Practical Cybersecurity Architecture - A guide to creating and implementing robust designs for cybersecurity architects
Diana Kelley, Ed Moyle
AZ-104: Azure Administrator Mastery
Rob Botwright
Gray Hat - Vulnerability Scanning & Penetration Testing
Rob Botwright
AlmaLinux 9 Essentials - Learn to Install Administer and Deploy Rocky Linux 9 Systems
Neil Smyth
Cloud-Native Development and Migration to Jakarta EE - Transform your legacy Java EE project into a cloud-native application
Ron Veen, David Vlijmincx
Ethical Hacking Workshop - Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
Rishalin Pillay, Mohammed Abutheraa
Windows 11 for Enterprise Administrators - Unleash the power of Windows 11 with effective techniques and strategies
Steven Miles, Thomas Lee, Richard Diver, Jeff Stokes, Manuel Singer
3 Simple Steps On How to Rank YouTube Videos In 24 Hours for Maximum Exposure - Expert Strategies for Mastering YouTube SEO and Video for Success
Stanley Andrew A.
Malware Analysis - Digital Forensics Cybersecurity And Incident Response
Rob Botwright
Zero Trust Security - Building Cyber Resilience & Robust Security Postures
Rob Botwright
Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques
Muhiballah Mohammed
Burp Suite Cookbook - Web application security made easy with Burp Suite
Dr. Sunny Wear
How To Grow and Explode Your Youtube Channel to Over 37 000 Youtube Subscribers With Brendan Mace’s Youtube Secret Hack - Proven Strategies for Rapid YouTube Channel Growth
J Lawson Anthony
How to Make $2000 in 20 Minutes with Facebook Groups - The Brendan Mace Guide to FB Group Profits
Miller Allen A.
Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO
Sambit Kumar Dash
Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses
Rob Botwright
IT Networking: A Comprehensive Guide
Christopher Ford
The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity
Cesar Bravo, Desilda Toska
Getting Started with Docker
Nigel Poulton
In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch
Mamta Devi
WAN TECHNOLOGY FRAME-RELAY - An Expert's Handbook of Navigating Frame Relay Networks
Mamta Devi
Automotive Cybersecurity Engineering Handbook - The automotive engineer's roadmap to cyber-resilient vehicles
Dr. Ahmad MK Nasser
Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain
Taha Sajid
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
Safeguarding the Digital Fortress: A Guide to Cyber Security
Christopher Ford
Shadows of the Abyss: Unveiling the Dark Web
Christopher Ford
Mastering Linux Administration: A Comprehensive Guide
Christopher Ford
AWS DevOps Simplified - Build a solid foundation in AWS to deliver enterprise-grade software solutions at scale
Akshay Kapoor
Practical Ansible - Learn how to automate infrastructure manage configuration and deploy applications
James Freeman, Fabio Alessandro Locati, Daniel Oh
Designing Hexagonal Architecture with Java - Build maintainable and long-lasting applications with Java and Quarkus
Davi Vieira