Join us on a literary world trip!
Add this book to bookshelf
Grey

End of Abundance in Tech - How IT Leaders Can Find Efficiencies to Drive Business Value

Ben DeBow

Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms

Dr. Hidaia Mahmood Alassouli

Footprinting Reconnaissance Scanning and Enumeration Techniques of Computer Networks

Dr. Hidaia Mahmood Alassouli

Common Windows Linux and Web Server Systems Hacking Techniques

Dr. Hidaia Mahmood Alassouli

Comparison between Internet Fax Services

Dr. Hidaia Mahmood Alassouli

Configuration of Apache Server To Support ASP

Dr. Hidaia Mahmood Alassouli

Starting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus

Dr. Hidaia Mahmood Alassouli

Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection

Dr. Hidaia Mahmood Alassouli

Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services

Dr. Hidaia Mahmood Alassouli

Hacking of Computer Networks - Full Course on Hacking of Computer Networks

Dr. Hidaia Mahmood Alassouli

Creation of Postfix Mail Server Based on Virtual Users and Domains

Dr. Hidaia Mahmood Alassouli

Configuration of a Simple Samba File Server Quota and Schedule Backup

Dr. Hidaia Mahmood Alassouli

Quick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory

Dr. Hidaia Mahmood Alassouli

Creation and Deployment of Smart Contracts on Ethereum Blockchain

Dr. Hidaia Mahmood Alassouli

Some Tutorials in Computer Networking Hacking

Dr. Hidaia Mahmood Alassouli

Customizing and Extending SharePoint Online - Design tailor-made solutions with modern SharePoint features to meet your organization's unique needs

Matti Paukkonen

Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects

Aspen Olmsted

OpenShift Multi-Cluster Management Handbook - Go from architecture to pipelines using GitOps

Giovanni Fontana, Rafael Pecora

Cybersecurity: The Beginner's Guide - A comprehensive guide to getting started in cybersecurity

Dr. Erdal Ozkaya

Mastering Microsoft Intune - Deploy Windows 11 Windows 365 via Microsoft Intune Copilot and advance management via Intune Suite

Christiaan Brinkhoff, Per Larsen

Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape

Harpreet Singh, Himanshu Sharma

System Design Interview: 300 Questions And Answers - Prepare And Pass

Rob Botwright

Linux Kernel Programming - A comprehensive and practical guide to kernel internals writing modules and kernel synchronization

Kaiwan N. Billimoria

Microsoft 365 and SharePoint Online Cookbook - A complete guide to Microsoft Office 365 apps including SharePoint Power Platform Copilot and more

Gaurav Mahajan, Sudeep Ghatak, Nate Chamberlain, Scott Brewster

Edge Computing with Amazon Web Services - A practical guide to architecting secure edge cloud infrastructure with AWS

Sean Howard

Multi-Cloud Handbook for Developers - Learn how to design and manage cloud-native applications in AWS Azure GCP and more

Subash Natarajan, Jeveen Jacob

VMware Cloud on AWS Blueprint - Design automate and migrate VMware workloads on AWS global infrastructure

Oleg Ulyanov, Michael Schwartzman, Harsha Sanku

AWS Cloud Automation - Harnessing Terraform For AWS Infrastructure As Code

Rob Botwright

Password Cracking with Kali Linux - Unlock Windows Security with Kali Linux Expertise

Daniel W. Dieterle

Youtube Secret Hacks - Unlock Your Potential: Master the Art of Video Influence and Skyrocket Your Earnings

Matt Kingsley