Join us on a literary world trip!
Add this book to bookshelf
Grey

The Hacker Crackdown - Law and Disorder on the Electronic Frontier

Bruce Sterling

Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture

Sasha Kranjac, Omar Kudović

Microsoft Unified XDR and SIEM Solution Handbook - Modernize and build a unified SOC platform for future-proof security

Raghu Boddu, Sami Lamppu

Cloud Forensics Demystified - Decoding cloud investigation complexities for digital forensic professionals

Ganesh Ramakrishnan, Mansoor Haqanee

Azure Penetration Testing - Advanced Strategies For Cloud Security

Rob Botwright

TLS Cryptography In-Depth - Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz

Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security

Jit Sinha

Machine Learning Security with Azure - Best practices for assessing securing and monitoring Azure Machine Learning workloads

Georgia Kalyva

AZURE AZ 500 STUDY GUIDE-1 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500

Mamta Devi

CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity

Poonam Devi

CYBER SECURITY HANDBOOK Part-2 - Lock Stock and Cyber: A Comprehensive Security Handbook

Poonam Devi

Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems

Devi Prasad

Malware Science - A comprehensive guide to detection analysis and compliance

Shane Molinari

Cloud Penetration Testing for Red Teamers - Learn how to effectively pentest AWS Azure and GCP applications

Kim Crawley

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright

Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers

Rob Botwright

Gray Hat - Vulnerability Scanning & Penetration Testing

Rob Botwright

Malware Analysis - Digital Forensics Cybersecurity And Incident Response

Rob Botwright

Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques

Muhiballah Mohammed

Zero Trust Security - Building Cyber Resilience & Robust Security Postures

Rob Botwright

Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses

Rob Botwright

Automotive Cybersecurity Engineering Handbook - The automotive engineer's roadmap to cyber-resilient vehicles

Dr. Ahmad MK Nasser

Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain

Taha Sajid

CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity

Poonam Devi

Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs

Mostafa Yahia

Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps

Ashish Mishra

PowerShell Automation and Scripting for Cybersecurity - Hacking and defense for red and blue teamers

Miriam C. Wiesner

Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications

Stian Thorgersen, Pedro Igor Silva

Mastering Microsoft 365 Defender - Implement Microsoft Defender for Endpoint Identity Cloud Apps and Office 365 and respond to threats

Ru Campbell, Viktor Hedberg