Join us on a literary world trip!
Add this book to bookshelf
Grey

Comparison between Internet Fax Services

Dr. Hidaia Mahmood Alassoulii

Hacking of Computer Networks - Full Course on Hacking of Computer Networks

Dr. Hidaia Mahmood Alassoulii

Some Tutorials in Computer Networking Hacking

Dr. Hidaia Mahmood Alassoulii

Ultimate Pentesting for Web Applications - Unlock Advanced Web App Security Through Penetration Testing Using Burp Suite Zap Proxy Fiddler Charles Proxy and Python for Robust Defense

Dr. Rohit Gautam, Dr. Shifa Cyclewala

OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence

Rob Botwright

Basic Setup of FortiGate Firewall

Dr. Hidaia Mahmood Alassoulii

Network Engineer's Bible - Mastering 100 Protocols For Communication Management And Security

Rob Botwright

The Ultimate Kali Linux Book - Harness Nmap Metaspolit Aircrack-ng and Empire for cutting-edge pentesting

Glen D. Singh

Ultimate Linux Network Security for Enterprises - Master Effective and Advanced Cybersecurity Techniques to Safeguard Linux Networks and Manage Enterprise-Level Network Services

Adarsh Kant

Mastering AWS Security - Strengthen your cloud environment using AWS security features coupled with proven strategies

Laurent Mathieu

Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap

Travis Deforge

Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture

Sasha Kranjac, Omar Kudović

ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen

Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects

Aspen Olmsted

Mastering Microsoft Intune - Deploy Windows 11 Windows 365 via Microsoft Intune Copilot and advance management via Intune Suite

Christiaan Brinkhoff, Per Larsen

Infrastructure Attack Strategies for Ethical Hacking - Unleash Advanced Techniques and Strategies to Safeguard Systems Networks and Critical Infrastructure in the Ethical Hacking Landscape

Harpreet Singh, Himanshu Sharma

AWS Cloud Automation - Harnessing Terraform For AWS Infrastructure As Code

Rob Botwright

Cloud Forensics Demystified - Decoding cloud investigation complexities for digital forensic professionals

Ganesh Ramakrishnan, Mansoor Haqanee

Defending APIs - Uncover advanced defense techniques to craft secure application programming interfaces

Colin Domoney

Edge Computing 101: Novice To Pro - Expert Techniques And Practical Applications

Rob Botwright

Azure Penetration Testing - Advanced Strategies For Cloud Security

Rob Botwright

Kubernetes Secrets Handbook - Design implement and maintain production-grade Kubernetes Secrets management solutions

Emmanouil Gkatziouras, Rom Adams, Chen Xi

Mastering Cloud Security Posture Management (CSPM) - Secure multi-cloud infrastructure across AWS Azure and Google Cloud using proven techniques

Qamar Nomani

Oracle Linux Cookbook - Embrace Oracle Linux and master Linux Server Management

Erik Benner, Erik B. Thomsen, Jonathan Spindel

Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security

Jit Sinha

Next-Generation switching OS configuration and management - Troubleshooting NX-OS in Enterprise Environments

Mamta Devi

Okta Administration Up and Running - Drive operational excellence with IAM solutions for on-premises and cloud apps

HenkJan de Vries, Lovisa Stenbäcken Stjernlöf

In Depth Guide to IS-IS Routing - Learn Intermediate System to Intermediate System Routing from scratch

Mamta Devi

Basic Setup of FortiMail Mail Server

Dr. Hedaya Alasooly

LEARN MPLS FROM SCRATCH PART-B - A Beginners guide to next level of networking

Poonam Devi