Comparison between Internet Fax Services
Dr. Hidaia Mahmood Alassoulii
Hacking of Computer Networks - Full Course on Hacking of Computer Networks
Dr. Hidaia Mahmood Alassoulii
Some Tutorials in Computer Networking Hacking
Dr. Hidaia Mahmood Alassoulii
Ultimate Pentesting for Web Applications - Unlock Advanced Web App Security Through Penetration Testing Using Burp Suite Zap Proxy Fiddler Charles Proxy and Python for Robust Defense
Dr. Rohit Gautam, Dr. Shifa Cyclewala
Basic Setup of FortiGate Firewall
Dr. Hidaia Mahmood Alassoulii
Network Engineer's Bible - Mastering 100 Protocols For Communication Management And Security
Rob Botwright
Ultimate Linux Network Security for Enterprises - Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services
Adarsh Kant
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Mastering AWS Security - Strengthen your cloud environment using AWS security features coupled with proven strategies
Laurent Mathieu
Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap
Travis Deforge
ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills
Clint Bodungen
Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture
Sasha Kranjac, Omar Kudović
Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects
Aspen Olmsted
Mastering Microsoft Intune - Deploy Windows 11 Windows 365 via Microsoft Intune Copilot and advance management via Intune Suite
Christiaan Brinkhoff, Per Larsen
Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape
Harpreet Singh, Himanshu Sharma
AWS Cloud Automation - Harnessing Terraform For AWS Infrastructure As Code
Rob Botwright
Cloud Forensics Demystified - Decoding cloud investigation complexities for digital forensic professionals
Ganesh Ramakrishnan, Mansoor Haqanee
Defending APIs - Uncover advanced defense techniques to craft secure application programming interfaces
Colin Domoney
Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications
Rob Botwright
Azure Penetration Testing - Advanced Strategies For Cloud Security
Rob Botwright
Mastering Cloud Security Posture Management (CSPM) - Secure multi-cloud infrastructure across AWS Azure and Google Cloud using proven techniques
Qamar Nomani
Kubernetes Secrets Handbook - Design implement and maintain production-grade Kubernetes Secrets management solutions
Emmanouil Gkatziouras, Rom Adams, Chen Xi
Oracle Linux Cookbook - Embrace Oracle Linux and master Linux Server Management
Erik Benner, Erik B. Thomsen, Jonathan Spindel
Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security
Jit Sinha
Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch
Mamta Devi
Next-Generation switching OS configuration and management - Troubleshooting NX-OS in Enterprise Environments
Mamta Devi
Basic Setup of FortiMail Mail Server
Dr. Hedaya Alasooly
Penetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools
Dr. Hedaya Alasooly
LEARN MPLS FROM SCRATCH PART-A - A Beginner's Guide to Next Level of Networking
Poonam Devi