Join us on a literary world trip!
Add this book to bookshelf
Grey

Comparison between Internet Fax Services

Dr. Hidaia Mahmood Alassouli

Hacking of Computer Networks - Full Course on Hacking of Computer Networks

Dr. Hidaia Mahmood Alassouli

Some Tutorials in Computer Networking Hacking

Dr. Hidaia Mahmood Alassouli

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright

Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap

Travis Deforge

ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen

Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture

Sasha Kranjac, Omar Kudović

Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects

Aspen Olmsted

Mastering Microsoft Intune - Deploy Windows 11 Windows 365 via Microsoft Intune Copilot and advance management via Intune Suite

Christiaan Brinkhoff, Per Larsen

Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape

Harpreet Singh, Himanshu Sharma

AWS Cloud Automation - Harnessing Terraform For AWS Infrastructure As Code

Rob Botwright

Cloud Forensics Demystified - Decoding cloud investigation complexities for digital forensic professionals

Ganesh Ramakrishnan, Mansoor Haqanee

Defending APIs - Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney

Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications

Rob Botwright

Azure Penetration Testing - Advanced Strategies For Cloud Security

Rob Botwright

Kubernetes Secrets Handbook - Design implement and maintain production-grade Kubernetes Secrets management solutions

Emmanouil Gkatziouras, Rom Adams, Chen Xi

Mastering Cloud Security Posture Management (CSPM) - Secure multi-cloud infrastructure across AWS Azure and Google Cloud using proven techniques

Qamar Nomani

Oracle Linux Cookbook - Embrace Oracle Linux and master Linux Server Management

Erik Benner, Erik B. Thomsen, Jonathan Spindel

Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security

Jit Sinha

Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps

HenkJan de Vries, Lovisa Stenbäcken Stjernlöf

Next-Generation switching OS configuration and management - Troubleshooting NX-OS in Enterprise Environments

Mamta Devi

In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch

Mamta Devi

LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking

Poonam Devi

Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools

Dr. Hedaya Alasooly

CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity

Poonam Devi

Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools

Dr. Hedaya Alasooly

LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking

Poonam Devi

Basic Setup of FortiMail Mail Server

Dr. Hedaya Alasooly

Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Ultimate VMware NSX for Professionals - Leverage Virtualized Networking Security and Advanced Services of VMware NSX for Efficient Data Management and Network Excellence

Vinay Aggarwal