Join us on a literary world trip!
Add this book to bookshelf
Grey

Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms

Dr. Hidaia Mahmood Alassouli

Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection

Dr. Hidaia Mahmood Alassouli

Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services

Dr. Hidaia Mahmood Alassouli

Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape

Harpreet Singh, Himanshu Sharma

Linux Kernel Programming - A comprehensive and practical guide to kernel internals writing modules and kernel synchronization

Kaiwan N. Billimoria

Internet of Things from Scratch - Build IoT solutions for Industry 40 with ESP32 Raspberry Pi and AWS

Renaldi Gondosubroto

Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications

Rob Botwright

REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic

Mamta Devi

In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch

Mamta Devi

WAN TECHNOLOGY FRAME-RELAY - An Expert's Handbook of Navigating Frame Relay Networks

Mamta Devi

Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools

Dr. Hedaya Alasooly

Pentesting Active Directory and Windows-based Infrastructure - A comprehensive practical guide to penetration testing Microsoft infrastructure

Denis Isakov

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright

Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers

Rob Botwright

AZ-104: Azure Administrator Mastery

Rob Botwright

Gray Hat - Vulnerability Scanning & Penetration Testing

Rob Botwright

Malware Analysis - Digital Forensics Cybersecurity And Incident Response

Rob Botwright

Zero Trust Security - Building Cyber Resilience & Robust Security Postures

Rob Botwright

IT Networking: A Comprehensive Guide

Christopher Ford

Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses

Rob Botwright

In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch

Mamta Devi

WAN TECHNOLOGY FRAME-RELAY - An Expert's Handbook of Navigating Frame Relay Networks

Mamta Devi

Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain

Taha Sajid

gRPC Go for Professionals - Implement test and deploy production-grade microservices

Clément Jean

Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools

Dr. Hedaya Alasooly

Implementing Multifactor Authentication - Protect your applications from cyberattacks with the help of MFA

Marco Fanti

Building a Next-Gen SOC with IBM QRadar - Accelerate your security operations and detect cyber threats effectively

Ashish M Kothekar

Mastering Windows Server 2022 - Comprehensive administration of your Windows Server environment

Jordan Krause

Implementing Cellular IoT Solutions for Digital Transformation - Successfully develop deploy and maintain LTE and 5G enterprise IoT systems

Dennis McCain, Cameron Coursey

Demystifying Ansible Automation Platform - A definitive way to manage Ansible Automation Platform and Ansible Tower

Sean Sullivan