The Hacker Crackdown - Law and Disorder on the Electronic Frontier
Bruce Sterling
Network Engineer's Bible - Mastering 100 Protocols For Communication Management And Security
Rob Botwright
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
The OSINT Handbook - A practical guide to gathering and analyzing online information
Dale Meredith
ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills
Clint Bodungen
Azure Penetration Testing - Advanced Strategies For Cloud Security
Rob Botwright
TLS Cryptography In-Depth - Explore the intricacies of modern cryptography and the inner workings of TLS
Dr. Paul Duplys, Dr. Roland Schmitz
AZURE AZ 500 STUDY GUIDE-2 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500
Mamta Devi
Implementing DevSecOps Practices - Supercharge your software security with DevSecOps excellence
Vandana Verma Sehgal
REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic
Mamta Devi
Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
ETHICAL HACKING GUIDE-Part 3 - Comprehensive Guide to Ethical Hacking world
Poonam Devi
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Malware Science - A comprehensive guide to detection analysis and compliance
Shane Molinari
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Cloud Penetration Testing for Red Teamers - Learn how to effectively pentest AWS Azure and GCP applications
Kim Crawley
Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers
Rob Botwright
Gray Hat - Vulnerability Scanning & Penetration Testing
Rob Botwright
Information Security Handbook - Enhance your proficiency in information security program development
Darren Death
Malware Analysis - Digital Forensics Cybersecurity And Incident Response
Rob Botwright
Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques
Muhiballah Mohammed
Burp Suite Cookbook - Web application security made easy with Burp Suite
Dr. Sunny Wear
Zero Trust Security - Building Cyber Resilience & Robust Security Postures
Rob Botwright
How To Grow Your Facebook Page Following Fast Like a Pro - The Jono Armstrong's Secrets to Rapid Facebook Page Growth
Miller Allen A.
Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses
Rob Botwright
REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic
Mamta Devi
The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity
Cesar Bravo, Desilda Toska
ETHICAL HACKING GUIDE-Part 3 - Comprehensive Guide to Ethical Hacking world
Poonam Devi