Join us on a literary world trip!
Add this book to bookshelf
Grey

The Hacker Crackdown - Law and Disorder on the Electronic Frontier

Bruce Sterling

Azure Penetration Testing - Advanced Strategies For Cloud Security

Rob Botwright

TLS Cryptography In-Depth - Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz

REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic

Mamta Devi

Implementing DevSecOps Practices - Supercharge your software security with DevSecOps excellence

Vandana Verma Sehgal

AZURE AZ 500 STUDY GUIDE-2 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500

Mamta Devi

Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps

HenkJan de Vries, Lovisa Stenbäcken Stjernlöf

ETHICAL HACKING GUIDE-Part 3 - Comprehensive Guide to Ethical Hacking world

Poonam Devi

Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Malware Science - A comprehensive guide to detection analysis and compliance

Shane Molinari

Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Cloud Penetration Testing for Red Teamers - Learn how to effectively pentest AWS Azure and GCP applications

Kim Crawley

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright

Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers

Rob Botwright

Gray Hat - Vulnerability Scanning & Penetration Testing

Rob Botwright

Information Security Handbook - Enhance your proficiency in information security program development

Darren Death

Malware Analysis - Digital Forensics Cybersecurity And Incident Response

Rob Botwright

Burp Suite Cookbook - Web application security made easy with Burp Suite

Dr. Sunny Wear

Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques

Muhiballah Mohammed

Zero Trust Security - Building Cyber Resilience & Robust Security Postures

Rob Botwright

How To Grow Your Facebook Page Following Fast Like a Pro - The Jono Armstrong's Secrets to Rapid Facebook Page Growth

Miller Allen A.

Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses

Rob Botwright

REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic

Mamta Devi

The Art of Social Engineering - Uncover the secrets behind the human dynamics in cybersecurity

Cesar Bravo, Desilda Toska

ETHICAL HACKING GUIDE-Part 3 - Comprehensive Guide to Ethical Hacking world

Poonam Devi

Attacking and Exploiting Modern Web Applications - Discover the mindset techniques and tools to perform modern web attacks and exploitation

Simone Onofri, Donato Onofri

Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Microsoft 365 Security Compliance and Identity Administration - Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising