Decoding Ethereum - An In-depth Analysis
Penelope I.
Demystifying VeChain - Cryptocurrency for Businesses
Penelope I.
Grid of Filecoin - A Crypto Revolution
Penelope I.
Intro to Stacks (STX) - A Comprehensive Guide
Penelope I.
Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape
Harpreet Singh, Himanshu Sharma
Microsoft Unified XDR and SIEM Solution Handbook - Modernize and build a unified SOC platform for future-proof security
Raghu Boddu, Sami Lamppu
Cloud Forensics Demystified - Decoding cloud investigation complexities for digital forensic professionals
Ganesh Ramakrishnan, Mansoor Haqanee
Mastering Cloud Security Posture Management (CSPM) - Secure multi-cloud infrastructure across AWS Azure and Google Cloud using proven techniques
Qamar Nomani
Azure Penetration Testing - Advanced Strategies For Cloud Security
Rob Botwright
TLS Cryptography In-Depth - Explore the intricacies of modern cryptography and the inner workings of TLS
Dr. Paul Duplys, Dr. Roland Schmitz
Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security
Jit Sinha
Learn Azure Administration - Explore cloud administration concepts with networking computing storage and identity management
Kamil Mrzygłód
Machine Learning Security with Azure - Best practices for assessing securing and monitoring Azure Machine Learning workloads
Georgia Kalyva
Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
Implementing DevSecOps Practices - Supercharge your software security with DevSecOps excellence
Vandana Verma Sehgal
AZURE AZ 500 STUDY GUIDE-1 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500
Mamta Devi
AZURE AZ 500 STUDY GUIDE-2 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500
Mamta Devi
REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic
Mamta Devi
ETHICAL HACKING GUIDE-Part 3 - Comprehensive Guide to Ethical Hacking world
Poonam Devi
LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking
Poonam Devi
CYBER SECURITY HANDBOOK Part-2 - Lock Stock and Cyber: A Comprehensive Security Handbook
Poonam Devi
CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Malware Science - A comprehensive guide to detection analysis and compliance
Shane Molinari
The Essential Guide to Web3 - Develop deploy and manage distributed applications on the Ethereum network
Vijay Krishnan
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Cloud Penetration Testing for Red Teamers - Learn how to effectively pentest AWS Azure and GCP applications
Kim Crawley