Join us on a literary world trip!
Add this book to bookshelf
Grey

The Hacker Crackdown - Law and Disorder on the Electronic Frontier

Bruce Sterling

Microsoft Unified XDR and SIEM Solution Handbook - Modernize and build a unified SOC platform for future-proof security

Raghu Boddu, Sami Lamppu

Azure Penetration Testing - Advanced Strategies For Cloud Security

Rob Botwright

TLS Cryptography In-Depth - Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz

Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security

Jit Sinha

Machine Learning Security with Azure - Best practices for assessing securing and monitoring Azure Machine Learning workloads

Georgia Kalyva

AZURE AZ 500 STUDY GUIDE-1 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500

Mamta Devi

CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity

Poonam Devi

CYBER SECURITY HANDBOOK Part-2 - Lock Stock and Cyber: A Comprehensive Security Handbook

Poonam Devi

Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Malware Science - A comprehensive guide to detection analysis and compliance

Shane Molinari

Cloud Penetration Testing for Red Teamers - Learn how to effectively pentest AWS Azure and GCP applications

Kim Crawley

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright

Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers

Rob Botwright

Gray Hat - Vulnerability Scanning & Penetration Testing

Rob Botwright

Malware Analysis - Digital Forensics Cybersecurity And Incident Response

Rob Botwright

Zero Trust Security - Building Cyber Resilience & Robust Security Postures

Rob Botwright

Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques

Muhiballah Mohammed

Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses

Rob Botwright

Automotive Cybersecurity Engineering Handbook - The automotive engineer's roadmap to cyber-resilient vehicles

Dr. Ahmad MK Nasser

Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain

Taha Sajid

CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity

Poonam Devi

Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps

Ashish Mishra

PowerShell Automation and Scripting for Cybersecurity - Hacking and defense for red and blue teamers

Miriam C. Wiesner

Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications

Stian Thorgersen, Pedro Igor Silva

Mastering Microsoft 365 Defender - Implement Microsoft Defender for Endpoint Identity Cloud Apps and Office 365 and respond to threats

Ru Campbell, Viktor Hedberg

Evaluation of Some SMTP Testing Email Verification Header Analysis SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools

Dr. Hidaia Mahmood Alassouli

Python for Security and Networking - Leverage Python modules and tools in securing your network and applications

José Manuel Ortega