Comparison between Internet Fax Services
Dr. Hidaia Mahmood Alassouli
Hacking of Computer Networks - Full Course on Hacking of Computer Networks
Dr. Hidaia Mahmood Alassouli
Some Tutorials in Computer Networking Hacking
Dr. Hidaia Mahmood Alassouli
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap
Travis Deforge
ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills
Clint Bodungen
Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture
Sasha Kranjac, Omar Kudović
Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects
Aspen Olmsted
Mastering Microsoft Intune - Deploy Windows 11 Windows 365 via Microsoft Intune Copilot and advance management via Intune Suite
Christiaan Brinkhoff, Per Larsen
Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape
Harpreet Singh, Himanshu Sharma
AWS Cloud Automation - Harnessing Terraform For AWS Infrastructure As Code
Rob Botwright
Cloud Forensics Demystified - Decoding cloud investigation complexities for digital forensic professionals
Ganesh Ramakrishnan, Mansoor Haqanee
Defending APIs - Uncover advanced defense techniques to craft secure application programming interfaces
Colin Domoney
Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications
Rob Botwright
Azure Penetration Testing - Advanced Strategies For Cloud Security
Rob Botwright
Kubernetes Secrets Handbook - Design implement and maintain production-grade Kubernetes Secrets management solutions
Emmanouil Gkatziouras, Rom Adams, Chen Xi
Mastering Cloud Security Posture Management (CSPM) - Secure multi-cloud infrastructure across AWS Azure and Google Cloud using proven techniques
Qamar Nomani
Oracle Linux Cookbook - Embrace Oracle Linux and master Linux Server Management
Erik Benner, Erik B. Thomsen, Jonathan Spindel
Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security
Jit Sinha
Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
Next-Generation switching OS configuration and management - Troubleshooting NX-OS in Enterprise Environments
Mamta Devi
In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch
Mamta Devi
LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking
Poonam Devi
Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
Dr. Hedaya Alasooly
CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hedaya Alasooly
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi
Basic Setup of FortiMail Mail Server
Dr. Hedaya Alasooly
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Ultimate VMware NSX for Professionals - Leverage Virtualized Networking Security and Advanced Services of VMware NSX for Efficient Data Management and Network Excellence
Vinay Aggarwal