Join us on a literary world trip!
Add this book to bookshelf
Grey

End of Abundance in Tech - How IT Leaders Can Find Efficiencies to Drive Business Value

Ben DeBow

Penetration Testing of Computer Networks Using Burpsuite and Various Penetration Testing Tools

Dr. Hidaia Mahmood Alassouli

Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms

Dr. Hidaia Mahmood Alassouli

Footprinting Reconnaissance Scanning and Enumeration Techniques of Computer Networks

Dr. Hidaia Mahmood Alassouli

Common Windows Linux and Web Server Systems Hacking Techniques

Dr. Hidaia Mahmood Alassouli

Comparison between Internet Fax Services

Dr. Hidaia Mahmood Alassouli

Configuration of Apache Server To Support ASP

Dr. Hidaia Mahmood Alassouli

Starting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus

Dr. Hidaia Mahmood Alassouli

Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection

Dr. Hidaia Mahmood Alassouli

Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services

Dr. Hidaia Mahmood Alassouli

Hacking of Computer Networks - Full Course on Hacking of Computer Networks

Dr. Hidaia Mahmood Alassouli

Configuration of a Simple Samba File Server Quota and Schedule Backup

Dr. Hidaia Mahmood Alassouli

Creation of Postfix Mail Server Based on Virtual Users and Domains

Dr. Hidaia Mahmood Alassouli

Quick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory

Dr. Hidaia Mahmood Alassouli

Creation and Deployment of Smart Contracts on Ethereum Blockchain

Dr. Hidaia Mahmood Alassouli

Some Tutorials in Computer Networking Hacking

Dr. Hidaia Mahmood Alassouli

Operating Systems - Concepts to Save Money Time and Frustration

Jonathan Rigdon

Cryptography - The Art of Secret Keeping in the Digital Age

John Smith

Mastering Windows Server 2022 - Comprehensive administration of your Windows Server environment

Jordan Krause

NGINX HTTP Server - Harness the power of NGINX with a series of detailed tutorials and real-life examples

Clement Nedelcu, Martin Bjerretoft Fjordvald, Gabriel Ouiran

Ultimate Azure IaaS for Infrastructure Management - Unleash Azure’s Compute Storage and Network Components to Architect and Secure Your Cloud Infrastructure

Dean Cefola

Ultimate Microservices with RabbitMQ - Master Microservices Architecture and RabbitMQ Integration to Build Scalable Resilient Systems and to Drive Innovation in Software Development

Peter Morlion

Data Entry - A Guide to Data Entry Operations That Make Money Online

Daniel Shore

Implementing Palo Alto Networks Prisma® Access - Learn real-world network protection

Tom Piens Aka 'Reaper'

Hands-On Ethical Hacking Tactics - Strategies tools and techniques for effective cyber defense

Shane Hartman

Mastering Amazon EC2 - Unravel the complexities of EC2 to build robust and resilient applications

Badri Kesavan

Ultimate Pentesting for Web Applications - Unlock Advanced Web App Security Through Penetration Testing Using Burp Suite Zap Proxy Fiddler Charles Proxy and Python for Robust Defense

Dr. Rohit Gautam, Dr. Shifa Cyclewala

Basic Setup of FortiGate Firewall

Dr. Hidaia Mahmood Alassouli

Network Engineer's Bible - Mastering 100 Protocols For Communication Management And Security

Rob Botwright

The Ultimate Kali Linux Book - Harness Nmap Metaspolit Aircrack-ng and Empire for cutting-edge pentesting

Glen D. Singh