Footprinting Reconnaissance Scanning and Enumeration Techniques of Computer Networks
Dr. Hidaia Mahmood Alassoulii
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Basic Setup of FortiGate Firewall
Dr. Hidaia Mahmood Alassoulii
Network Engineer's Bible - Mastering 100 Protocols For Communication Management And Security
Rob Botwright
Docker: Zero To Hero - Build Test And Deploy Applications Fast
Rob Botwright
Internet of Things from Scratch - Build IoT solutions for Industry 40 with ESP32 Raspberry Pi and AWS
Renaldi Gondosubroto
Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications
Rob Botwright
Network Architect's Handbook - An expert-led journey to building a successful career as a network architect
Alim H. Ali
Hands-on ESP32 with Arduino IDE - Unleash the power of IoT with ESP32 and build exciting projects with this practical guide
Asim Zulfiqar
In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch
Mamta Devi
PaaS IaaS And SaaS: Complete Cloud Infrastructure - Beginner To Expert Guide To Terraform GCE AWS Microsoft Azure Kubernetes And IBM Cloud
Rob Botwright
Virtualization Power Pack: Novice To Ninja - Mastering VMware Virtualbox Parallels Citrix
Rob Botwright
Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers
Rob Botwright
AZ-104: Azure Administrator Mastery
Rob Botwright
Gray Hat - Vulnerability Scanning & Penetration Testing
Rob Botwright
Malware Analysis - Digital Forensics Cybersecurity And Incident Response
Rob Botwright
Zero Trust Security - Building Cyber Resilience & Robust Security Postures
Rob Botwright
Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses
Rob Botwright
IT Networking: A Comprehensive Guide
Christopher Ford
PowerShell Automation and Scripting for Cybersecurity - Hacking and defense for red and blue teamers
Miriam C. Wiesner
Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting
Glen D. Singh
Advanced Network Simulations Simplified - Practical guide for wired Wi-Fi (80211n ac ax) and LTE networks using ns-3
Dr Anil Kumar Rangisetti
Dell VxRail System Design and Best Practices - A complete guide to VxRail appliance design and best practices
Victor Wu
Mastering Azure Security - Keeping your Microsoft Azure workloads safe
Mustafa Toroman, Tom Janetscheck
Zscaler Cloud Security Essentials - Discover how to securely embrace cloud efficiency intelligence and agility with Zscaler
Ravi Devarasetty
Zabbix 5 IT Infrastructure Monitoring Cookbook - Explore the new features of Zabbix 5 for designing building and maintaining your Zabbix setup
Nathan Liefting, Brian van Baekel
Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server
Dr. Hidaia Mahmood Alassoulii
9 Practical Ways of Making Money Online in 24 Hours
Trybet Jakes
Mastering Azure Security - Safeguard your Azure workload with innovative cloud security measures
Mustafa Toroman, Tom Janetscheck
Networking Fundamentals - Develop the networking skills required to pass the Microsoft MTA Networking Fundamentals Exam 98-366
Gordon Davies