Join us on a literary world trip!
Add this book to bookshelf
Grey

Practical Cybersecurity Architecture - A guide to creating and implementing robust designs for cybersecurity architects

Diana Kelley, Ed Moyle

AZ-104: Azure Administrator Mastery

Rob Botwright

Gray Hat - Vulnerability Scanning & Penetration Testing

Rob Botwright

AlmaLinux 9 Essentials - Learn to Install Administer and Deploy Rocky Linux 9 Systems

Neil Smyth

Cloud-Native Development and Migration to Jakarta EE - Transform your legacy Java EE project into a cloud-native application

Ron Veen, David Vlijmincx

Ethical Hacking Workshop - Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity

Rishalin Pillay, Mohammed Abutheraa

Windows 11 for Enterprise Administrators - Unleash the power of Windows 11 with effective techniques and strategies

Steven Miles, Thomas Lee, Richard Diver, Jeff Stokes, Manuel Singer

3 Simple Steps On How to Rank YouTube Videos In 24 Hours for Maximum Exposure - Expert Strategies for Mastering YouTube SEO and Video for Success

Stanley Andrew A.

Malware Analysis - Digital Forensics Cybersecurity And Incident Response

Rob Botwright

Zero Trust Security - Building Cyber Resilience & Robust Security Postures

Rob Botwright

Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques

Muhiballah Mohammed

Burp Suite Cookbook - Web application security made easy with Burp Suite

Dr. Sunny Wear

How To Grow and Explode Your Youtube Channel to Over 37 000 Youtube Subscribers With Brendan Mace’s Youtube Secret Hack - Proven Strategies for Rapid YouTube Channel Growth

J Lawson Anthony

How to Make $2000 in 20 Minutes with Facebook Groups - The Brendan Mace Guide to FB Group Profits

Miller Allen A.

Ultimate Web Authentication Handbook - Strengthen Web Security by Leveraging Cryptography and Authentication Protocols such as OAuth SAML and FIDO

Sambit Kumar Dash

Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses

Rob Botwright

IT Networking: A Comprehensive Guide

Christopher Ford

The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity

Cesar Bravo, Desilda Toska

Getting Started with Docker

Nigel Poulton

In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch

Mamta Devi

WAN TECHNOLOGY FRAME-RELAY - An Expert's Handbook of Navigating Frame Relay Networks

Mamta Devi

Automotive Cybersecurity Engineering Handbook - The automotive engineer's roadmap to cyber-resilient vehicles

Dr. Ahmad MK Nasser

Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain

Taha Sajid

LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking

Poonam Devi

Safeguarding the Digital Fortress: A Guide to Cyber Security

Christopher Ford

Shadows of the Abyss: Unveiling the Dark Web

Christopher Ford

Mastering Linux Administration: A Comprehensive Guide

Christopher Ford

AWS DevOps Simplified - Build a solid foundation in AWS to deliver enterprise-grade software solutions at scale

Akshay Kapoor

Practical Ansible - Learn how to automate infrastructure manage configuration and deploy applications

James Freeman, Fabio Alessandro Locati, Daniel Oh

Designing Hexagonal Architecture with Java - Build maintainable and long-lasting applications with Java and Quarkus

Davi Vieira