The Hacker Crackdown - Law and Disorder on the Electronic Frontier
Bruce Sterling
Microsoft Unified XDR and SIEM Solution Handbook - Modernize and build a unified SOC platform for future-proof security
Raghu Boddu, Sami Lamppu
Azure Penetration Testing - Advanced Strategies For Cloud Security
Rob Botwright
TLS Cryptography In-Depth - Explore the intricacies of modern cryptography and the inner workings of TLS
Dr. Paul Duplys, Dr. Roland Schmitz
Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security
Jit Sinha
Machine Learning Security with Azure - Best practices for assessing securing and monitoring Azure Machine Learning workloads
Georgia Kalyva
AZURE AZ 500 STUDY GUIDE-1 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500
Mamta Devi
CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
CYBER SECURITY HANDBOOK Part-2 - Lock Stock and Cyber: A Comprehensive Security Handbook
Poonam Devi
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Malware Science - A comprehensive guide to detection analysis and compliance
Shane Molinari
Cloud Penetration Testing for Red Teamers - Learn how to effectively pentest AWS Azure and GCP applications
Kim Crawley
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers
Rob Botwright
Gray Hat - Vulnerability Scanning & Penetration Testing
Rob Botwright
Malware Analysis - Digital Forensics Cybersecurity And Incident Response
Rob Botwright
Zero Trust Security - Building Cyber Resilience & Robust Security Postures
Rob Botwright
Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques
Muhiballah Mohammed
Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses
Rob Botwright
Automotive Cybersecurity Engineering Handbook - The automotive engineer's roadmap to cyber-resilient vehicles
Dr. Ahmad MK Nasser
Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain
Taha Sajid
CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs
Mostafa Yahia
Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps
Ashish Mishra
PowerShell Automation and Scripting for Cybersecurity - Hacking and defense for red and blue teamers
Miriam C. Wiesner
Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications
Stian Thorgersen, Pedro Igor Silva
Mastering Microsoft 365 Defender - Implement Microsoft Defender for Endpoint Identity Cloud Apps and Office 365 and respond to threats
Ru Campbell, Viktor Hedberg
Evaluation of Some SMTP Testing Email Verification Header Analysis SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hidaia Mahmood Alassouli
Python for Security and Networking - Leverage Python modules and tools in securing your network and applications
José Manuel Ortega