Join us on a literary world trip!
Add this book to bookshelf
Grey

CYBER SECURITY HANDBOOK Part-2 - Lock Stock and Cyber: A Comprehensive Security Handbook

Poonam Devi

LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking

Poonam Devi

ETHICAL HACKING GUIDE-Part 3 - Comprehensive Guide to Ethical Hacking world

Poonam Devi

LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking

Poonam Devi

Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Malware Science - A comprehensive guide to detection analysis and compliance

Shane Molinari

Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

The Essential Guide to Web3 - Develop deploy and manage distributed applications on the Ethereum network

Vijay Krishnan

Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Cloud Penetration Testing for Red Teamers - Learn how to effectively pentest AWS Azure and GCP applications

Kim Crawley

Cryptography And Computer Science - Design Manual For Algorithms Codes And Ciphers

Rob Botwright

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright

Practical Cybersecurity Architecture - A guide to creating and implementing robust designs for cybersecurity architects

Diana Kelley, Ed Moyle

Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers

Rob Botwright

Gray Hat - Vulnerability Scanning & Penetration Testing

Rob Botwright

Information Security Handbook - Enhance your proficiency in information security program development

Darren Death

Ethical Hacking Workshop - Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Rishalin Pillay, Mohammed Abutheraa

Windows 11 for Enterprise Administrators - Unleash the power of Windows 11 with effective techniques and strategies

Steve Miles, Thomas Lee, Richard Diver, Jeff Stokes, Manuel Singer

Malware Analysis - Digital Forensics Cybersecurity And Incident Response

Rob Botwright

Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques

Muhiballah Mohammed

Burp Suite Cookbook - Web application security made easy with Burp Suite

Dr. Sunny Wear

Zero Trust Security - Building Cyber Resilience & Robust Security Postures

Rob Botwright

How To Grow Your Facebook Page Following Fast Like a Pro - The Jono Armstrong's Secrets to Rapid Facebook Page Growth

Miller Allen A.

Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO

Sambit Kumar Dash

Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses

Rob Botwright

REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic

Mamta Devi

The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity

Cesar Bravo, Desilda Toska

Automotive Cybersecurity Engineering Handbook - The automotive engineer's roadmap to cyber-resilient vehicles

Dr. Ahmad MK Nasser

Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain

Taha Sajid