation of Some SMTP Testing Email Verification Header Analysis SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools

Dr. Hidaia Mahmood Alassoulii

Implementing Multifactor Authentication - Protect your applications from cyberattacks with the help of MFA

Marco Fanti

10 Machine Learning Blueprints You Should Know for Cybersecurity - Protect your systems and boost your defenses with cutting-edge AI techniques

Rajvardhan Oak

Mastering Veeam Backup & Replication - Design and deploy a secure and resilient Veeam 12 platform using best practices

Chris Childerhose

Digital Forensics with Kali Linux - Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022x 3rd Edition

Shiva V. N. Parasram

Zed Attack Proxy Cookbook - Hacking tactics techniques and procedures for testing web applications and APIs

Ryan Soper, Nestor N Torres, Ahmed Almoailu

Microsoft Defender for Endpoint in Depth - Take any organization's endpoint security to the next level

Paul Huijbregts, Joe Anich, Justen Graves

Mastering Linux Security and Hardening - A practical guide to protecting your Linux system from cyber attacks

Donald A. Tevault

Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools

Dr. Hedaya Alasooly

Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools

Dr. Hidaia Mahmood Alassoulii

Cybersecurity Blue Team Strategies - Uncover the secrets of blue teams to combat cyber threats in your organization

Kunal Sehgal, Nikolaos Thymianis

Combating Crime on the Dark Web - Learn how to access the dark web safely and not fall victim to cybercrime

Nearchos Nearchou

We Need To Talk - 52 Weeks To Better Cyber-Security

L. Brent Huston

Mastering Python Networking - Utilize Python packages and frameworks for network automation monitoring cloud and management

Eric Chou

DevSecOps in Practice with VMware Tanzu - Build run and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio

Robert Hardt, Parth Pandit

Cloud Auditing Best Practices - Perform Security and IT Audits across AWS Azure and GCP by building effective cloud auditing plans

Shinesa Cambric, Michael Ratemo

Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response

Gerard Johansen

Basic Setup of FortiMail Mail Server

Dr. Hidaia Mahmood Alassoulii

Hybrid Cloud Security Patterns - Leverage modern repeatable architecture patterns to secure your workloads on the cloud

Sreekanth Iyer

Diving into Secure Access Service Edge - A technical leadership guide to achieving success with SASE at market speed

Jeremiah

Network Protocols for Security Professionals - Probe and identify network-based vulnerabilities and safeguard against network protocol breaches

Yoram Orzach, Deepanshu Khanna

Cybersecurity – Attack and Defense Strategies 3rd edition - Improve your security posture to mitigate risks and prevent attackers from infiltrating your system

Yuri Diogenes, Dr. Erdal Ozkaya

Windows and Linux Penetration Testing from Scratch - Harness the power of pen testing with Kali Linux for unbeatable hard-hitting results

Phil Bramwell

Mastering Windows Security and Hardening - Secure and protect your Windows environment from cyber threats using zero-trust security principles

Mark Dunkerley, Matt Tumbarello

Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark

Lisa Bock

Learn Computer Forensics – 2nd edition - Your one-stop guide to searching analyzing acquiring and securing digital evidence

William Oettinger

OPNsense Beginner to Professional - Protect networks and build next-generation firewalls easily with OPNsense

Julio Cesar Bueno de Camargo

Incident Response with Threat Intelligence - Practical insights into developing an incident response capability through intelligence-based threat hunting

Robert Martinez

Mastering Palo Alto Networks - Build configure and deploy network solutions for your infrastructure using features of PAN-OS

Tom Piens aka Piens aka 'reaper'

Microsoft Security Compliance and Identity Fundamentals Exam Ref SC-900 - Familiarize yourself with security identity and compliance in Microsoft 365 and Azure

Dwayne Natwick