Safeguarding the Digital Fortress: A Guide to Cyber Security
Christopher Ford
CYBER SECURITY HANDBOOK Part-2 - Lock Stock and Cyber: A Comprehensive Security Handbook
Poonam Devi
CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
ETHICAL HACKING GUIDE-Part 3 - Comprehensive Guide to Ethical Hacking world
Poonam Devi
Learn Ethereum - A practical guide to help developers set up and run decentralized applications with Ethereum 20
Xun (Brian) Wu, Zhihong Zou, Dongying Song
Attacking and Exploiting Modern Web Applications - Discover the mindset techniques and tools to perform modern web attacks and exploitation
Simone Onofri, Donato Onofri
Cloud Native Software Security Handbook - Unleash the power of cloud native tools for robust security in modern applications
Mihir Shah
Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs
Mostafa Yahia
Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps
Ashish Mishra
Microsoft 365 Security Compliance and Identity Administration - Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
Peter Rising
PowerShell Automation and Scripting for Cybersecurity - Hacking and defense for red and blue teamers
Miriam C. Wiesner
Mastering Information Security Compliance Management - A comprehensive handbook on ISO IEC 27001:2022 compliance
Adarsh Nair, Greeshma M. R.
Decoding Bitcoin - Understanding Investing and Mining
Penelope B. Wellington
Bitcoin - In the world of cryptocurrencies Bitcoin reigns supreme
Isla L. Gallagher
The Bitcoin Handbook - Discover the allure of Bitcoin's decentralized power
Xavier I. Kingsley
Understanding Blockchain
Sankar Srinivasan
Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting
Glen D. Singh
Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications
Stian Thorgersen, Pedro Igor Silva
Mastering Microsoft 365 Defender - Implement Microsoft Defender for Endpoint Identity Cloud Apps and Office 365 and respond to threats
Ru Campbell, Viktor Hedberg
Security Orchestration Automation and Response for Security Analysts - Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
Benjamin Kovacevic
Evaluation of Some SMTP Testing Email Verification Header Analysis SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hidaia Mahmood Alassouli
Building a Next-Gen SOC with IBM QRadar - Accelerate your security operations and detect cyber threats effectively
Ashish M Kothekar
Python for Security and Networking - Leverage Python modules and tools in securing your network and applications
José Manuel Ortega
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 - Configure advanced Windows Server services for on-premises hybrid and cloud environments
Chris Gill
Digital Forensics with Kali Linux - Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022x 3rd Edition
Shiva V. N. Parasram
Advanced Network Simulations Simplified - Practical guide for wired Wi-Fi (80211n ac ax) and LTE networks using ns-3
Dr Anil Kumar Rangisetti
Mastering Blockchain - Inner workings of blockchain from cryptography and decentralized identities to DeFi NFTs and Web3
Imran Bashir
Azure Security Cookbook - Practical recipes for securing Azure resources and operations
Steve Miles
Windows Ransomware Detection and Protection - Securing Windows endpoints the cloud and infrastructure using Microsoft Intune Sentinel and Defender
Marius Sandbu
Zed Attack Proxy Cookbook - Hacking tactics techniques and procedures for testing web applications and APIs
Ryan Soper, Nestor N Torres, Ahmed Almoailu