Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms
Dr. Hidaia Mahmood Alassouli
Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection
Dr. Hidaia Mahmood Alassouli
Quick Guide for Obtaining Free Remote Desktop Protocol (RDP) Services
Dr. Hidaia Mahmood Alassouli
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape
Harpreet Singh, Himanshu Sharma
Linux Kernel Programming - A comprehensive and practical guide to kernel internals writing modules and kernel synchronization
Kaiwan N. Billimoria
Internet of Things from Scratch - Build IoT solutions for Industry 40 with ESP32 Raspberry Pi and AWS
Renaldi Gondosubroto
Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications
Rob Botwright
In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch
Mamta Devi
REMOTE ACCESS VPN- SSL VPN - A deep dive into SSL VPN from basic
Mamta Devi
WAN TECHNOLOGY FRAME-RELAY - An Expert's Handbook of Navigating Frame Relay Networks
Mamta Devi
Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hedaya Alasooly
Pentesting Active Directory and Windows-based Infrastructure - A comprehensive practical guide to penetration testing Microsoft infrastructure
Denis Isakov
Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers
Rob Botwright
AZ-104: Azure Administrator Mastery
Rob Botwright
Gray Hat - Vulnerability Scanning & Penetration Testing
Rob Botwright
Malware Analysis - Digital Forensics Cybersecurity And Incident Response
Rob Botwright
Zero Trust Security - Building Cyber Resilience & Robust Security Postures
Rob Botwright
Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses
Rob Botwright
IT Networking: A Comprehensive Guide
Christopher Ford
In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch
Mamta Devi
WAN TECHNOLOGY FRAME-RELAY - An Expert's Handbook of Navigating Frame Relay Networks
Mamta Devi
Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain
Taha Sajid
gRPC Go for Professionals - Implement test and deploy production-grade microservices
Clément Jean
Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WP Email Tools - Evaluation of Some SMTP Testing SSL Checkers Email Delivery Email Forwarding and WordPress Email Tools
Dr. Hedaya Alasooly
Building a Next-Gen SOC with IBM QRadar - Accelerate your security operations and detect cyber threats effectively
Ashish M Kothekar
Implementing Multifactor Authentication - Protect your applications from cyberattacks with the help of MFA
Marco Fanti
Mastering Windows Server 2022 - Comprehensive administration of your Windows Server environment
Jordan Krause
Mastering Linux Security and Hardening - A practical guide to protecting your Linux system from cyber attacks
Donald A. Tevault
Implementing Cellular IoT Solutions for Digital Transformation - Successfully develop deploy and maintain LTE and 5G enterprise IoT systems
Dennis McCain, Cameron Coursey