Join us on a literary world trip!
Add this book to bookshelf
Grey

Safeguarding the Digital Fortress: A Guide to Cyber Security

Christopher Ford

CYBER SECURITY HANDBOOK Part-2 - Lock Stock and Cyber: A Comprehensive Security Handbook

Poonam Devi

CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity

Poonam Devi

ETHICAL HACKING GUIDE-Part 3 - Comprehensive Guide to Ethical Hacking world

Poonam Devi

Learn Ethereum - A practical guide to help developers set up and run decentralized applications with Ethereum 20

Xun (Brian) Wu, Zhihong Zou, Dongying Song

Attacking and Exploiting Modern Web Applications - Discover the mindset techniques and tools to perform modern web attacks and exploitation

Simone Onofri, Donato Onofri

Cloud Native Software Security Handbook - Unleash the power of cloud native tools for robust security in modern applications

Mihir Shah

Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps

Ashish Mishra

Microsoft 365 Security Compliance and Identity Administration - Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising

PowerShell Automation and Scripting for Cybersecurity - Hacking and defense for red and blue teamers

Miriam C. Wiesner

Mastering Information Security Compliance Management - A comprehensive handbook on ISO IEC 27001:2022 compliance

Adarsh Nair, Greeshma M. R.

Decoding Bitcoin - Understanding Investing and Mining

Penelope B. Wellington

Bitcoin - In the world of cryptocurrencies Bitcoin reigns supreme

Isla L. Gallagher

The Bitcoin Handbook - Discover the allure of Bitcoin's decentralized power

Xavier I. Kingsley

Understanding Blockchain

Sankar Srinivasan

Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting

Glen D. Singh

Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications

Stian Thorgersen, Pedro Igor Silva

Mastering Microsoft 365 Defender - Implement Microsoft Defender for Endpoint Identity Cloud Apps and Office 365 and respond to threats

Ru Campbell, Viktor Hedberg

Security Orchestration Automation and Response for Security Analysts - Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture

Benjamin Kovacevic

Evaluation of Some SMTP Testing Email Verification Header Analysis SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools

Dr. Hidaia Mahmood Alassouli

Building a Next-Gen SOC with IBM QRadar - Accelerate your security operations and detect cyber threats effectively

Ashish M Kothekar

Python for Security and Networking - Leverage Python modules and tools in securing your network and applications

José Manuel Ortega

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 - Configure advanced Windows Server services for on-premises hybrid and cloud environments

Chris Gill

Digital Forensics with Kali Linux - Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022x 3rd Edition

Shiva V. N. Parasram

Advanced Network Simulations Simplified - Practical guide for wired Wi-Fi (80211n ac ax) and LTE networks using ns-3

Dr Anil Kumar Rangisetti

Mastering Blockchain - Inner workings of blockchain from cryptography and decentralized identities to DeFi NFTs and Web3

Imran Bashir

Azure Security Cookbook - Practical recipes for securing Azure resources and operations

Steve Miles

Windows Ransomware Detection and Protection - Securing Windows endpoints the cloud and infrastructure using Microsoft Intune Sentinel and Defender

Marius Sandbu

Zed Attack Proxy Cookbook - Hacking tactics techniques and procedures for testing web applications and APIs

Ryan Soper, Nestor N Torres, Ahmed Almoailu