Join us on a literary world trip!
Add this book to bookshelf
Grey

End of Abundance in Tech - How IT Leaders Can Find Efficiencies to Drive Business Value

Ben DeBow

Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms

Dr. Hidaia Mahmood Alassouli

Footprinting Reconnaissance Scanning and Enumeration Techniques of Computer Networks

Dr. Hidaia Mahmood Alassouli

Common Windows Linux and Web Server Systems Hacking Techniques

Dr. Hidaia Mahmood Alassouli

Comparison between Internet Fax Services

Dr. Hidaia Mahmood Alassouli

Configuration of Apache Server To Support ASP

Dr. Hidaia Mahmood Alassouli

Starting Guide for Postfix Mail Server Configuration Supporting Anti Spam and Anti Virus

Dr. Hidaia Mahmood Alassouli

Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection

Dr. Hidaia Mahmood Alassouli

Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services

Dr. Hidaia Mahmood Alassouli

Hacking of Computer Networks - Full Course on Hacking of Computer Networks

Dr. Hidaia Mahmood Alassouli

Creation of Postfix Mail Server Based on Virtual Users and Domains

Dr. Hidaia Mahmood Alassouli

Configuration of a Simple Samba File Server Quota and Schedule Backup

Dr. Hidaia Mahmood Alassouli

Quick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory

Dr. Hidaia Mahmood Alassouli

Creation and Deployment of Smart Contracts on Ethereum Blockchain

Dr. Hidaia Mahmood Alassouli

Some Tutorials in Computer Networking Hacking

Dr. Hidaia Mahmood Alassouli

Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape

Harpreet Singh, Himanshu Sharma

System Design Interview: 300 Questions And Answers - Prepare And Pass

Rob Botwright

Linux Kernel Programming - A comprehensive and practical guide to kernel internals writing modules and kernel synchronization

Kaiwan N. Billimoria

Edge Computing with Amazon Web Services - A practical guide to architecting secure edge cloud infrastructure with AWS

Sean Howard

Multi-Cloud Handbook for Developers - Learn how to design and manage cloud-native applications in AWS Azure GCP and more

Subash Natarajan, Jeveen Jacob

Microsoft 365 and SharePoint Online Cookbook - A complete guide to Microsoft Office 365 apps including SharePoint Power Platform Copilot and more

Gaurav Mahajan, Sudeep Ghatak, Nate Chamberlain, Scott Brewster

VMware Cloud on AWS Blueprint - Design automate and migrate VMware workloads on AWS global infrastructure

Oleg Ulyanov, Michael Schwartzman, Harsha Sanku

AWS Cloud Automation - Harnessing Terraform For AWS Infrastructure As Code

Rob Botwright

Password Cracking with Kali Linux - Unlock Windows Security with Kali Linux Expertise

Daniel W. Dieterle

Youtube Secret Hacks - Unlock Your Potential: Master the Art of Video Influence and Skyrocket Your Earnings

Matt Kingsley

Docker: Zero To Hero - Build Test And Deploy Applications Fast

Rob Botwright

Ultimate Docker for Cloud Native Applications - Unleash Docker Ecosystem by Optimizing Image Creation Storage and Networking Management Deployment Strategies to Revolutionize Workflow Scalability and Security

Meysam Azad

Data Warehousing - Optimizing Data Storage And Retrieval For Business Success

Rob Botwright

Asynchronous Programming in Rust - Learn asynchronous programming by building working examples of futures green threads and runtimes

Carl Fredrik Samson

Defending APIs - Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney