Join us on a literary world trip!
Add this book to bookshelf
Grey

Comparison between Internet Fax Services

Dr. Hidaia Mahmood Alassouli

Hacking of Computer Networks - Full Course on Hacking of Computer Networks

Dr. Hidaia Mahmood Alassouli

Some Tutorials in Computer Networking Hacking

Dr. Hidaia Mahmood Alassouli

Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap

Travis Deforge

Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects

Aspen Olmsted

Mastering Microsoft Intune - Deploy Windows 11 Windows 365 via Microsoft Intune Copilot and advance management via Intune Suite

Christiaan Brinkhoff, Per Larsen

Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape

Harpreet Singh, Himanshu Sharma

AWS Cloud Automation - Harnessing Terraform For AWS Infrastructure As Code

Rob Botwright

Cloud Forensics Demystified - Decoding cloud investigation complexities for digital forensic professionals

Ganesh Ramakrishnan, Mansoor Haqanee

Defending APIs - Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney

Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications

Rob Botwright

Mastering Cloud Security Posture Management (CSPM) - Secure multi-cloud infrastructure across AWS Azure and Google Cloud using proven techniques

Qamar Nomani

Azure Penetration Testing - Advanced Strategies For Cloud Security

Rob Botwright

Kubernetes Secrets Handbook - Design implement and maintain production-grade Kubernetes Secrets management solutions

Emmanouil Gkatziouras, Rom Adams, Chen Xi

Oracle Linux Cookbook - Embrace Oracle Linux and master Linux Server Management

Erik Benner, Erik B. Thomsen, Jonathan Spindel

Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security

Jit Sinha

Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps

HenkJan de Vries, Lovisa Stenbäcken Stjernlöf

In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch

Mamta Devi

Next-Generation switching OS configuration and management - Troubleshooting NX-OS in Enterprise Environments

Mamta Devi

LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking

Poonam Devi

Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools

Dr. Hedaya Alasooly

Basic Setup of FortiMail Mail Server

Dr. Hedaya Alasooly

LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking

Poonam Devi

CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity

Poonam Devi

Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools

Dr. Hedaya Alasooly

Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Ultimate VMware NSX for Professionals - Leverage Virtualized Networking Security and Advanced Services of VMware NSX for Efficient Data Management and Network Excellence

Vinay Aggarwal

Virtualization Power Pack: Novice To Ninja - Mastering VMware Virtualbox Parallels Citrix

Rob Botwright

Pentesting Active Directory and Windows-based Infrastructure - A comprehensive practical guide to penetration testing Microsoft infrastructure

Denis Isakov

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright