Comparison between Internet Fax Services
Dr. Hidaia Mahmood Alassouli
Hacking of Computer Networks - Full Course on Hacking of Computer Networks
Dr. Hidaia Mahmood Alassouli
Some Tutorials in Computer Networking Hacking
Dr. Hidaia Mahmood Alassouli
Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap
Travis Deforge
Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects
Aspen Olmsted
Mastering Microsoft Intune - Deploy Windows 11 Windows 365 via Microsoft Intune Copilot and advance management via Intune Suite
Christiaan Brinkhoff, Per Larsen
Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape
Harpreet Singh, Himanshu Sharma
AWS Cloud Automation - Harnessing Terraform For AWS Infrastructure As Code
Rob Botwright
Cloud Forensics Demystified - Decoding cloud investigation complexities for digital forensic professionals
Ganesh Ramakrishnan, Mansoor Haqanee
Defending APIs - Uncover advanced defense techniques to craft secure application programming interfaces
Colin Domoney
Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications
Rob Botwright
Mastering Cloud Security Posture Management (CSPM) - Secure multi-cloud infrastructure across AWS Azure and Google Cloud using proven techniques
Qamar Nomani
Azure Penetration Testing - Advanced Strategies For Cloud Security
Rob Botwright
Kubernetes Secrets Handbook - Design implement and maintain production-grade Kubernetes Secrets management solutions
Emmanouil Gkatziouras, Rom Adams, Chen Xi
Oracle Linux Cookbook - Embrace Oracle Linux and master Linux Server Management
Erik Benner, Erik B. Thomsen, Jonathan Spindel
Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security
Jit Sinha
Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch
Mamta Devi
Next-Generation switching OS configuration and management - Troubleshooting NX-OS in Enterprise Environments
Mamta Devi
LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking
Poonam Devi
Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hedaya Alasooly
Basic Setup of FortiMail Mail Server
Dr. Hedaya Alasooly
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
Dr. Hedaya Alasooly
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Ultimate VMware NSX for Professionals - Leverage Virtualized Networking Security and Advanced Services of VMware NSX for Efficient Data Management and Network Excellence
Vinay Aggarwal
Virtualization Power Pack: Novice To Ninja - Mastering VMware Virtualbox Parallels Citrix
Rob Botwright
Pentesting Active Directory and Windows-based Infrastructure - A comprehensive practical guide to penetration testing Microsoft infrastructure
Denis Isakov
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright