Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, & Trust)
|
May 06, 2026 |
|
CYBOK: The Cyber Security Body of Knowledge
|
May 05, 2026 |
|
Dark Web Investigation (Security Informatics and Law Enforcement)
|
May 04, 2026 |
|
Persistence in PHP with the Doctrine ORM
|
May 03, 2026 |
|
CISSP All-in-One Exam Guide, Eighth Edition
|
May 02, 2026 |
|
Cyber Security Intelligence and Analytics (Advances in Intelligent Systems and Computing, 928)
|
May 01, 2026 |
|
CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007)
|
Apr 30, 2026 |
|
ITF+ CompTIA IT Fundamentals All-in-One Exam Guide, Second Edition (Exam FC0-U61)
|
Apr 29, 2026 |
|
CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61
|
Apr 28, 2026 |
|
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
|
Apr 27, 2026 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
|
Apr 26, 2026 |
|
CCNA Certification Study Guide: Exam 200-301, Volume 2 (Sybex Study Guide)
|
Apr 25, 2026 |
|
Computer Networks: A Systems Approach (The Morgan Kaufmann Series in Networking)
|
Apr 24, 2026 |
|
Practical Guide to Security in the AWS Cloud
|
Apr 23, 2026 |
|
C++ For Dummies
|
Apr 22, 2026 |
|
Cisco Unified Contact Center Enterprise (Networking Technology: IP Communications)
|
Apr 21, 2026 |
|
5G Mobile and Wireless Communications Technology
|
Apr 20, 2026 |
|
Learn Linux Quickly: A beginner-friendly guide to getting up and running with the world's most powerful operating system
|
Apr 19, 2026 |
|
Cisco Voice Gateways and Gatekeepers (Networking Technology)
|
Apr 18, 2026 |
|
Exam Ref AZ-204 Developing Solutions for Microsoft Azure
|
Apr 17, 2026 |
|
Write Great Code, Volume 3: Engineering Software
|
Apr 16, 2026 |
|
Building Virtual Pentesting Labs for Advanced Penetration Testing
|
Apr 15, 2026 |
|
Building Telegram Bots: Develop Bots in 12 Programming Languages using the Telegram Bot API
|
Apr 14, 2026 |
|
What You Need to Know about Docker: The absolute essentials you need to get Docker up and running
|
Apr 13, 2026 |
|
Build Your Own Website: A Comic Guide to HTML, CSS, and WordPress
|
Apr 12, 2026 |
|
Azure DevOps Explained: Get started with Azure DevOps and develop your DevOps practices
|
Apr 11, 2026 |
|
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
|
Apr 10, 2026 |
|
Bash Cookbook 1st Edition
|
Apr 09, 2026 |
|
bash Cookbook: Solutions and Examples for bash Users 2nd Edition
|
Apr 08, 2026 |
|
Beginning Ethical Hacking with Python
|
Apr 07, 2026 |
|
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
|
Apr 06, 2026 |
|
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
|
Apr 05, 2026 |
|
Autonomic Computing and Networking
|
Apr 04, 2026 |
|
Android Cookbook: Problems and Solutions for Android Developers
|
Apr 03, 2026 |
|
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
|
Apr 02, 2026 |
|
31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam
|
Apr 01, 2026 |
|
31 Days Before Your CCNA Routing & Switching Exam: A Day-by-Day Review Guide for the ICND1/CCent (100-105), ICND2 (200-105)
|
Mar 31, 2026 |
|
Implement NLP use-cases using BERT: Top Expert-Led Coding Interview Question Bank for Python Aspirants
|
Mar 30, 2026 |
|
CompTIA CySA+ Practice Exams: A Time Compressed Resource to Passing the CompTIA CySA+ (CS0-002) Exam on the First Attempt
|
Mar 29, 2026 |
|
Demystifying Azure DevOps Services: A Guide to Architect, Deploy, and Administer DevOps Using Microsoft Azure DevOps Services
|
Mar 28, 2026 |
|
MongoDB Complete Guide: Develop Strong Understanding of Administering MongoDB, CRUD Operations, MongoDB Commands, MongoDB Compass
|
Mar 27, 2026 |
|
Wi-Fi Hacking For Everyone
|
Mar 26, 2026 |
|
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS
|
Mar 25, 2026 |
|
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
|
Mar 24, 2026 |
|
The Book of Batch Scripting: From Fundamentals to Advanced Automation
|
Mar 23, 2026 |
|
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide (Certification Guide)
|
Mar 22, 2026 |
|
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW)
|
Mar 21, 2026 |
|
Computer Security: Principles and Practice
|
Mar 20, 2026 |
|
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
|
Mar 19, 2026 |
|
Cybersecurity for Scada Systems
|
Mar 18, 2026 |
|
Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark
|
Mar 17, 2026 |
|
VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide (VMware Press Certification)
|
Mar 16, 2026 |
|
Practical Purple Teaming: The Art of Collaborative Defense
|
Mar 15, 2026 |
|
AWS Certified Cloud Practitioner CLF-C02 Cert Guide (Certification Guide)
|
Mar 14, 2026 |
|
Linux Bible
|
Mar 13, 2026 |
|
Malware Analysis Using Artificial Intelligence and Deep Learning
|
Mar 12, 2026 |
|
Huntpedia: Your Threat Hunting Knowledge Compendium
|
Mar 11, 2026 |
|
Architecting High-Performance Embedded Systems: Design and build high-performance real-time digital systems based on FPGAs
|
Mar 10, 2026 |
|
Write Great Code, Volume 1, 2nd Edition: Understanding the Machine
|
Mar 09, 2026 |
|
Unity Certified Programmer: Exam Guide: Expert tips and techniques to pass the Unity certification exam at the first attempt
|
Mar 08, 2026 |
|
Practical Microservices with Dapr and .NET: A developer's guide to building cloud-native applications using the Dapr event-driven runtime
|
Mar 07, 2026 |
|
Python Interview Questions: Brush up for your next Python interview with 240+ solutions on most common challenging interview questions
|
Mar 06, 2026 |
|
Social Engineering: The Art of Human Hacking
|
Mar 05, 2026 |
|
Permanent Record
|
Mar 04, 2026 |
|
Operating Systems: Internals and Design Principles
|
Mar 03, 2026 |
|
Okta Administration: Up and Running: Implement enterprise-grade identity and access management for on-premises and cloud apps
|
Mar 02, 2026 |
|
Microsoft Azure Administrator Exam Prep (AZ-104): Make Your Career with Microsoft Azure Platform Using Azure Administered Exam Prep
|
Mar 01, 2026 |
|
Buffer Overflow Attacks: Detect, Exploit, Prevent
|
Feb 28, 2026 |
|
Cisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners
|
Feb 27, 2026 |
|
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
|
Feb 26, 2026 |
|
Terraform Cookbook: Recipes for Codifying Infrastructure
|
Feb 25, 2026 |
|
Ruby Data Structures and Algorithms
|
Feb 24, 2026 |
|
Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing
|
Feb 23, 2026 |
|
Ransomware: Penetration Testing and Contingency Planning (Cyber Shorts)
|
Feb 22, 2026 |
|
Build A SaaS App in Rails 7
|
Feb 21, 2026 |
|
Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects
|
Feb 20, 2026 |
|
Penetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing
|
Feb 19, 2026 |
|
Penetration Testing Step-By-Step Guide
|
Feb 18, 2026 |
|
React in Depth
|
Feb 17, 2026 |
|
Kubernetes for Developers
|
Feb 16, 2026 |
|
Inside Cyber Warfare: Mapping the Cyber Underworld
|
Feb 15, 2026 |
|
Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit
|
Feb 14, 2026 |
|
Component-Based Rails Applications: Large Domains Under Control
|
Feb 13, 2026 |
|
Hacker: Hack The System: The "Ethical" Python Hacking Guide
|
Feb 12, 2026 |
|
Ruby Programming: Building Future-proof Scalable Applications
|
Feb 11, 2026 |
|
Password Cracking with Kali Linux
|
Feb 10, 2026 |
|
Cybersecurity First Principles: A Reboot of Strategy and Tactics
|
Feb 09, 2026 |
|
Computer Science Distilled: Learn the Art of Solving Computational Problems (Code is Awesome)
|
Feb 08, 2026 |
|
Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism
|
Feb 07, 2026 |
|
Cisco CCNA Command Guide For Beginners And Intermediates: A Practical Step By Step Guide to Cisco CCNA Routing And Switching Command Line
|
Feb 06, 2026 |
|
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills
|
Feb 05, 2026 |
|
CCNA Cisco Certified Network Associate Exam (200-301): Technology Workbook with Practice Questions and Labs
|
Feb 04, 2026 |
|
CCNA: 3 in 1: Beginners Guide+ Simple and Effective Strategies+Advanced Method and Strategies to learn Routing and Switching Essentials
|
Feb 03, 2026 |
|
High Performance PostgreSQL for Rails: Reliable, Scalable, Maintainable Database Applications
|
Feb 02, 2026 |
|
Android Application Development Cookbook: Over 100 recipes to help you solve the most common problems faced by Android Developers today
|
Feb 01, 2026 |
|
Prompt Engineering: Empowering Communication
|
Jan 31, 2026 |
|
Programming Ruby 3.3: The Pragmatic Programmers' Guide (Pragmatic Programmers; Facets of Ruby
|
Jan 30, 2026 |
|
Productionizing AI: How to Deliver AI B2B Solutions with Cloud and Python
|
Jan 29, 2026 |
|
Pro Spring Boot 3 with Kotlin: In-Depth Guide to Best Practices for Cloud-Native and Microservices Development
|
Jan 28, 2026 |
|
PowerShell Fast Track: Hacks for Non-Coders
|
Jan 27, 2026 |
|
Software Testing: A Craftsman's Approach
|
Jan 26, 2026 |
|
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
|
Jan 25, 2026 |
|
Android Internals::Power User's View
|
Jan 24, 2026 |
|
5G Mobile Core Network: Design, Deployment, Automation, and Testing Strategies
|
Jan 23, 2026 |
|
5G LTE Narrowband Internet of Things (NB-IoT)
|
Jan 22, 2026 |
|
Windows Terminal Tips, Tricks, and Productivity Hacks: Optimize your command-line usage and development processes with pro-level techniques
|
Jan 21, 2026 |
|
Secrets of Network Cartography: A Comprehensive Guide to Nmap
|
Jan 20, 2026 |
|
Pro Ember Data: Getting Ember Data to Work with Your API
|
Jan 19, 2026 |
|
Practical Web Scraping for Data Science: Best Practices and Examples with Python
|
Jan 18, 2026 |
|
Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices
|
Jan 17, 2026 |
|
Practical LPIC-3 300: Prepare for the Highest Level Professional Linux Certification
|
Jan 16, 2026 |
|
Microsoft Azure Network Security (IT Best Practices - Microsoft Press)
|
Jan 15, 2026 |
|
Mastering Linux Security and Hardening: Protect your Linux systems from intruders, malware attacks, and other cyber threats
|
Jan 14, 2026 |
|
LPIC-1 Linux Professional Institute Certification Study Guide: Exam 101-500 and Exam 102-500
|
Jan 13, 2026 |
|
LPIC-1 Linux Professional Institute Certification Practice Tests: Exam 101-500 and Exam 102-500
|
Jan 12, 2026 |
|
Linux+ and LPIC-1 Guide to Linux Certification, Loose-leaf Version (MindTap Course List)
|
Jan 11, 2026 |
|
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence
|
Jan 10, 2026 |
|
CCNAv7: Introduction to Networks Companion Guide by Cisco
|
Jan 09, 2026 |
|
Introduction to Modern Cryptography: Third Edition (Chapman & Hall/CRC Cryptography and Network Security Series)
|
Jan 08, 2026 |
|
Introduction to Compiler Construction in a Java World
|
Jan 07, 2026 |
|
Hands-On Python Deep Learning for the Web: Integrating neural network architectures to build smart web apps with Flask, Django
|
Jan 06, 2026 |
|
Hacklog Volume 2 Web Hacking: Manuale sulla Sicurezza Informatica e Hacking Etico
|
Jan 05, 2026 |
|
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
|
Jan 04, 2026 |
|
RxJS Cookbook for Reactive Programming: Discover 40+ real-world solutions for building async, event-driven web apps
|
Jan 03, 2026 |
|
React Key Concepts: An in-depth guide to React's core features
|
Jan 02, 2026 |
|
Prompt Engineering for Generative AI
|
Jan 01, 2026 |
|
C++20 Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library
|
Dec 31, 2025 |
|
Building Web Apps with Python and Flask: Learn to Develop and Deploy Responsive RESTful Web Applications Using Flask Framework
|
Dec 30, 2025 |
|
Building Machine Learning Systems Using Python: Practice to Train Predictive Models and Analyze Machine Learning Results with Real Use-Cases
|
Dec 29, 2025 |
|
Building Enterprise Blockchain Solutions on AWS: A Developer's Guide to Build, Deploy, and Managed Apps Using Ethereum, Hyperledger Fabric
|
Dec 28, 2025 |
|
Building Decentralized Blockchain Applications: Learn How to Use Blockchain as the Foundation for Next-Gen Apps
|
Dec 27, 2025 |
|
Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs
|
Dec 26, 2025 |
|
Blockchain in e-Governance: Driving the next Frontier in G2C Services
|
Dec 25, 2025 |
|
Beginning Java MVC 1.0: Model View Controller Development to Build Web, Cloud, and Microservices Applications
|
Dec 24, 2025 |
|
AWS Certified Machine Learning Specialty: MLS-C01 Certification Guide: The definitive guide to passing the MLS-C01 exam on the very first
|
Dec 23, 2025 |
|
The Fast-Track Guide to VXLAN BGP EVPN Fabrics: Implement Today’s Multi-Tenant Software-Defined Networks
|
Dec 22, 2025 |
|
The Pythonic Way: An Architect’s Guide to Conventions and Best Practices for the Design, Development, Testing, and Management of Enterprise
|
Dec 21, 2025 |
|
Traefik API Gateway for Microservices: With Java and Python Microservices Deployed in Kubernetes
|
Dec 20, 2025 |
|
Systems Analysis and Design Global Ed
|
Dec 19, 2025 |
|
Loose Leaf for Systems Analysis and Design
|
Dec 18, 2025 |
|
THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker
|
Dec 17, 2025 |
|
Synchronizing 5G Mobile Networks
|
Dec 16, 2025 |
|
Statistics for Machine Learning: Implement Statistical methods used in Machine Learning using Python
|
Dec 15, 2025 |
|
Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks
|
Dec 14, 2025 |
|
Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
|
Dec 13, 2025 |
|
Securing Social Networks in Cyberspace
|
Dec 12, 2025 |
|
Security for Telecommunications Networks (Advances in Information Security Book 40)
|
Dec 11, 2025 |
|
Enterprise Security Architecture: A Business-Driven Approach
|
Dec 10, 2025 |
|
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
|
Dec 09, 2025 |
|
Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together
|
Dec 08, 2025 |
|
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
|
Dec 07, 2025 |
|
Cracking the Coding Interview: 189 Programming Questions and Solutions
|
Dec 06, 2025 |
|
Computer Networks, Global Edition
|
Dec 05, 2025 |
|
Computer Forensics: Incident Response Essentials
|
Dec 04, 2025 |
|
CompTIA Pentest+ (Practice Exams)
|
Dec 03, 2025 |
|
CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual
|
Dec 02, 2025 |
|
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
|
Dec 01, 2025 |
|
The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)
|
Nov 30, 2025 |
|
The Cybersecurity Manager's Guide: The Art of Building Your Security Program
|
Nov 29, 2025 |
|
Certificate of Cloud Auditing Knowledge Study Guide
|
Nov 28, 2025 |
|
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime
|
Nov 27, 2025 |
|
Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals
|
Nov 26, 2025 |
|
Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator
|
Nov 25, 2025 |
|
Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix
|
Nov 24, 2025 |
|
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
|
Nov 23, 2025 |
|
UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)
|
Nov 22, 2025 |
|
Visual Studio Code for Python Programmers
|
Nov 21, 2025 |
|
Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future
|
Nov 20, 2025 |
|
Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra
|
Nov 19, 2025 |
|
Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes
|
Nov 18, 2025 |
|
Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark
|
Nov 17, 2025 |
|
IBM Watson Solutions for Machine Learning: Achieving Successful Results Across Computer Vision, Natural Language Processing and AI Projects
|
Nov 16, 2025 |
|
Google Analytics Kickstarter Guide: Get Tips to Boost Your Traffic and Sales Using Google Analytics
|
Nov 15, 2025 |
|
Cloud Native Applications with Jakarta EE: Build, Design, and Deploy Cloud-Native Applications and Microservices with Jakarta EE
|
Nov 14, 2025 |
|
Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing
|
Nov 13, 2025 |
|
Linux Device Driver Development: Everything you need to start with device driver development for Linux kernel and embedded Linux
|
Nov 12, 2025 |
|
Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation
|
Nov 11, 2025 |
|
Five Principles for Deploying and Managing Linux in the Cloud
|
Nov 10, 2025 |
|
Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022
|
Nov 09, 2025 |
|
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
|
Nov 08, 2025 |
|
Losing the Cybersecurity War And What We Can Do to Stop It
|
Nov 07, 2025 |
|
Mastering Go: Harness the power of Go to build professional utilities and concurrent servers and services
|
Nov 06, 2025 |
|
MS-900 :Microsoft 365 Fundamentals: Exam Cram Notes
|
Nov 05, 2025 |
|
Navigating the Cybersecurity Career Path
|
Nov 04, 2025 |
|
Red Hat Enterprise Linux 8 Administration: Master Linux administration skills and prepare for the RHCSA certification exam
|
Nov 03, 2025 |
|
Solutions Architect's Handbook: Kick-start your solutions architect career by learning architecture design principles and strategies
|
Nov 02, 2025 |
|
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery)
|
Nov 01, 2025 |
|
Head First Go
|
Oct 31, 2025 |
|
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
|
Oct 30, 2025 |
|
Hands-on Pipeline as YAML with Jenkins: A Beginner's Guide to Implement CI/CD Pipelines for Mobile, Hybrid, and Web Applications
|
Oct 29, 2025 |
|
Hacking with Spring Boot 2.4: Classic Edition
|
Oct 28, 2025 |
|
Guide to Networking Essentials
|
Oct 27, 2025 |
|
From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband
|
Oct 26, 2025 |
|
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders
|
Oct 25, 2025 |
|
Secure Access Service Edge (SASE) For Dummies
|
Oct 24, 2025 |
|
Machine Learning for High-Risk Applications: Approaches to Responsible AI
|
Oct 23, 2025 |
|
Reinventing ITIL in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant
|
Oct 22, 2025 |
|
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect
|
Oct 21, 2025 |
|
Opportunistic Networks: Fundamentals, Applications and Emerging Trends
|
Oct 20, 2025 |
|
Open Source Security: Your Network More Secure With Open Source Tools
|
Oct 19, 2025 |
|
Networks
|
Oct 18, 2025 |
|
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
|
Oct 17, 2025 |
|
Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau
|
Oct 16, 2025 |
|
MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)
|
Oct 15, 2025 |
|
Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Technique
|
Oct 14, 2025 |
|
Mastering Azure Kubernetes Service (AKS): Rapidly Build and Scale Your Containerized Applications with Microsoft Azure Kubernetes Service
|
Oct 13, 2025 |
|
Malware Analysis Using Artificial Intelligence and Deep Learning
|
Oct 12, 2025 |
|
LTE Security (NSN/Nokia Series)
|
Oct 11, 2025 |
|
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
|
Oct 10, 2025 |
|
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
|
Oct 09, 2025 |
|
Linux Yourself
|
Oct 08, 2025 |
|
Linux: Linux Security and Administration
|
Oct 07, 2025 |
|
Java Professional Interview Guide: Learn About Java Interview Questions and Practise Answering About Concurrency, JDBC, Exception Handling
|
Oct 06, 2025 |
|
ITIL 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond
|
Oct 05, 2025 |
|
ISO/IEC 27001:2013 – Mastering Risk Assessment and the Statement of Applicability
|
Oct 04, 2025 |
|
Introduction to Python Network Automation: The First Journey
|
Oct 03, 2025 |
|
Intelligent Reliability Analysis Using MATLAB and AI: Perform Failure Analysis and Reliability Engineering using MATLAB and Artificial Intel
|
Oct 02, 2025 |
|
Implementing VMware Dynamic Environment Manager:: Manage, Administer and Control VMware DEM, Dynamic Desktop, User Policies
|
Oct 01, 2025 |
|
NoOps: How AI Agents Are Reinventing DevOps and Software
|
Sep 30, 2025 |
|
OpenAI API Cookbook: Build intelligent applications including chatbots, virtual assistants, and content generators
|
Sep 30, 2025 |
|
Mastering spaCy: Build structured NLP solutions with custom components and models powered by spacy-llm
|
Sep 29, 2025 |
|
Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR
|
Sep 29, 2025 |
|
Ruby Way, The: Solutions and Techniques in Ruby Programming (Addison-Wesley Professional Ruby Series)
|
Sep 28, 2025 |
|
Mastering C++ Game Animation Programming: Enhance your skills with advanced game animation techniques in C++, OpenGL
|
Sep 28, 2025 |
|
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
|
Sep 27, 2025 |
|
Machine Learning for Tabular Data: XGBoost, Deep Learning, and AI
|
Sep 27, 2025 |
|
Learn Quantum Computing with Python and IBM Quantum: Write your own practical quantum programs with Python
|
Sep 26, 2025 |
|
Learning LangChain: Building AI and LLM Applications with LangChain and LangGraph
|
Sep 26, 2025 |
|
Unity 5.x Shaders and Effects Cookbook
|
Sep 25, 2025 |
|
Integration of Cloud Computing and IoT: Trends, Case Studies and Applications (Emerging Technologies)
|
Sep 25, 2025 |
|
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
|
Sep 24, 2025 |
|
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID
|
Sep 24, 2025 |
|
The Developer's Playbook for Large Language Model Security: Building Secure AI Applications
|
Sep 23, 2025 |
|
TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY (Bitcoins, Hacking, Kali Linux)
|
Sep 23, 2025 |
|
Speed Up Your Python with Rust: Optimize Python performance by creating Python pip modules in Rust with PyO3
|
Sep 22, 2025 |
|
Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
|
Sep 22, 2025 |
|
Microsoft Exam MD-100 Windows 10 Certification Guide: Learn the skills required to become a Microsoft Certified Modern Desktop Administrator
|
Sep 21, 2025 |
|
PASS the CompTIA Network+ Exam N10-007
|
Sep 21, 2025 |
|
Azure OpenAI Essentials: A practical guide to unlocking generative AI-powered innovation with Azure OpenAI
|
Sep 20, 2025 |
|
Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture
|
Sep 20, 2025 |
|
Cisco ThousandEyes: Digital Experience Monitoring and Troubleshooting (Networking Technology)
|
Sep 19, 2025 |
|
CompTIA A+ Complete Practice Tests: Core 1 Exam 220-1201 and Core 2 Exam 220-1202 (Sybex Study Guide)
|
Sep 19, 2025 |
|
Certified Kubernetes Administrator Study Companion : Preparing for the Linux Foundation's CKA Exam
|
Sep 18, 2025 |
|
Exploring Azure Container Apps: Scaling Modern and Cloud-Native Apps and Microservices
|
Sep 18, 2025 |
|
Azure for Developers: The definitive guide to creating secure, scalable Azure apps with GenAI, serverless, and DevOps pipelines
|
Sep 17, 2025 |
|
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
|
Sep 17, 2025 |
|
Vibe Coding: The Future of Programming
|
Sep 16, 2025 |
|
Predictive Analytics with SAS and R
|
Sep 16, 2025 |
|
Quantum Programming in Depth: Solving problems with Q# and Qiskit
|
Sep 15, 2025 |
|
MCA Modern Desktop Administrator Complete Study Guide: Exam MD-100 and Exam MD-101
|
Sep 15, 2025 |
|
Learn Functional Programming with Elixir: New Foundations for a New World (The Pragmatic Programmers)
|
Sep 14, 2025 |
|
Ultimate Machine Learning with ML.NET: Build, Optimize, and Deploy Powerful Machine Learning Models for Data-Driven Insights with ML.NET
|
Sep 14, 2025 |
|
The Design of Web APIs, Second Edition
|
Sep 13, 2025 |
|
The Art of AI Product Development: Delivering business value
|
Sep 13, 2025 |
|
Practical Object-Oriented Design: An Agile Primer Using Ruby
|
Sep 12, 2025 |
|
Encyclopedia of Criminal Activities and the Deep Web
|
Sep 12, 2025 |
|
Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line
|
Sep 11, 2025 |
|
Digital Forensics with Kali Linux: Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
|
Sep 11, 2025 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
|
Sep 10, 2025 |
|
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
|
Sep 10, 2025 |
|
Complete A+ Guide to IT Hardware and Software Lab Manual: A CompTIA A+ Core 1 (220-1001) & CompTIA A+ Core 2 (220-1002) Lab Manual
|
Sep 09, 2025 |
|
Computer Science Distilled: Learn the Art of Solving Computational Problems (Code is Awesome)
|
Sep 09, 2025 |
|
Understanding Cisco Networking Technologies, Volume 1: Exam 200-301 (CCNA Certification, 1)
|
Sep 08, 2025 |
|
CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide
|
Sep 08, 2025 |
|
Windows Server 2025 Administration Fundamentals: A beginner's guide to managing and administering Windows Server environments
|
Sep 07, 2025 |
|
Zabbix 7 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 7 for designing, building, and maintaining your Zabbix
|
Sep 07, 2025 |
|
Building an Effective Security Program
|
Sep 06, 2025 |
|
Wi-Fi 7 In Depth: Your guide to mastering Wi-Fi 7, the 802.11be protocol, and their deployment
|
Sep 06, 2025 |
|
Azure Strategy and Implementation Guide: The essential handbook to cloud transformation with Azure
|
Sep 05, 2025 |
|
Blockchain Enabled Applications: Understand the Blockchain Ecosystem and How to Make it Work for You
|
Sep 05, 2025 |
|
Authentication and Access Control: Practical Cryptography Methods and Tools
|
Sep 04, 2025 |
|
AWS Certified Advanced Networking - Specialty Exam Guide: Build your knowledge and technical expertise as an AWS-certified networking
|
Sep 04, 2025 |
|
Vulkan 3D Graphics Rendering Cookbook: Implement expert-level techniques for high-performance graphics with Vulkan
|
Sep 03, 2025 |
|
Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud
|
Sep 03, 2025 |
|
The Ghidra Book: The Definitive Guide
|
Sep 02, 2025 |
|
The Ultimate iOS Interview Playbook: Conquer Swift, frameworks, design patterns, and app architecture for your dream job
|
Sep 02, 2025 |
|
Red Hat Certified Engineer (RHCE) Ansible Automation Study Guide: In-Depth Guidance and Practice
|
Sep 01, 2025 |
|
systemd for Linux SysAdmins: All You Need to Know About the systemd Suite for Linux Users
|
Sep 01, 2025 |
|
Advanced Front-End Development: Building Scalable and High-Performance Web Applications with React
|
Aug 31, 2025 |
|
Alice and Bob Learn Secure Coding
|
Aug 31, 2025 |
|
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
|
Aug 30, 2025 |
|
Zero Trust in Resilient Cloud and Network Architectures (Networking Technology)
|
Aug 30, 2025 |
|
Wireless Hacking with Kali Linux: LEARN FAST HOW TO HACK ANY WIRELESS NETWORKS PENETRATION TESTING IMPLEMENTATION GUIDE
|
Aug 29, 2025 |
|
Wireless Communication in Underground Mines: RFID-based Sensor Networking
|
Aug 29, 2025 |
|
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
|
Aug 28, 2025 |
|
Windows Virus and Malware Troubleshooting (Windows Troubleshooting)
|
Aug 28, 2025 |
|
Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started
|
Aug 27, 2025 |
|
Unity Shaders and Effects Cookbook
|
Aug 27, 2025 |
|
Effective Conversational AI: Chatbots that work
|
Aug 26, 2025 |
|
Generative AI with Python and PyTorch: Navigating the AI frontier with LLMs, Stable Diffusion, and next-gen AI applications
|
Aug 26, 2025 |
|
File System Forensics
|
Aug 25, 2025 |
|
CLI Reference: FortiOS 7.4.0
|
Aug 25, 2025 |
|
Designing Websites with Publii and GitHub Pages
|
Aug 24, 2025 |
|
CCNP Enterprise Design ENSLD 300-420 Official Cert Guide
|
Aug 24, 2025 |
|
Design For Developers
|
Aug 23, 2025 |
|
Designing Large Language Model Applications: A Holistic Approach to LLMs
|
Aug 23, 2025 |
|
Data Analysis with LLMs: Text, tables, images and sound
|
Aug 22, 2025 |
|
Data Structures in Depth Using C++: A Comprehensive Guide to Data Structure Implementation and Optimization in C++
|
Aug 22, 2025 |
|
Computer Networking Bible: Your Complete Guide to Mastering Network Fundamentals, Enhancing Security, and Designing Scalable Networks
|
Aug 21, 2025 |
|
Data Science Foundations: Navigating digital insight
|
Aug 21, 2025 |
|
CISCO CCNA 200-301 Exam Prep
|
Aug 20, 2025 |
|
Coding with AI For Dummies (For Dummies: Learning Made Easy)
|
Aug 20, 2025 |
|
C++ Memory Management: Write leaner and safer C++ code using proven memory-management techniques
|
Aug 19, 2025 |
|
Cisco CCNA in 60 Days
|
Aug 19, 2025 |
|
Building Scalable Deep Learning Pipelines on AWS: Develop, Train, and Deploy Deep Learning Models
|
Aug 18, 2025 |
|
Building Quantum Software in Python: A developer's guide
|
Aug 18, 2025 |
|
pache Kafka in Action: From basics to production
|
Aug 17, 2025 |
|
Building CLI Applications with C# and .NET: A step-by-step guide to developing cross-platform CLI apps—from coding and testing to deployment
|
Aug 17, 2025 |
|
Azure Bicep QuickStart Pro: From JSON and ARM Templates to Advanced Deployment Techniques, CI/CD Integration, and Environment Management
|
Aug 16, 2025 |
|
Building Agentic AI Systems: Create intelligent, autonomous AI agents that can reason, plan, and adapt
|
Aug 16, 2025 |
|
AWS Certified Advanced Networking – Specialty (ANS-C01) Certification Guide: A pragmatic guide to acing the AWS ANS-C01 exam
|
Aug 15, 2025 |
|
Artificial Intelligence for Learning: Using AI and Generative AI to Support Learner Development
|
Aug 15, 2025 |
|
Argo CD: Up and Running: A Hands-On Guide to GitOps and Kubernetes
|
Aug 14, 2025 |
|
Learn Ansible
|
Aug 14, 2025 |
|
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
|
Aug 13, 2025 |
|
Tor and The Dark Net: Remain Anonymous and Evade NSA Spying
|
Aug 13, 2025 |
|
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
|
Aug 12, 2025 |
|
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
|
Aug 12, 2025 |
|
RFID Toys: Cool Projects for Home, Office and Entertainment (ExtremeTech)
|
Aug 11, 2025 |
|
The Hardware Hacker: Adventures in Making and Breaking Hardware
|
Aug 11, 2025 |
|
RFID Strategic Implementation and ROI: A Practical Roadmap to Success
|
Aug 10, 2025 |
|
The Statistics and Calculus with Python Workshop: A comprehensive introduction to mathematics in Python for artificial intelligence
|
Aug 10, 2025 |
|
RFID Security: Techniques, Protocols and System-On-Chip Design
|
Aug 09, 2025 |
|
The Secret Life of Programs: Understand Computers -- Craft Better Code
|
Aug 09, 2025 |
|
RFID Security and Privacy: Concepts, Protocols, and Architectures
|
Aug 08, 2025 |
|
Kotlin: The Ultimate Beginner's Guide to Learn kotlin Programming
|
Aug 08, 2025 |
|
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations (Wireless Networks and Mobile Communications)
|
Aug 07, 2025 |
|
The Full Stack Developer: Your Essential Guide to the Everyday Skills Expected of a Modern Full Stack Web Developer
|
Aug 07, 2025 |
|
Python for Teenagers: Learn to Program like a Superhero
|
Aug 06, 2025 |
|
RFID Technology and Applications
|
Aug 06, 2025 |
|
RFID Systems: Research Trends and Challenges
|
Aug 05, 2025 |
|
Python: Academy - The Stress Free Way To Learning Python Inside & Out - Beginner
|
Aug 05, 2025 |
|
RFID at Ultra and Super High Frequencies: Theory and application
|
Aug 04, 2025 |
|
Python 3 Web Development Beginner's Guide
|
Aug 04, 2025 |
|
The complete Python & C++ Manual
|
Aug 03, 2025 |
|
RFID in Logistics: A Practical Introduction
|
Aug 03, 2025 |
|
Python: Tricks and Tips
|
Aug 02, 2025 |
|
The Dark Web: Breakthroughs in Research and Practice (Critical Explorations)
|
Aug 02, 2025 |
|
Social Engineering: The Art of Psychological Warfare, Human Hacking, Persuasion & Deception
|
Aug 01, 2025 |
|
Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID
|
Aug 01, 2025 |
|
Security and Privacy in Wireless and Mobile Networks
|
Jul 31, 2025 |
|
Security Issues and Privacy Concerns in Industry 4.0 Applications
|
Jul 31, 2025 |
|
Security in RFID and Sensor Networks
|
Jul 31, 2025 |
|
RFID-Enabled Sensor Design and Applications (Artech House Integrated Microsystems)
|
Jul 30, 2025 |
|
GREY HAT HACKER: THE PLAYBOOK OF A GENIUS
|
Jul 30, 2025 |
|
Python: The Complete Guide
|
Jul 29, 2025 |
|
The Essential Guide to HTML5: Using Games to Learn HTML5 and JavaScript
|
Jul 29, 2025 |
|
Learning Web Design: A Beginner's Guide to HTML, CSS, JavaScript, and Web Graphics
|
Jul 28, 2025 |
|
Learning Vue.js 2: Learn how to build amazing and complex reactive web applications easily with Vue.js
|
Jul 28, 2025 |
|
Network Basics for Hackers: How Networks Work and How They Break
|
Jul 27, 2025 |
|
Natural Language Processing with Java: Techniques for building machine learning and neural network models for NLP, 2nd Edition
|
Jul 27, 2025 |
|
Network Scanning Cookbook: Practical network security using Nmap and Nessus 7
|
Jul 26, 2025 |
|
Kali Linux: Advanced Methods and Strategies to Learn Kali Linux
|
Jul 26, 2025 |
|
Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure
|
Jul 25, 2025 |
|
Neural Network Programming with Java: Create and unleash the power of neural networks by implementing professional Java code
|
Jul 24, 2025 |
|
Neural Networks and Deep Learning: A Textbook
|
Jul 24, 2025 |
|
PostgreSQL Server Programming
|
Jul 23, 2025 |
|
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
|
Jul 23, 2025 |
|
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
|
Jul 22, 2025 |
|
Python Data Science: The Ultimate Crash Course, Tips, and Tricks to Learn Data Analytics, Machine Learning, and Their Application
|
Jul 22, 2025 |
|
Learning Robotics using Python: Design, simulate, program, and prototype an autonomous mobile robot using ROS, OpenCV, PCL, and Python
|
Jul 21, 2025 |
|
Python Data Cleaning Cookbook: Modern techniques and Python tools to detect and remove dirty data and extract key insights
|
Jul 21, 2025 |
|
How to Hack Like a Ghost: Breaching the Cloud
|
Jul 20, 2025 |
|
Intrusion Detection Guide
|
Jul 20, 2025 |
|
Head First Learn to Code: A Learner's Guide to Coding and Computational Thinking
|
Jul 19, 2025 |
|
Hands-On Neural Networks with TensorFlow 2.0: Understand TensorFlow, from static graph to eager execution, and design neural networks
|
Jul 19, 2025 |
|
Hands-On Neuroevolution with Python: Build high-performing artificial neural network architectures using neuroevolution-based algorithms
|
Jul 18, 2025 |
|
Hands-On Deep Learning with R: A practical guide to designing, building, and improving neural network models using R
|
Jul 18, 2025 |
|
Hacking with Kali Linux: A Guide to Ethical Hacking: A Beginner's Guide with Practical Examples to Test Infrastructure Security with Kali
|
Jul 17, 2025 |
|
Hacking: The Unlocking of Transparency
|
Jul 17, 2025 |
|
Hacking : The Ultimate Hacking for Beginners : How to Hack : Hacking Intelligence : Certified Hacking Book
|
Jul 16, 2025 |
|
Hacking Exposed Computer Forensics
|
Jul 16, 2025 |
|
Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists
|
Jul 15, 2025 |
|
Hacking (Compact Research: The Internet)
|
Jul 15, 2025 |
|
Hacking: Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing
|
Jul 14, 2025 |
|
Hack Attacks Testing: How to Conduct Your Own Security Audit
|
Jul 14, 2025 |
|
Game Theory and Machine Learning for Cyber Security
|
Jul 13, 2025 |
|
Fundamentals of Quantum Computing: Theory and Practice
|
Jul 13, 2025 |
|
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
|
Jul 12, 2025 |
|
Foundations of Information Security: A Straightforward Introduction
|
Jul 12, 2025 |
|
Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro
|
Jul 11, 2025 |
|
Ethical Hacking and Penetration Testing Guide
|
Jul 11, 2025 |
|
Ethical Hacking: A Hands-on Introduction to Breaking In
|
Jul 10, 2025 |
|
Head First HTML and CSS: A Learner's Guide to Creating Standards-Based Web Pages
|
Jul 10, 2025 |
|
Effective Cybersecurity: A Guide to Using Best Practices and Standards
|
Jul 09, 2025 |
|
Easily: Practical Machine Learning Algorithms with Python
|
Jul 09, 2025 |
|
Drone Technology in Architecture, Engineering and Construction: A Strategic Guide to Unmanned Aerial Vehicle Operation and Implementation
|
Jul 08, 2025 |
|
Doing Data Science: Straight Talk from the Frontline
|
Jul 08, 2025 |
|
Distributed Denial of Service Attacks: Real-world Detection and Mitigation
|
Jul 07, 2025 |
|
Distributed Artificial Intelligence: A Modern Approach (Internet of Everything (IoE))
|
Jul 07, 2025 |
|
Deep Reinforcement Learning with Python: Master classic RL, deep RL, distributional RL, inverse RL, and more with OpenAI Gym and TensorFlow
|
Jul 06, 2025 |
|
Deep Learning with PyTorch 1.x: Implement deep learning techniques and neural network architecture variants using Python
|
Jul 06, 2025 |
|
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
|
Jul 05, 2025 |
|
Cyber-Security Threats, Actors, and Dynamic Mitigation
|
Jul 05, 2025 |
|
Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques
|
Jul 04, 2025 |
|
Cyber Security: Threats and Responses for Government and Business
|
Jul 04, 2025 |
|
Cyber Security: The CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief Information Security
|
Jul 03, 2025 |
|
Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices)
|
Jul 03, 2025 |
|
Cyber Victimology: Decoding Cyber-Crime Victimisation
|
Jul 02, 2025 |
|
Cyber Arms
|
Jul 02, 2025 |
|
Create Graphical User Interfaces with Python: How to build windows, buttons, and widgets for your Python projects
|
Jul 01, 2025 |
|
C++ Primer (5th Edition)
|
Jul 01, 2025 |
|
Computer Networking: A Top-Down Approach
|
Jun 30, 2025 |
|
Classic Computer Science Problems in Python
|
Jun 30, 2025 |
|
Building Computer Vision Applications Using Artificial Neural Networks: With Step-by-Step Examples in OpenCV and TensorFlow with Python
|
Jun 29, 2025 |
|
Building Android Apps in Python Using Kivy with Android Studio: With Pyjnius, Plyer, and Buildozer
|
Jun 29, 2025 |
|
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
|
Jun 28, 2025 |
|
The Little Black Book of Computer Viruses: The Basic Technology
|
Jun 28, 2025 |
|
Beginning Sensor Networks with XBee, Raspberry Pi, and Arduino: Sensing the World with Python and MicroPython
|
Jun 27, 2025 |
|
Beginning Programming With Python For Dummies, 2Ed
|
Jun 27, 2025 |
|
BackTrack 5 Wireless Penetration Testing Beginner's Guide
|
Jun 26, 2025 |
|
Azure Databricks Cookbook: Accelerate and scale real-time analytics solutions using the Apache Spark-based analytics service
|
Jun 26, 2025 |
|
Automate it
|
Jun 23, 2025 |
|
Asterisk Hacking
|
Jun 23, 2025 |
|
Artificial Intelligence With Python
|
Jun 23, 2025 |
|
Artificial Intelligence in Finance: A Python-Based Guide
|
Jun 23, 2025 |
|
Artificial Intelligence for .NET: Speech, Language, and Search: Building Smart Applications with Microsoft Cognitive Services APIs
|
Jun 21, 2025 |
|
Arduino Workshop: A Hands-On Introduction with 65 Projects
|
Jun 21, 2025 |
|
Arduino programming: the ultimate beginner's guide to learn Arduino programming step by step
|
Jun 20, 2025 |
|
Arduino Cookbook: Recipes to Begin, Expand, and Enhance Your Projects
|
Jun 20, 2025 |
|
Approach To Real World Hacking
|
Jun 19, 2025 |
|
Applied Deep Learning: A Case-Based Approach to Understanding Deep Neural Networks
|
Jun 19, 2025 |
|
Hacking With Experts
|
Jun 18, 2025 |
|
AngularJS Web Application Development Cookbook
|
Jun 18, 2025 |
|
Android Notes for Professionals
|
Jun 17, 2025 |
|
Android Design Patterns and Best Practice
|
Jun 17, 2025 |
|
AI Crash Course: A fun and hands-on introduction to machine learning, reinforcement learning, deep learning, and artificial intelligence
|
Jun 16, 2025 |
|
AI and Machine Learning for Coders: A Programmer's Guide to Artificial Intelligence
|
Jun 16, 2025 |
|
AI for Games
|
Jun 15, 2025 |
|
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
|
Jun 15, 2025 |
|
Advanced Smart Computing Technologies in Cybersecurity and Forensics
|
Jun 14, 2025 |
|
Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website
|
Jun 14, 2025 |
|
Absolute Beginner's Guide to Minecraft Mods Programming
|
Jun 14, 2025 |
|
A Beginner’s Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals
|
Jun 14, 2025 |
|
501 Web Site Secrets: Unleash the Power of Google, Amazon, eBay and More
|
Jun 12, 2025 |
|
3D Printing Blueprints
|
Jun 12, 2025 |
|
Voice Application Development for Android
|
Jun 11, 2025 |
|
Unity Game Development Scripting
|
Jun 11, 2025 |
|
Oracle Database 11gR2 Performance Tuning Cookbook
|
Jun 10, 2025 |
|
Linux Mint Essentials: A Practical Guide to Linux Mint for the Novice to the Professional
|
Jun 10, 2025 |
|
Learning Numpy Array
|
Jun 10, 2025 |
|
Instant PHP Web Scraping
|
Jun 10, 2025 |
|
GLSL Essentials
|
Jun 08, 2025 |
|
Getting Started With Electronic Projects
|
Jun 08, 2025 |
|
Force.com Development Blueprints
|
Jun 07, 2025 |
|
A Beginners Guide to Python 3 Programming
|
Jun 07, 2025 |
|
Asynchronous Android: Harness the Power of Multi-Core Mobile Processors to Build Responsive Android Applications
|
Jun 05, 2025 |
|
Python for Civil and Structural Engineers
|
Jun 05, 2025 |
|
Artificial Intelligence For Dummies
|
Jun 04, 2025 |
|
Optimizing Processes with RFID and Auto ID: Fundamentals, Problems and Solutions, Example Applications
|
Jun 04, 2025 |
|
Python GUI Programming Cookbook: Use recipes to develop responsive and powerful GUIs using Tkinter
|
Jun 03, 2025 |
|
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
|
Jun 03, 2025 |
|
CentOS 6 Linux Server Cookbook: A Practical Guide to Installing, Configuring, and Administering the Centos Community-based Enterprise Server
|
Jun 02, 2025 |
|
Auto-identification and Ubiquitous Computing Applications: Rfid and Smart Technologies for Information Convergence
|
Jun 02, 2025 |
|
Analog Circuit Design: Robust Design, Sigma Delta Converters, RFID
|
Jun 01, 2025 |
|
Head First JavaScript Programming: A Learner's Guide to Modern JavaScript
|
Jun 01, 2025 |
|
The Art of Network Penetration Testing: How to take over any company in the world
|
May 31, 2025 |
|
Pro RFID in BizTalk Server 2009 (Expert's Voice in BizTalk)
|
May 31, 2025 |
|
Radio Frequency Integrated Circuit Design (Artech House Microwave Library
|
May 30, 2025 |
|
The Art of Mac Malware, Volume 2: Detecting Malicious Software
|
May 30, 2025 |
|
Radio Frequency Identification Technologies
|
May 29, 2025 |
|
CompTIA Security+ Guide to Network Security Fundamentals
|
May 29, 2025 |
|
Radio Frequency Integrated Circuits and Technologies
|
May 28, 2025 |
|
RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200)
|
May 28, 2025 |
|
Handbook of Smart Antennas for RFID Systems
|
May 27, 2025 |
|
Professional C++ (Tech Today)
|
May 27, 2025 |
|
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
|
May 26, 2025 |
|
Darknet Master: Tor and Deep Web Secrets
|
May 26, 2025 |
|
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more
|
May 25, 2025 |
|
Cryptography and Network Security: Principles and Practice, Global Ed
|
May 25, 2025 |
|
Cryptography: Algorithms, Protocols, and Standards for Computer Security
|
May 24, 2025 |
|
Writing a C Compiler: Build a Real Programming Language from Scratch
|
May 24, 2025 |
|
Windows 10 System Programming, Part 2
|
May 23, 2025 |
|
Windows 10 System Programming, Part 1
|
May 23, 2025 |
|
Windows APT Warfare: Identify and prevent Windows APT attacks effectively
|
May 22, 2025 |
|
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
|
May 22, 2025 |
|
JavaScript for Sound Artists
|
May 21, 2025 |
|
Building Your Own JavaScript Framework: Architect extensible and reusable framework systems
|
May 21, 2025 |
|
Visual Threat Intelligence: An Illustrated Guide For Threat Researchers
|
May 20, 2025 |
|
12 Twisted Python Projects for Young Coders
|
May 20, 2025 |
|
Think Like a Software Engineering Manager
|
May 19, 2025 |
|
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
|
May 19, 2025 |
|
The Android Malware Handbook: Detection and Analysis by Human and Machine
|
May 19, 2025 |
|
Software Engineering for Games in Serious Contexts: Theories, Methods, Tools, and Experiences
|
May 19, 2025 |
|
Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR
|
May 17, 2025 |
|
Security Testing with Raspberry Pi
|
May 17, 2025 |
|
Securing Cloud Applications
|
May 16, 2025 |
|
Quick JavaScript (Quick Programming)
|
May 16, 2025 |
|
Python Image Processing Cookbook: Over 60 recipes to help you perform complex image processing and computer vision tasks with ease
|
May 16, 2025 |
|
Python for Scientists
|
May 16, 2025 |
|
Practitioner’s Guide to Data Science (Chapman & Hall/CRC Data Science Series)
|
May 15, 2025 |
|
Practical Python Data Visualization: A Fast Track Approach To Learning Data Visualization With Python
|
May 15, 2025 |
|
Practical Julia: A Hands-On Introduction for Scientific Minds
|
May 14, 2025 |
|
Practical Ansible: Learn how to automate infrastructure, manage configuration, and deploy applications
|
May 14, 2025 |
|
Offensive Countermeasures: The Art of Active Defense
|
May 12, 2025 |
|
Microsoft Defender for Cloud
|
May 12, 2025 |
|
Professional JavaScript for Web Developers
|
May 11, 2025 |
|
Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks
|
May 11, 2025 |
|
Mastering Python Networking: Utilize Python packages and frameworks for network automation, monitoring, cloud, and management
|
May 10, 2025 |
|
JavaScript for Web Developers: Understanding the Basics
|
May 10, 2025 |
|
Visual Data Insights Using SAS ODS Graphics: A Guide to Communication-Effective Data Visualization
|
May 09, 2025 |
|
Learning Vue: Core Concepts and Practical Patterns for Reusable, Composable, and Scalable User Interfaces
|
May 09, 2025 |
|
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures
|
May 08, 2025 |
|
Go Fundamentals: Gopher Guides
|
May 08, 2025 |
|
Extreme Privacy: What It Takes to Disappear
|
May 07, 2025 |
|
Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition
|
May 07, 2025 |
|
Design for Developers
|
May 06, 2025 |
|
Deep Learning with Python
|
May 06, 2025 |
|
Deep Learning for Data Architects: Unleash the power of Python's deep learning algorithms
|
May 05, 2025 |
|
Deep Dive: Exploring the Real-world Value of Open Source Intelligence
|
May 05, 2025 |
|
Codebreaking: A Practical Guide
|
May 04, 2025 |
|
Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
|
May 04, 2025 |
|
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
|
May 03, 2025 |
|
Data Science and Analytics Strategy: An Emergent Design Approach
|
May 03, 2025 |
|
Critical Visualization: Rethinking the Representation of Data
|
May 02, 2025 |
|
Data Visualization: A Practical Introduction
|
May 02, 2025 |
|
Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue
|
May 01, 2025 |
|
Concurrency with Modern C++: What every professional C++ programmer should know about concurrency
|
May 01, 2025 |
|
Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications
|
Apr 30, 2025 |
|
C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor
|
Apr 30, 2025 |
|
Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot
|
Apr 29, 2025 |
|
Black Hat Bash: Creative Scripting for Hackers and Pentesters
|
Apr 29, 2025 |
|
Applied Data Science: Data Translators Across the Disciplines
|
Apr 28, 2025 |
|
An In-Depth Guide to Mobile Device Forensics
|
Apr 28, 2025 |
|
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers
|
Apr 27, 2025 |
|
Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security
|
Apr 27, 2025 |
|
Advanced IPv6
|
Apr 26, 2025 |
|
Information Security Management Handbook, 6th Edition
|
Apr 26, 2025 |
|
AZ-900: Microsoft Azure Fundamentals: Study Guide with Practice Questions & Labs
|
Apr 25, 2025 |
|
Powershell Step-by Step
|
Apr 25, 2025 |
|
Beginner's Guide to Exploitation on ARM Vol 2
|
Apr 24, 2025 |
|
Beginner's Guide to Exploitation on ARM Vol 1
|
Apr 24, 2025 |
|
5G/5G-Advanced: The New Generation Wireless Access Technology
|
Apr 24, 2025 |
|
5G for Dummies
|
Apr 24, 2025 |
|
Cisco CCNA Command Guide: Tips and Tricks to Learn Cisco CCNA Command Guide
|
Apr 22, 2025 |
|
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools
|
Apr 22, 2025 |
|
Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform
|
Apr 21, 2025 |
|
Inside Cyber Warfare: Mapping the Cyber Underworld
|
Apr 21, 2025 |
|
Cryptography & Network Security
|
Apr 20, 2025 |
|
Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud
|
Apr 20, 2025 |
|
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
|
Apr 19, 2025 |
|
Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security
|
Apr 19, 2025 |
|
You Don't Know JS: Scope & Closures
|
Apr 16, 2025 |
|
You Don't Know JS: ES6 & Beyond
|
Apr 14, 2025 |
|
You Don't Know JS: Async & Performance
|
Apr 14, 2025 |
|
Writing Security Tools and Exploits
|
Apr 13, 2025 |
|
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
|
Apr 13, 2025 |
|
Wireshark 101: Essential Skills for Network Analysis
|
Apr 12, 2025 |
|
Wireshark Network Security
|
Apr 12, 2025 |
|
Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals
|
Apr 11, 2025 |
|
Windows Server 2022 & PowerShell All-in-One For Dummies
|
Apr 11, 2025 |
|
Wireless Network Security
|
Apr 10, 2025 |
|
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel
|
Apr 10, 2025 |
|
Windows Malware Analysis Essentials: Master the Fundamentals of Malware Analysis for the Windows Platform and Enhance Your Anti-malware
|
Apr 09, 2025 |
|
Windows Kernel Programming
|
Apr 09, 2025 |
|
Windows Internals, Part 2 (Developer Reference)
|
Apr 08, 2025 |
|
Windows and Linux Penetration Testing from Scratch
|
Apr 08, 2025 |
|
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure
|
Apr 07, 2025 |
|
Web Application Advanced Hacking
|
Apr 07, 2025 |
|
You Don't Know JS: this & Object Prototypes
|
Apr 06, 2025 |
|
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
|
Apr 06, 2025 |
|
Web Hacking 101
|
Apr 06, 2025 |
|
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs
|
Apr 04, 2025 |
|
Zero Trust Networks: Building Secure Systems in Untrusted Networks
|
Apr 04, 2025 |
|
You Don't Know JS: Types & Grammar
|
Apr 03, 2025 |
|
You Don't Know JS: Up & Going
|
Apr 03, 2025 |
|
Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code
|
Apr 01, 2025 |
|
Foundations of ARM64 Linux Debugging, Disassembling, and Reversing: Analyze Code, Understand Stack Memory Usage, and Reconstruct Original
|
Apr 01, 2025 |
|
Viruses, Hardware and Software Trojans: Attacks and Countermeasures
|
Mar 31, 2025 |
|
Unleashing the Art of Digital Forensics
|
Mar 31, 2025 |
|
UNIX and Linux System Administration Handbook, 4th Edition
|
Mar 30, 2025 |
|
UNIX: The Textbook, Third Edition
|
Mar 30, 2025 |
|
Understanding Network Hacks: Attack and Defense with Python 3
|
Mar 29, 2025 |
|
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program
|
Mar 29, 2025 |
|
Ubuntu Unleashed 2019: Covering 18.04, 18.10, 19.04, and 19.10
|
Mar 28, 2025 |
|
Troubleshooting & Maintaining PCs All-in-One For Dummies
|
Mar 28, 2025 |
|
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
|
Mar 27, 2025 |
|
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
|
Mar 27, 2025 |
|
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
|
Mar 26, 2025 |
|
Tor And The Deep Web 2020: A Beginner's Guide to Staying Anonymous, Dark Net Journey on How to Be Anonymous Online
|
Mar 26, 2025 |
|
TLS Mastery: Tux edition
|
Mar 25, 2025 |
|
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
|
Mar 25, 2025 |
|
Threat Modeling: Designing for Security
|
Mar 24, 2025 |
|
Write Great Code, Volume 2, 2nd Edition: Thinking Low-Level, Writing High-Level
|
Mar 24, 2025 |
|
Software Craftsman, The: Professionalism, Pragmatism, Pride
|
Mar 23, 2025 |
|
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
|
Mar 23, 2025 |
|
The Quick Python Book, Second Edition
|
Mar 22, 2025 |
|
The Pentester BluePrint: Starting a Career as an Ethical Hacker
|
Mar 22, 2025 |
|
The Official Raspberry Pi Beginner's Guide: How to use your new computer
|
Mar 21, 2025 |
|
The Official CompTIA Security+ Certification Study Guide
|
Mar 21, 2025 |
|
The Linux Programming Interface: A Linux and UNIX System Programming Handbook
|
Mar 20, 2025 |
|
The Hacker Playbook: Practical Guide To Penetration Testing
|
Mar 20, 2025 |
|
The Hacker Playbook 3: Practical Guide To Penetration Testing
|
Mar 19, 2025 |
|
The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process
|
Mar 19, 2025 |
|
The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World
|
Mar 18, 2025 |
|
The Complete Cyber Security Course
|
Mar 18, 2025 |
|
The Clean Coder: A Code of Conduct for Professional Programmers
|
Mar 17, 2025 |
|
CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)
|
Mar 17, 2025 |
|
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
|
Mar 16, 2025 |
|
The IDA Pro Book, 2nd Edition
|
Mar 16, 2025 |
|
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization
|
Mar 15, 2025 |
|
The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence
|
Mar 15, 2025 |
|
The threat intelligence handbook
|
Mar 14, 2025 |
|
The Tangled Web: A Guide to Securing Modern Web Applications
|
Mar 14, 2025 |
|
The Social Engineer's Playbook: A Practical Guide to Pretexting
|
Mar 12, 2025 |
|
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
|
Mar 12, 2025 |
|
The Mac Hacker's Handbook
|
Mar 10, 2025 |
|
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
|
Mar 10, 2025 |
|
The Hacker Playbook 2: Practical Guide To Penetration Testing
|
Mar 09, 2025 |
|
The Complete Book of Locks and Locksmithing
|
Mar 09, 2025 |
|
The Analytics Setup Guidebook
|
Mar 08, 2025 |
|
Testing and Securing Android Studio Applications
|
Mar 08, 2025 |
|
TCP/IP Protocol Suite
|
Mar 07, 2025 |
|
Take Control of Wi-Fi Networking and Security
|
Mar 07, 2025 |
|
SwiftUI Essentials - iOS 14 Edition: Learn to Develop iOS Apps Using SwiftUI, Swift 5 and Xcode 12
|
Mar 06, 2025 |
|
Cryptography: Theory and Practice
|
Mar 06, 2025 |
|
Cryptography And Network Security: Principles and Practices
|
Mar 05, 2025 |
|
Cryptography and Network Security: Principles and Practice
|
Mar 05, 2025 |
|
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks
|
Mar 04, 2025 |
|
Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes
|
Mar 04, 2025 |
|
Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide
|
Mar 03, 2025 |
|
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
|
Mar 03, 2025 |
|
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
|
Mar 01, 2025 |
|
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
|
Mar 01, 2025 |
|
Security in Computing
|
Feb 28, 2025 |
|
Security Warrior: Know Your Enemy
|
Feb 28, 2025 |
|
Security Testing with Kali NetHunter
|
Feb 27, 2025 |
|
Security Engineering: A Guide to Building Dependable Distributed Systems
|
Feb 27, 2025 |
|
Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments
|
Feb 26, 2025 |
|
Security Strategies in Linux Platforms and Applications
|
Feb 26, 2025 |
|
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
|
Feb 25, 2025 |
|
Security Automation with Ansible 2
|
Feb 25, 2025 |
|
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
|
Feb 24, 2025 |
|
Secure Programming with Static Analysis
|
Feb 24, 2025 |
|
Secure PHP Development: Building 50 Practical Applications
|
Feb 23, 2025 |
|
Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML
|
Feb 23, 2025 |
|
Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language
|
Feb 22, 2025 |
|
Modern Vulnerability Management: Predictive Cybersecurity
|
Feb 22, 2025 |
|
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
|
Feb 21, 2025 |
|
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
|
Feb 21, 2025 |
|
RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)
|
Feb 20, 2025 |
|
Reverse Engineering Questions and Answers - George Duckett
|
Feb 20, 2025 |
|
Red Team Development and Operations: A practical guide
|
Feb 19, 2025 |
|
Red Hat Linux Security and Optimization
|
Feb 19, 2025 |
|
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
|
Feb 18, 2025 |
|
The Red Team Handbook - The Army's Guide To Making Better Decisions
|
Feb 18, 2025 |
|
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)
|
Feb 18, 2025 |
|
Real-World Python: A Hacker's Guide to Solving Problems with Code
|
Feb 17, 2025 |
|
Raspberry Pi Assembly Language Programming: ARM Processor Coding
|
Feb 17, 2025 |
|
Ransomware and Cyber Extortion: Response and Prevention
|
Feb 17, 2025 |
|
Racket Programming the Fun Way: From Strings to Turing Machines
|
Feb 15, 2025 |
|
Python for Data Analysis: Data Wrangling with pandas, NumPy, and Jupyter
|
Feb 15, 2025 |
|
Python: Penetration Testing for Developers
|
Feb 15, 2025 |
|
Python Hacking Essentials
|
Feb 14, 2025 |
|
Python GUI Programming with Tkinter: Design and build functional and user-friendly GUI applications
|
Feb 14, 2025 |
|
Python for Professionals: Hands-on Guide for Python Professionals
|
Feb 14, 2025 |
|
Python 201: Intermediate Python
|
Feb 13, 2025 |
|
Python 101: 2nd Edition
|
Feb 13, 2025 |
|
Python Made Simple: Full Beginner’s Guide to Mastering Python
|
Feb 13, 2025 |
|
Protective Security: Creating Military-Grade Defenses for Your Digital Business
|
Feb 12, 2025 |
|
Pro PHP Security
|
Feb 12, 2025 |
|
Programming Linux Anti-Reversing Technique
|
Feb 12, 2025 |
|
Programming and Automating Cisco Networks: A guide to network programmability and automation in the data center, campus, and WAN
|
Feb 10, 2025 |
|
Professor Messer's CompTIA A+ 220-901 and 220-902 Course Notes
|
Feb 10, 2025 |
|
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
|
Feb 10, 2025 |
|
Pro Ember Data: Getting Ember Data to Work with Your API
|
Feb 09, 2025 |
|
Privacy in Practice (Security, Audit and Leadership Series)
|
Feb 09, 2025 |
|
Preventing Ransomware: Understand, prevent, and remediate ransomware attacks
|
Feb 09, 2025 |
|
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
|
Feb 08, 2025 |
|
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
|
Feb 08, 2025 |
|
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs
|
Feb 08, 2025 |
|
Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
|
Feb 07, 2025 |
|
Practical Rust Web Projects: Building Cloud and Web-Based Applications
|
Feb 07, 2025 |
|
Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems
|
Feb 07, 2025 |
|
Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition
|
Feb 01, 2025 |
|
Practical Linux System Administration: A Guide to Installation, Configuration, and Management
|
Feb 01, 2025 |
|
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT
|
Feb 01, 2025 |
|
Practical C Programming: Solutions for modern C developers to create efficient and well-structured programs
|
Jan 30, 2025 |
|
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
|
Jan 30, 2025 |
|
Practical Linux Security Cookbook
|
Jan 30, 2025 |
|
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
|
Jan 27, 2025 |
|
PowerShell for Sysadmins: Workflow Automation Made Easy
|
Jan 27, 2025 |
|
PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems
|
Jan 27, 2025 |
|
Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language
|
Jan 25, 2025 |
|
PoC or GTFO, Volume 2
|
Jan 25, 2025 |
|
PoC or GTFO, Volume 3
|
Jan 25, 2025 |
|
PoC or GTFO, Volume 1
|
Jan 24, 2025 |
|
Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology
|
Jan 24, 2025 |
|
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
|
Jan 24, 2025 |
|
PGP & GPG: Email for the Practical Paranoid
|
Jan 22, 2025 |
|
Personal Digital Security: Protecting Yourself from Online Crime
|
Jan 22, 2025 |
|
Perform a web penetration test
|
Jan 22, 2025 |
|
Penetration Testing With Perl
|
Jan 22, 2025 |
|
Linux Forensics
|
Jan 21, 2025 |
|
Pentest Secrets: Breaking The Unbreakable Enterprise Security
|
Jan 21, 2025 |
|
Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools
|
Jan 21, 2025 |
|
Penetration Testing For Dummies
|
Jan 21, 2025 |
|
PASS the CompTIA Network+ Exam N10-007
|
Jan 20, 2025 |
|
Hands-On Red Team Tactics
|
Jan 20, 2025 |
|
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats
|
Jan 20, 2025 |
|
Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities
|
Jan 19, 2025 |
|
Cybersecurity Attacks - Red Team Strategies
|
Jan 19, 2025 |
|
Practical Web Penetration Testing
|
Jan 19, 2025 |
|
Network Security with pfSense
|
Jan 19, 2025 |
|
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
|
Jan 18, 2025 |
|
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
|
Jan 18, 2025 |
|
OWASP Mobile Security Testing Guide
|
Jan 18, 2025 |
|
Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20
|
Jan 17, 2025 |
|
OSSTMM 3
|
Jan 17, 2025 |
|
MacOS and iOS Internals, Volume III: Security & Insecurity
|
Jan 17, 2025 |
|
MacOS and iOS Internals, Volume I: User Mode
|
Jan 17, 2025 |
|
Linux System Programming: Talking Directly to the Kernel and C Library
|
Jan 16, 2025 |
|
Understanding the Linux Kernel
|
Jan 16, 2025 |
|
Operator Handbook: Red Team + OSINT + Blue Team Reference
|
Jan 16, 2025 |
|
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
|
Jan 15, 2025 |
|
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
|
Jan 15, 2025 |
|
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
|
Jan 15, 2025 |
|
Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2
|
Jan 15, 2025 |
|
Official (ISC)2 Guide to the CISSP-ISSMP CBK
|
Jan 15, 2025 |
|
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them
|
Jan 14, 2025 |
|
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
|
Jan 14, 2025 |
|
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
|
Jan 13, 2025 |
|
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
|
Jan 13, 2025 |
|
NGINX Cookbook
|
Jan 13, 2025 |
|
Networking All-in-One For Dummies
|
Jan 13, 2025 |
|
Exam 98-366 Networking Fundamentals, 2nd Edition
|
Jan 12, 2025 |
|
Windows Server Administration Fundamentals
|
Jan 12, 2025 |
|
Network Security: Private Communication in a Public World
|
Jan 12, 2025 |
|
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
|
Jan 11, 2025 |
|
Network Security Assessment: Know Your Network
|
Jan 11, 2025 |
|
Network Security and Cryptography
|
Jan 11, 2025 |
|
Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI
|
Jan 11, 2025 |
|
Network Forensics: Tracking Hackers through Cyberspace
|
Jan 10, 2025 |
|
Network Design Cookbook: Architecting Cisco Networks
|
Jan 10, 2025 |
|
Network Connectivity: Concepts, Computation, and Optimization
|
Jan 10, 2025 |
|
National Cyber Summit (NCS) Research Track 2020
|
Jan 09, 2025 |
|
MSSQL Penetration Testing - Metasploit
|
Jan 09, 2025 |
|
MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410
|
Jan 09, 2025 |
|
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security
|
Jan 09, 2025 |
|
ModSecurity Handbook
|
Jan 08, 2025 |
|
Modern System Administration: Managing Reliable and Sustainable Systems
|
Jan 08, 2025 |
|
Modern Full-Stack Development: Using TypeScript, React, Node.js, Webpack, and Docker
|
Jan 08, 2025 |
|
Modern DevOps Practices: Implement and secure DevOps in the public cloud with cutting-edge tools, tips, tricks, and techniques
|
Jan 08, 2025 |
|
Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization
|
Jan 08, 2025 |
|
Mobile Deep Learning with TensorFlow Lite, ML Kit and Flutter
|
Jan 07, 2025 |
|
Mining Social Media: Finding Stories in Internet Data
|
Jan 07, 2025 |
|
Minimizing and Exploiting Leakage in VLSI Design
|
Jan 07, 2025 |
|
Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition
|
Jan 06, 2025 |
|
Migrating Linux to Microsoft Azure: A hands-on guide to efficiently relocating your Linux workload to Azure
|
Jan 06, 2025 |
|
Microsoft 365 Security Administration: MS-500 Exam Guide
|
Jan 06, 2025 |
|
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900
|
Jan 06, 2025 |
|
Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge
|
Jan 05, 2025 |
|
Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy
|
Jan 05, 2025 |
|
Microprocessor 5: Software and Hardware Aspects of Development, Debugging and Testing - The Microcomputer
|
Jan 05, 2025 |
|
Microprocessor 2: Communication in a Digital System
|
Jan 05, 2025 |
|
Microprocessor 1: Prolegomena - Calculation and Storage Functions - Models of Computation and Computer Architecture
|
Jan 04, 2025 |
|
Python 101: 2nd Edition
|
Jan 04, 2025 |
|
Metasploit: The Penetration Tester's Guide
|
Jan 04, 2025 |
|
Memory Systems: Cache, DRAM, Disk
|
Jan 04, 2025 |
|
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks
|
Jan 04, 2025 |
|
Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy
|
Jan 03, 2025 |
|
Mastering Python Forensics
|
Jan 03, 2025 |
|
Mastering Docker: Enhance your containerization and DevOps skills to deliver production-ready applications
|
Jan 03, 2025 |
|
Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
|
Jan 03, 2025 |
|
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
|
Jan 03, 2025 |
|
Mastering Azure Security: Keeping your Microsoft Azure workloads safe, 2nd Edition
|
Jan 02, 2025 |
|
Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
|
Jan 02, 2025 |
|
Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS
|
Jan 02, 2025 |
|
Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principle
|
Jan 01, 2025 |
|
Mastering Palo Alto Networks
|
Jan 01, 2025 |
|
Mastering Modern Linux
|
Jan 01, 2025 |
|
Mastering Mobile Forensics
|
Jan 01, 2025 |
|
Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT
|
Dec 31, 2024 |
|
Mastering Windows Network Forensics and Investigation
|
Dec 31, 2024 |
|
Windows Internals - Part 2
|
Dec 31, 2024 |
|
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
|
Dec 31, 2024 |
|
Malware Forensics: Investigating and Analyzing Malicious Code
|
Dec 30, 2024 |
|
Malware Forensics Field Guide for Windows Systems
|
Dec 30, 2024 |
|
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
|
Dec 30, 2024 |
|
Machine Learning Mastery With Python: Understand Your Data, Create Accurate Models and Work Projects End-To-End
|
Dec 30, 2024 |
|
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions
|
Dec 29, 2024 |
|
LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202
|
Dec 29, 2024 |
|
Lock Picking for Beginners: A Complete Step-by-Step Visual Guide on How to Pick Locks with Simple Tools Using Quick and Effective Techniques
|
Dec 29, 2024 |
|
LOCK PICKING EQUIPMENT FOR BEGINNERS
|
Dec 29, 2024 |
|
LOCK PICKING: The Complete Guide for Beginners to Master the Art of Lock Picking Skills and Avoid Beginner Mistakes
|
Dec 28, 2024 |
|
LLVM Essentials: Become familiar with the LLVM infrastructure and start using LLVM libraries to design a compiler
|
Dec 28, 2024 |
|
Linux 101 hacks
|
Dec 28, 2024 |
|
Linux Command Line and Shell Scripting Bible
|
Dec 28, 2024 |
|
Linux System Administration for the 2020s
|
Dec 28, 2024 |
|
Linux Hardening in Hostile Networks
|
Dec 27, 2024 |
|
Linux Firewalls: Enhancing Security with nftables and Beyond: Enhancing Security with nftables and Beyond
|
Dec 27, 2024 |
|
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
|
Dec 27, 2024 |
|
Linux System Administration: Solve Real-life Linux Problems Quickly
|
Dec 27, 2024 |
|
Linux Server Security: Hack and Defend
|
Dec 27, 2024 |
|
Linux Kernel Debugging: Leverage proven tools and advanced techniques to effectively debug Linux kernels and kernel modules
|
Dec 25, 2024 |
|
Linux Inside
|
Dec 25, 2024 |
|
Linux Fundamentals
|
Dec 25, 2024 |
|
Linux for Networking Professionals: Securely configure and operate Linux network services for the enterprise
|
Dec 25, 2024 |
|
Linux For Hacking - Install Test And Hack
|
Dec 25, 2024 |
|
Linux: Embedded Development
|
Dec 24, 2024 |
|
Linux Command Line and Shell Scripting Bible
|
Dec 24, 2024 |
|
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
|
Dec 24, 2024 |
|
Learning iOS Forensics
|
Dec 24, 2024 |
|
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
|
Dec 24, 2024 |
|
Learning Java by Building Android Games
|
Dec 23, 2024 |
|
Learning the vi and Vim Editors: Text Processing at Maximum Speed and Power
|
Dec 23, 2024 |
|
Learning Nessus for Penetration Testing
|
Dec 23, 2024 |
|
Learning Metasploit Exploitation and Development
|
Dec 23, 2024 |
|
Learning Linux Binary Analysis
|
Dec 22, 2024 |
|
Learning DevOps - Second Edition
|
Dec 22, 2024 |
|
Learn to Program with Kotlin: From the Basics to Projects with Text and Image Processing
|
Dec 22, 2024 |
|
Learn PowerShell in a Month of Lunches, Fourth Edition
|
Dec 22, 2024 |
|
Learn Linux Quickly: A Friendly Guide to Easily Master the World's Most Powerful Operating System
|
Dec 21, 2024 |
|
Learn How to Hack Like a Pro
|
Dec 21, 2024 |
|
Learn Computer Forensics - Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
|
Dec 21, 2024 |
|
Laptops For Dummies
|
Dec 21, 2024 |
|
Kubernetes Security and Observability
|
Dec 20, 2024 |
|
Kubernetes Security - Operating Kubernetes Clusters and Applications Safely
|
Dec 20, 2024 |
|
Keyboard Shortcuts For Data Scientists
|
Dec 20, 2024 |
|
Kali Linux Reference Guide: A Pentester's Voyage
|
Dec 20, 2024 |
|
Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
|
Dec 20, 2024 |
|
Kali Linux Wireless Penetration Testing Beginner's Guide
|
Dec 20, 2024 |
|
Kali Linux Revealed: Mastering the Penetration Testing Distribution
|
Dec 20, 2024 |
|
Kali Linux Ctf Blueprints
|
Dec 19, 2024 |
|
Kali Linux
|
Dec 19, 2024 |
|
JNCIP: Juniper Networks Certified Internet Professional Study Guide
|
Dec 19, 2024 |
|
Jumpstarting the Raspberry Pi Zero W: Control the World Around You with a $10 Computer
|
Dec 19, 2024 |
|
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
|
Dec 19, 2024 |
|
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide
|
Dec 19, 2024 |
|
ISO/IEC 9899:1999, Programming languages -- C
|
Dec 19, 2024 |
|
JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron
|
Dec 17, 2024 |
|
(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test
|
Dec 17, 2024 |
|
ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide
|
Dec 17, 2024 |
|
IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT
|
Dec 17, 2024 |
|
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
|
Dec 17, 2024 |
|
iOS Application Security: The Definitive Guide for Hackers and Developers
|
Dec 17, 2024 |
|
iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics
|
Dec 17, 2024 |
|
Investigating Windows Systems
|
Dec 16, 2024 |
|
Investigating Internet Crimes
|
Dec 16, 2024 |
|
Introduction to Computer Organization
|
Dec 16, 2024 |
|
Introduction to Compiler Design
|
Dec 16, 2024 |
|
Incident Response Techniques for Ransomware Attacks
|
Dec 16, 2024 |
|
Incident Response with Threat Intelligence
|
Dec 16, 2024 |
|
Incident Response & Computer Forensics, Third Edition
|
Dec 15, 2024 |
|
Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration
|
Dec 15, 2024 |
|
Implementing Effective Code Reviews: How to Build and Maintain Clean Code
|
Dec 15, 2024 |
|
Implementing Cryptography Using Python
|
Dec 15, 2024 |
|
Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide
|
Dec 15, 2024 |
|
Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,
|
Dec 15, 2024 |
|
Implementing Cisco IP Switch Networks (300-115)
|
Dec 15, 2024 |
|
IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over
|
Dec 15, 2024 |
|
IBM b-type Gen 7 Installation, Migration, and Best Practices Guide
|
Dec 15, 2024 |
|
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud
|
Dec 15, 2024 |
|
How Linux Works, 3rd Edition: What Every Superuser Should Know
|
Dec 15, 2024 |
|
How to Measure Anything in Cybersecurity Risk
|
Dec 15, 2024 |
|
How to Hack Like a Legend: Breaking Windows
|
Dec 13, 2024 |
|
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
|
Dec 13, 2024 |
|
History of REvil
|
Dec 13, 2024 |
|
Hiding from the Internet: Eliminating Personal Online Information
|
Dec 13, 2024 |
|
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
|
Dec 12, 2024 |
|
Hash Crack: Password Cracking Manual v.3
|
Dec 12, 2024 |
|
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
|
Dec 12, 2024 |
|
Hardware Security: A Hands-on Learning Approach
|
Dec 12, 2024 |
|
Hands-On Penetration Testing on Windows
|
Dec 11, 2024 |
|
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
|
Dec 11, 2024 |
|
Hands-On Chatbots and Conversational UI Development
|
Dec 11, 2024 |
|
Hands-On Penetration Testing with Kali NetHunter
|
Dec 11, 2024 |
|
Handbook for CTFers
|
Dec 10, 2024 |
|
Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook
|
Dec 10, 2024 |
|
Hacking: The Art of Exploitation, 2nd Edition
|
Dec 10, 2024 |
|
Hacking Android
|
Dec 10, 2024 |
|
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
|
Dec 08, 2024 |
|
Hacking Kubernetes: Threat-Driven Analysis and Defense
|
Dec 08, 2024 |
|
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future
|
Dec 08, 2024 |
|
Hacking Exposed: Malware & Rootkits Secrets & Solutions
|
Dec 08, 2024 |
|
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
|
Dec 08, 2024 |
|
Hacking APIs: Breaking Web Application Programming Interfaces
|
Dec 08, 2024 |
|
Hacking SaaS: An Insider's Guide to Managing Software Business Success
|
Dec 08, 2024 |
|
Hacking Multifactor Authentication
|
Dec 08, 2024 |
|
HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX
|
Dec 07, 2024 |
|
Hacking VoIP: Protocols, Attacks, and Countermeasures
|
Dec 07, 2024 |
|
Hacking the Xbox: An Introduction to Reverse Engineering
|
Dec 07, 2024 |
|
Hacking Gps
|
Dec 07, 2024 |
|
Hacking For Dummies
|
Dec 07, 2024 |
|
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
|
Dec 07, 2024 |
|
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
|
Dec 06, 2024 |
|
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
|
Dec 06, 2024 |
|
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools
|
Dec 06, 2024 |
|
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
|
Dec 05, 2024 |
|
Google Hacking for Penetration Testers
|
Dec 05, 2024 |
|
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo
|
Dec 05, 2024 |
|
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
|
Dec 05, 2024 |
|
Go Programming Language For Dummies
|
Dec 05, 2024 |
|
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
|
Dec 05, 2024 |
|
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy
|
Dec 05, 2024 |
|
Get Programming with Go
|
Dec 05, 2024 |
|
Game Hacking: Developing Autonomous Bots for Online Games by Cano
|
Dec 05, 2024 |
|
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
|
Dec 05, 2024 |
|
Fuzzing for Software Security
|
Dec 04, 2024 |
|
Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL
|
Dec 04, 2024 |
|
Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL
|
Dec 04, 2024 |
|
Full Stack Python Security: Cryptography, TLS, and attack resistance
|
Dec 04, 2024 |
|
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
|
Dec 04, 2024 |
|
Foundational Java: Key Elements and Practical Programming
|
Dec 04, 2024 |
|
Linux All-In-One For Dummies
|
Dec 04, 2024 |
|
Flutter for Beginners
|
Dec 04, 2024 |
|
FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES
|
Dec 03, 2024 |
|
Finding Beacons in the Dark
|
Dec 03, 2024 |
|
Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!
|
Dec 03, 2024 |
|
Ethical Hacker's Certification Guide (CEHv11)
|
Dec 03, 2024 |
|
Ethical Hacking-Joe Grant
|
Dec 03, 2024 |
|
Ethical Hacking: Techniques, Tools, and Countermeasures
|
Dec 03, 2024 |
|
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
|
Dec 03, 2024 |
|
Essential Of Artificial Intelligence
|
Dec 03, 2024 |
|
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
|
Dec 02, 2024 |
|
Enterprise Level Security 1 & 2
|
Dec 02, 2024 |
|
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
|
Dec 02, 2024 |
|
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide
|
Dec 02, 2024 |
|
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
|
Dec 02, 2024 |
|
Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow
|
Dec 02, 2024 |
|
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
|
Dec 02, 2024 |
|
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
|
Dec 02, 2024 |
|
Embedded Linux Development Using Yocto Project
|
Dec 02, 2024 |
|
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming
|
Dec 01, 2024 |
|
Eleventh Hour CISSP: Study Guide
|
Dec 01, 2024 |
|
Reversing: Secrets of Reverse Engineering
|
Dec 01, 2024 |
|
Efficient Linux at the Command Line: Boost Your Command-Line Skills
|
Dec 01, 2024 |
|
Effective Cybersecurity: A Guide to Using Best Practices and Standards
|
Dec 01, 2024 |
|
Effective C: An Introduction to Professional C Programming
|
Dec 01, 2024 |
|
Easy Learning Design Patterns Javascript: Build Better Coding and Design Patterns
|
Dec 01, 2024 |
|
Dynamically Enabled Cyber Defense
|
Nov 28, 2024 |
|
Drones to Go: A Crash Course for Scientists and Makers
|
Nov 28, 2024 |
|
Docker Cookbook: Solutions and Examples for Building Distributed Applications
|
Nov 28, 2024 |
|
Docker in Practice
|
Nov 28, 2024 |
|
Cyber Intelligence Report: 2020 Quarter 1: Dive Into the 5th Domain: Threat Intelligence
|
Nov 28, 2024 |
|
Distributed Denial of Service Attacks: Real-world Detection and Mitigation
|
Nov 28, 2024 |
|
Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats
|
Nov 28, 2024 |
|
Digital Security: Cyber Terror and Cyber Security
|
Nov 28, 2024 |
|
Digital Forensics in the Era of Artificial Intelligence
|
Nov 28, 2024 |
|
Digital Forensics Explained
|
Nov 27, 2024 |
|
Digital Forensics Basics: A Practical Guide Using Windows OS
|
Nov 27, 2024 |
|
Elsevier's Dictionary of Information Security
|
Nov 27, 2024 |
|
DevOps and Containers Security: Security and Monitoring in Docker Containers
|
Nov 27, 2024 |
|
DevOps Troubleshooting: Linux Server Best Practices
|
Nov 27, 2024 |
|
Designing Secure Software: A Guide for Developers
|
Nov 27, 2024 |
|
Designing BSD Rootkits: An Introduction to Kernel Hacking
|
Nov 27, 2024 |
|
Deployment CISCO SD-WAN LAB ON EVE-NG
|
Nov 27, 2024 |
|
Demystifying Intelligent Multimode Security Systems
|
Nov 27, 2024 |
|
Demystified Object-Oriented Programming with C++
|
Nov 27, 2024 |
|
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance
|
Nov 26, 2024 |
|
Data Science Projects with Python - Second Edition
|
Nov 26, 2024 |
|
The DataOps Revolution
|
Nov 26, 2024 |
|
Database Security: Problems and Solutions
|
Nov 26, 2024 |
|
Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime
|
Nov 26, 2024 |
|
Data Science on the Google Cloud Platform
|
Nov 26, 2024 |
|
Data Science Crash Course for Beginners: Fundamentals and Practices with Python
|
Nov 26, 2024 |
|
Data Pipelines with Apache Airflow
|
Nov 26, 2024 |
|
Data Communications and Networking
|
Nov 25, 2024 |
|
Data Center Handbook: Plan, Design, Build, and Operations of a Smart Data Center
|
Nov 25, 2024 |
|
Data Analytics for Cybersecurity
|
Nov 25, 2024 |
|
Data Privacy: A runbook for engineers
|
Nov 25, 2024 |
|
Data Analysis with Python and PySpark
|
Nov 25, 2024 |
|
Data Analysis And Visualization
|
Nov 25, 2024 |
|
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
|
Nov 24, 2024 |
|
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
|
Nov 24, 2024 |
|
Scratch 3 Programming Playground: Learn to Program by Making Cool Games
|
Nov 24, 2024 |
|
Data Center Handbook
|
Nov 24, 2024 |
|
Cyberwarfare: Threats to Critical Infrastructure
|
Nov 24, 2024 |
|
Cybersecurity Fundamentals
|
Nov 24, 2024 |
|
Cybersecurity for Beginners: How to prevent Phishing & Social Engineering Attacks
|
Nov 24, 2024 |
|
Cybersecurity First Principles: A Reboot of Strategy and Tactics
|
Nov 24, 2024 |
|
Cybercrime Investigators Handbook
|
Nov 24, 2024 |
|
Cyberjutsu: Cybersecurity for the Modern Ninja
|
Nov 23, 2024 |
|
Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security
|
Nov 23, 2024 |
|
Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic Security
|
Nov 23, 2024 |
|
Cyber Forensics
|
Nov 23, 2024 |
|
Cyber Security and IT Infrastructure Protection
|
Nov 23, 2024 |
|
Cyber Security: The complete guide to cyber threats and protection
|
Nov 23, 2024 |
|
Cyber Risks and Insurance: The Legal Principles
|
Nov 22, 2024 |
|
Cyber Crime Investigator's Field Guide
|
Nov 22, 2024 |
|
Cuckoo Malware Analysis
|
Nov 22, 2024 |
|
Cryptography and Network Security: Principles and Practice
|
Nov 22, 2024 |
|
SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition
|
Nov 22, 2024 |
|
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
|
Nov 22, 2024 |
|
Cryptography and Network Security
|
Nov 22, 2024 |
|
The Security Risk Assessment Handbook
|
Nov 22, 2024 |
|
The Art of Linux Kernel Design
|
Nov 21, 2024 |
|
Secure Data Science
|
Nov 21, 2024 |
|
Container Security: Fundamental Technology Concepts that Protect Containerized Applications
|
Nov 21, 2024 |
|
Computer Science Distilled: Learn the Art of Solving Computational Problems
|
Nov 21, 2024 |
|
Computer Networking and Cybersecurity
|
Nov 21, 2024 |
|
Computer Security -- ESORICS 2013
|
Nov 21, 2024 |
|
Computer Graphics from Scratch: A Programmer's Introduction to 3D Rendering
|
Nov 21, 2024 |
|
Computer Forensics With Ftk
|
Nov 21, 2024 |
|
Computer Forensics and Cyber Crime
|
Nov 21, 2024 |
|
Computer and Network Security Essentials
|
Nov 20, 2024 |
|
CompTIA Security+: SY0-601 Certification Guide - Second Edition: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+
|
Nov 20, 2024 |
|
CompTIA Security+ Certification Practice Exams, Fourth Edition
|
Nov 20, 2024 |
|
CompTIA Network+ N10_007 Practice Exam Questions
|
Nov 20, 2024 |
|
Mike Meyers' CompTIA Network+ Certification Passport, Seventh Edition - Exam N10-008
|
Nov 20, 2024 |