End of Abundance in Tech - How IT Leaders Can Find Efficiencies to Drive Business Value
Ben DeBow
Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms
Dr. Hidaia Mahmood Alassouli
Footprinting Reconnaissance Scanning and Enumeration Techniques of Computer Networks
Dr. Hidaia Mahmood Alassouli
Common Windows Linux and Web Server Systems Hacking Techniques
Dr. Hidaia Mahmood Alassouli
Comparison between Internet Fax Services
Dr. Hidaia Mahmood Alassouli
Configuration of Apache Server To Support ASP
Dr. Hidaia Mahmood Alassouli
Starting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus
Dr. Hidaia Mahmood Alassouli
Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection
Dr. Hidaia Mahmood Alassouli
Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services
Dr. Hidaia Mahmood Alassouli
Hacking of Computer Networks - Full Course on Hacking of Computer Networks
Dr. Hidaia Mahmood Alassouli
Configuration of a Simple Samba File Server Quota and Schedule Backup
Dr. Hidaia Mahmood Alassouli
Creation of Postfix Mail Server Based on Virtual Users and Domains
Dr. Hidaia Mahmood Alassouli
Quick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory
Dr. Hidaia Mahmood Alassouli
Creation and Deployment of Smart Contracts on Ethereum Blockchain
Dr. Hidaia Mahmood Alassouli
Some Tutorials in Computer Networking Hacking
Dr. Hidaia Mahmood Alassouli
Ultimate Microservices with Go - Combine the Power of Microservices with Go to Build Highly Scalable Maintainable and Efficient Systems
Nir Shtein
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap
Travis Deforge
Mastering Go - Leverage Go's expertise for advanced utilities empowering you to develop professional software
Mihalis Tsoukalos
Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture
Sasha Kranjac, Omar Kudović
ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills
Clint Bodungen
Mastering Linux Administration - Take your sysadmin skills to the next level by configuring and maintaining Linux systems
Alexandru Calcatinge, Julian Balog
Customizing and Extending SharePoint Online - Design tailor-made solutions with modern SharePoint features to meet your organization's unique needs
Matti Paukkonen
Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects
Aspen Olmsted
Mastering Microsoft Intune - Deploy Windows 11 Windows 365 via Microsoft Intune Copilot and advance management via Intune Suite
Christiaan Brinkhoff, Per Larsen
Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape
Harpreet Singh, Himanshu Sharma
System Design Interview: 300 Questions And Answers - Prepare And Pass
Rob Botwright
Multi-Cloud Handbook for Developers - Learn how to design and manage cloud-native applications in AWS Azure GCP and more
Subash Natarajan, Jeveen Jacob
Microsoft 365 and SharePoint Online Cookbook - A complete guide to Microsoft Office 365 apps including SharePoint Power Platform Copilot and more
Gaurav Mahajan, Sudeep Ghatak, Nate Chamberlain, Scott Brewster
Edge Computing with Amazon Web Services - A practical guide to architecting secure edge cloud infrastructure with AWS
Sean Howard