The Hacker Crackdown - Law and Disorder on the Electronic Frontier
Bruce Sterling
OSINT 101 Handbook: Expert-Level Intelligence Gathering - Advanced Reconnaissance Threat Assessment And Counterintelligence
Rob Botwright
Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture
Sasha Kranjac, Omar Kudović
Microsoft Unified XDR and SIEM Solution Handbook - Modernize and build a unified SOC platform for future-proof security
Raghu Boddu, Sami Lamppu
Cloud Forensics Demystified - Decoding cloud investigation complexities for digital forensic professionals
Ganesh Ramakrishnan, Mansoor Haqanee
Azure Penetration Testing - Advanced Strategies For Cloud Security
Rob Botwright
TLS Cryptography In-Depth - Explore the intricacies of modern cryptography and the inner workings of TLS
Dr. Paul Duplys, Dr. Roland Schmitz
Ultimate Splunk for Cybersecurity - Practical Strategies for SIEM Using Splunk’s Enterprise Security (ES) for Threat Detection Forensic Investigation and Cloud Security
Jit Sinha
Machine Learning Security with Azure - Best practices for assessing securing and monitoring Azure Machine Learning workloads
Georgia Kalyva
AZURE AZ 500 STUDY GUIDE-1 - Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500
Mamta Devi
CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
CYBER SECURITY HANDBOOK Part-2 - Lock Stock and Cyber: A Comprehensive Security Handbook
Poonam Devi
Penetration Testing Fundamentals-2 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Penetration Testing Fundamentals -1 - Penetration Testing Study Guide To Breaking Into Systems
Devi Prasad
Malware Science - A comprehensive guide to detection analysis and compliance
Shane Molinari
Cloud Penetration Testing for Red Teamers - Learn how to effectively pentest AWS Azure and GCP applications
Kim Crawley
Wireless Security Masterclass - Penetration Testing For Network Defenders And Ethical Hackers
Rob Botwright
Gray Hat - Vulnerability Scanning & Penetration Testing
Rob Botwright
Malware Analysis - Digital Forensics Cybersecurity And Incident Response
Rob Botwright
Zero Trust Security - Building Cyber Resilience & Robust Security Postures
Rob Botwright
Windows Forensics Analyst Field Guide - Engage in proactive cyber defense using digital forensics techniques
Muhiballah Mohammed
Network And Security Fundamentals For Ethical Hackers - Advanced Network Protocols Attacks And Defenses
Rob Botwright
Automotive Cybersecurity Engineering Handbook - The automotive engineer's roadmap to cyber-resilient vehicles
Dr. Ahmad MK Nasser
Ultimate Blockchain Security Handbook - Advanced Cybersecurity Techniques and Strategies for Risk Management Threat Modeling Pen Testing and Smart Contract Defense for Blockchain
Taha Sajid
CYBER SECURITY HANDBOOK Part-1 - Hacking the Hackers: Unraveling the World of Cybersecurity
Poonam Devi
Effective Threat Investigation for SOC Analysts - The ultimate guide to examining various threats and attacker techniques using security logs
Mostafa Yahia
Cloud Security Handbook for Architects - Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps
Ashish Mishra
PowerShell Automation and Scripting for Cybersecurity - Hacking and defense for red and blue teamers
Miriam C. Wiesner
Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications
Stian Thorgersen, Pedro Igor Silva
Mastering Microsoft 365 Defender - Implement Microsoft Defender for Endpoint Identity Cloud Apps and Office 365 and respond to threats
Ru Campbell, Viktor Hedberg