CyberSecurity Summary

By CyberSecurity Summary

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Books

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 1000

Description

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Episode Date
Cyber-Physical Security and Privacy in the Electric Smart Grid (Synthesis Lectures on Information Security, Privacy, & Trust)
May 06, 2026
CYBOK: The Cyber Security Body of Knowledge
May 05, 2026
Dark Web Investigation (Security Informatics and Law Enforcement)
May 04, 2026
Persistence in PHP with the Doctrine ORM
May 03, 2026
CISSP All-in-One Exam Guide, Eighth Edition
May 02, 2026
Cyber Security Intelligence and Analytics (Advances in Intelligent Systems and Computing, 928)
May 01, 2026
CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007)
Apr 30, 2026
ITF+ CompTIA IT Fundamentals All-in-One Exam Guide, Second Edition (Exam FC0-U61)
Apr 29, 2026
CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61
Apr 28, 2026
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Apr 27, 2026
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
Apr 26, 2026
CCNA Certification Study Guide: Exam 200-301, Volume 2 (Sybex Study Guide)
Apr 25, 2026
Computer Networks: A Systems Approach (The Morgan Kaufmann Series in Networking)
Apr 24, 2026
Practical Guide to Security in the AWS Cloud
Apr 23, 2026
C++ For Dummies
Apr 22, 2026
Cisco Unified Contact Center Enterprise (Networking Technology: IP Communications)
Apr 21, 2026
5G Mobile and Wireless Communications Technology
Apr 20, 2026
Learn Linux Quickly: A beginner-friendly guide to getting up and running with the world's most powerful operating system
Apr 19, 2026
Cisco Voice Gateways and Gatekeepers (Networking Technology)
Apr 18, 2026
Exam Ref AZ-204 Developing Solutions for Microsoft Azure
Apr 17, 2026
Write Great Code, Volume 3: Engineering Software
Apr 16, 2026
Building Virtual Pentesting Labs for Advanced Penetration Testing
Apr 15, 2026
Building Telegram Bots: Develop Bots in 12 Programming Languages using the Telegram Bot API
Apr 14, 2026
What You Need to Know about Docker: The absolute essentials you need to get Docker up and running
Apr 13, 2026
Build Your Own Website: A Comic Guide to HTML, CSS, and WordPress
Apr 12, 2026
Azure DevOps Explained: Get started with Azure DevOps and develop your DevOps practices
Apr 11, 2026
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Apr 10, 2026
Bash Cookbook 1st Edition
Apr 09, 2026
bash Cookbook: Solutions and Examples for bash Users 2nd Edition
Apr 08, 2026
Beginning Ethical Hacking with Python
Apr 07, 2026
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
Apr 06, 2026
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Apr 05, 2026
Autonomic Computing and Networking
Apr 04, 2026
Android Cookbook: Problems and Solutions for Android Developers
Apr 03, 2026
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Apr 02, 2026
31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam
Apr 01, 2026
31 Days Before Your CCNA Routing & Switching Exam: A Day-by-Day Review Guide for the ICND1/CCent (100-105), ICND2 (200-105)
Mar 31, 2026
Implement NLP use-cases using BERT: Top Expert-Led Coding Interview Question Bank for Python Aspirants
Mar 30, 2026
CompTIA CySA+ Practice Exams: A Time Compressed Resource to Passing the CompTIA CySA+ (CS0-002) Exam on the First Attempt
Mar 29, 2026
Demystifying Azure DevOps Services: A Guide to Architect, Deploy, and Administer DevOps Using Microsoft Azure DevOps Services
Mar 28, 2026
MongoDB Complete Guide: Develop Strong Understanding of Administering MongoDB, CRUD Operations, MongoDB Commands, MongoDB Compass
Mar 27, 2026
Wi-Fi Hacking For Everyone
Mar 26, 2026
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS
Mar 25, 2026
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
Mar 24, 2026
The Book of Batch Scripting: From Fundamentals to Advanced Automation
Mar 23, 2026
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide (Certification Guide)
Mar 22, 2026
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW)
Mar 21, 2026
Computer Security: Principles and Practice
Mar 20, 2026
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
Mar 19, 2026
Cybersecurity for Scada Systems
Mar 18, 2026
Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark
Mar 17, 2026
VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide (VMware Press Certification)
Mar 16, 2026
Practical Purple Teaming: The Art of Collaborative Defense
Mar 15, 2026
AWS Certified Cloud Practitioner CLF-C02 Cert Guide (Certification Guide)
Mar 14, 2026
Linux Bible
Mar 13, 2026
Malware Analysis Using Artificial Intelligence and Deep Learning
Mar 12, 2026
Huntpedia: Your Threat Hunting Knowledge Compendium
Mar 11, 2026
Architecting High-Performance Embedded Systems: Design and build high-performance real-time digital systems based on FPGAs
Mar 10, 2026
Write Great Code, Volume 1, 2nd Edition: Understanding the Machine
Mar 09, 2026
Unity Certified Programmer: Exam Guide: Expert tips and techniques to pass the Unity certification exam at the first attempt
Mar 08, 2026
Practical Microservices with Dapr and .NET: A developer's guide to building cloud-native applications using the Dapr event-driven runtime
Mar 07, 2026
Python Interview Questions: Brush up for your next Python interview with 240+ solutions on most common challenging interview questions
Mar 06, 2026
Social Engineering: The Art of Human Hacking
Mar 05, 2026
Permanent Record
Mar 04, 2026
Operating Systems: Internals and Design Principles
Mar 03, 2026
Okta Administration: Up and Running: Implement enterprise-grade identity and access management for on-premises and cloud apps
Mar 02, 2026
Microsoft Azure Administrator Exam Prep (AZ-104): Make Your Career with Microsoft Azure Platform Using Azure Administered Exam Prep
Mar 01, 2026
Buffer Overflow Attacks: Detect, Exploit, Prevent
Feb 28, 2026
Cisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners
Feb 27, 2026
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
Feb 26, 2026
Terraform Cookbook: Recipes for Codifying Infrastructure
Feb 25, 2026
Ruby Data Structures and Algorithms
Feb 24, 2026
Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing
Feb 23, 2026
Ransomware: Penetration Testing and Contingency Planning (Cyber Shorts)
Feb 22, 2026
Build A SaaS App in Rails 7
Feb 21, 2026
Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects
Feb 20, 2026
Penetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing
Feb 19, 2026
Penetration Testing Step-By-Step Guide
Feb 18, 2026
React in Depth
Feb 17, 2026
Kubernetes for Developers
Feb 16, 2026
Inside Cyber Warfare: Mapping the Cyber Underworld
Feb 15, 2026
Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit
Feb 14, 2026
Component-Based Rails Applications: Large Domains Under Control
Feb 13, 2026
Hacker: Hack The System: The "Ethical" Python Hacking Guide
Feb 12, 2026
Ruby Programming: Building Future-proof Scalable Applications
Feb 11, 2026
Password Cracking with Kali Linux
Feb 10, 2026
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Feb 09, 2026
Computer Science Distilled: Learn the Art of Solving Computational Problems (Code is Awesome)
Feb 08, 2026
Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism
Feb 07, 2026
Cisco CCNA Command Guide For Beginners And Intermediates: A Practical Step By Step Guide to Cisco CCNA Routing And Switching Command Line
Feb 06, 2026
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills
Feb 05, 2026
CCNA Cisco Certified Network Associate Exam (200-301): Technology Workbook with Practice Questions and Labs
Feb 04, 2026
CCNA: 3 in 1: Beginners Guide+ Simple and Effective Strategies+Advanced Method and Strategies to learn Routing and Switching Essentials
Feb 03, 2026
High Performance PostgreSQL for Rails: Reliable, Scalable, Maintainable Database Applications
Feb 02, 2026
Android Application Development Cookbook: Over 100 recipes to help you solve the most common problems faced by Android Developers today
Feb 01, 2026
Prompt Engineering: Empowering Communication
Jan 31, 2026
Programming Ruby 3.3: The Pragmatic Programmers' Guide (Pragmatic Programmers; Facets of Ruby
Jan 30, 2026
Productionizing AI: How to Deliver AI B2B Solutions with Cloud and Python
Jan 29, 2026
Pro Spring Boot 3 with Kotlin: In-Depth Guide to Best Practices for Cloud-Native and Microservices Development
Jan 28, 2026
PowerShell Fast Track: Hacks for Non-Coders
Jan 27, 2026
Software Testing: A Craftsman's Approach
Jan 26, 2026
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
Jan 25, 2026
Android Internals::Power User's View
Jan 24, 2026
5G Mobile Core Network: Design, Deployment, Automation, and Testing Strategies
Jan 23, 2026
5G LTE Narrowband Internet of Things (NB-IoT)
Jan 22, 2026
Windows Terminal Tips, Tricks, and Productivity Hacks: Optimize your command-line usage and development processes with pro-level techniques
Jan 21, 2026
Secrets of Network Cartography: A Comprehensive Guide to Nmap
Jan 20, 2026
Pro Ember Data: Getting Ember Data to Work with Your API
Jan 19, 2026
Practical Web Scraping for Data Science: Best Practices and Examples with Python
Jan 18, 2026
Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices
Jan 17, 2026
Practical LPIC-3 300: Prepare for the Highest Level Professional Linux Certification
Jan 16, 2026
Microsoft Azure Network Security (IT Best Practices - Microsoft Press)
Jan 15, 2026
Mastering Linux Security and Hardening: Protect your Linux systems from intruders, malware attacks, and other cyber threats
Jan 14, 2026
LPIC-1 Linux Professional Institute Certification Study Guide: Exam 101-500 and Exam 102-500
Jan 13, 2026
LPIC-1 Linux Professional Institute Certification Practice Tests: Exam 101-500 and Exam 102-500
Jan 12, 2026
Linux+ and LPIC-1 Guide to Linux Certification, Loose-leaf Version (MindTap Course List)
Jan 11, 2026
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence
Jan 10, 2026
CCNAv7: Introduction to Networks Companion Guide by Cisco
Jan 09, 2026
Introduction to Modern Cryptography: Third Edition (Chapman & Hall/CRC Cryptography and Network Security Series)
Jan 08, 2026
Introduction to Compiler Construction in a Java World
Jan 07, 2026
Hands-On Python Deep Learning for the Web: Integrating neural network architectures to build smart web apps with Flask, Django
Jan 06, 2026
Hacklog Volume 2 Web Hacking: Manuale sulla Sicurezza Informatica e Hacking Etico
Jan 05, 2026
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
Jan 04, 2026
RxJS Cookbook for Reactive Programming: Discover 40+ real-world solutions for building async, event-driven web apps
Jan 03, 2026
React Key Concepts: An in-depth guide to React's core features
Jan 02, 2026
Prompt Engineering for Generative AI
Jan 01, 2026
C++20 Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library
Dec 31, 2025
Building Web Apps with Python and Flask: Learn to Develop and Deploy Responsive RESTful Web Applications Using Flask Framework
Dec 30, 2025
Building Machine Learning Systems Using Python: Practice to Train Predictive Models and Analyze Machine Learning Results with Real Use-Cases
Dec 29, 2025
Building Enterprise Blockchain Solutions on AWS: A Developer's Guide to Build, Deploy, and Managed Apps Using Ethereum, Hyperledger Fabric
Dec 28, 2025
Building Decentralized Blockchain Applications: Learn How to Use Blockchain as the Foundation for Next-Gen Apps
Dec 27, 2025
Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs
Dec 26, 2025
Blockchain in e-Governance: Driving the next Frontier in G2C Services
Dec 25, 2025
Beginning Java MVC 1.0: Model View Controller Development to Build Web, Cloud, and Microservices Applications
Dec 24, 2025
AWS Certified Machine Learning Specialty: MLS-C01 Certification Guide: The definitive guide to passing the MLS-C01 exam on the very first
Dec 23, 2025
The Fast-Track Guide to VXLAN BGP EVPN Fabrics: Implement Today’s Multi-Tenant Software-Defined Networks
Dec 22, 2025
The Pythonic Way: An Architect’s Guide to Conventions and Best Practices for the Design, Development, Testing, and Management of Enterprise
Dec 21, 2025
Traefik API Gateway for Microservices: With Java and Python Microservices Deployed in Kubernetes
Dec 20, 2025
Systems Analysis and Design Global Ed
Dec 19, 2025
Loose Leaf for Systems Analysis and Design
Dec 18, 2025
THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker
Dec 17, 2025
Synchronizing 5G Mobile Networks
Dec 16, 2025
Statistics for Machine Learning: Implement Statistical methods used in Machine Learning using Python
Dec 15, 2025
Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks
Dec 14, 2025
Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
Dec 13, 2025
Securing Social Networks in Cyberspace
Dec 12, 2025
Security for Telecommunications Networks (Advances in Information Security Book 40)
Dec 11, 2025
Enterprise Security Architecture: A Business-Driven Approach
Dec 10, 2025
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
Dec 09, 2025
Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together
Dec 08, 2025
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
Dec 07, 2025
Cracking the Coding Interview: 189 Programming Questions and Solutions
Dec 06, 2025
Computer Networks, Global Edition
Dec 05, 2025
Computer Forensics: Incident Response Essentials
Dec 04, 2025
CompTIA Pentest+ (Practice Exams)
Dec 03, 2025
CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual
Dec 02, 2025
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
Dec 01, 2025
The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)
Nov 30, 2025
The Cybersecurity Manager's Guide: The Art of Building Your Security Program
Nov 29, 2025
Certificate of Cloud Auditing Knowledge Study Guide
Nov 28, 2025
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime
Nov 27, 2025
Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals
Nov 26, 2025
Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator
Nov 25, 2025
Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix
Nov 24, 2025
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
Nov 23, 2025
UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)
Nov 22, 2025
Visual Studio Code for Python Programmers
Nov 21, 2025
Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future
Nov 20, 2025
Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra
Nov 19, 2025
Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes
Nov 18, 2025
Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark
Nov 17, 2025
IBM Watson Solutions for Machine Learning: Achieving Successful Results Across Computer Vision, Natural Language Processing and AI Projects
Nov 16, 2025
Google Analytics Kickstarter Guide: Get Tips to Boost Your Traffic and Sales Using Google Analytics
Nov 15, 2025
Cloud Native Applications with Jakarta EE: Build, Design, and Deploy Cloud-Native Applications and Microservices with Jakarta EE
Nov 14, 2025
Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing
Nov 13, 2025
Linux Device Driver Development: Everything you need to start with device driver development for Linux kernel and embedded Linux
Nov 12, 2025
Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation
Nov 11, 2025
Five Principles for Deploying and Managing Linux in the Cloud
Nov 10, 2025
Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022
Nov 09, 2025
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
Nov 08, 2025
Losing the Cybersecurity War And What We Can Do to Stop It
Nov 07, 2025
Mastering Go: Harness the power of Go to build professional utilities and concurrent servers and services
Nov 06, 2025
MS-900 :Microsoft 365 Fundamentals: Exam Cram Notes
Nov 05, 2025
Navigating the Cybersecurity Career Path
Nov 04, 2025
Red Hat Enterprise Linux 8 Administration: Master Linux administration skills and prepare for the RHCSA certification exam
Nov 03, 2025
Solutions Architect's Handbook: Kick-start your solutions architect career by learning architecture design principles and strategies
Nov 02, 2025
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery)
Nov 01, 2025
Head First Go
Oct 31, 2025
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
Oct 30, 2025
Hands-on Pipeline as YAML with Jenkins: A Beginner's Guide to Implement CI/CD Pipelines for Mobile, Hybrid, and Web Applications
Oct 29, 2025
Hacking with Spring Boot 2.4: Classic Edition
Oct 28, 2025
Guide to Networking Essentials
Oct 27, 2025
From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband
Oct 26, 2025
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders
Oct 25, 2025
Secure Access Service Edge (SASE) For Dummies
Oct 24, 2025
Machine Learning for High-Risk Applications: Approaches to Responsible AI
Oct 23, 2025
Reinventing ITIL in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant
Oct 22, 2025
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect
Oct 21, 2025
Opportunistic Networks: Fundamentals, Applications and Emerging Trends
Oct 20, 2025
Open Source Security: Your Network More Secure With Open Source Tools
Oct 19, 2025
Networks
Oct 18, 2025
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Oct 17, 2025
Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau
Oct 16, 2025
MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)
Oct 15, 2025
Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Technique
Oct 14, 2025
Mastering Azure Kubernetes Service (AKS): Rapidly Build and Scale Your Containerized Applications with Microsoft Azure Kubernetes Service
Oct 13, 2025
Malware Analysis Using Artificial Intelligence and Deep Learning
Oct 12, 2025
LTE Security (NSN/Nokia Series)
Oct 11, 2025
LTE Cellular Narrowband Internet of Things (NB-IoT): Practical Projects for the Cloud and Data Visualization
Oct 10, 2025
LLVM Techniques, Tips, and Best Practices Clang and Middle-End Libraries: Design powerful and reliable compilers using the latest libraries
Oct 09, 2025
Linux Yourself
Oct 08, 2025
Linux: Linux Security and Administration
Oct 07, 2025
Java Professional Interview Guide: Learn About Java Interview Questions and Practise Answering About Concurrency, JDBC, Exception Handling
Oct 06, 2025
ITIL 4 Essentials: Your essential guide for the ITIL 4 Foundation exam and beyond
Oct 05, 2025
ISO/IEC 27001:2013 – Mastering Risk Assessment and the Statement of Applicability
Oct 04, 2025
Introduction to Python Network Automation: The First Journey
Oct 03, 2025
Intelligent Reliability Analysis Using MATLAB and AI: Perform Failure Analysis and Reliability Engineering using MATLAB and Artificial Intel
Oct 02, 2025
Implementing VMware Dynamic Environment Manager:: Manage, Administer and Control VMware DEM, Dynamic Desktop, User Policies
Oct 01, 2025
NoOps: How AI Agents Are Reinventing DevOps and Software
Sep 30, 2025
OpenAI API Cookbook: Build intelligent applications including chatbots, virtual assistants, and content generators
Sep 30, 2025
Mastering spaCy: Build structured NLP solutions with custom components and models powered by spacy-llm
Sep 29, 2025
Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR
Sep 29, 2025
Ruby Way, The: Solutions and Techniques in Ruby Programming (Addison-Wesley Professional Ruby Series)
Sep 28, 2025
Mastering C++ Game Animation Programming: Enhance your skills with advanced game animation techniques in C++, OpenGL
Sep 28, 2025
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
Sep 27, 2025
Machine Learning for Tabular Data: XGBoost, Deep Learning, and AI
Sep 27, 2025
Learn Quantum Computing with Python and IBM Quantum: Write your own practical quantum programs with Python
Sep 26, 2025
Learning LangChain: Building AI and LLM Applications with LangChain and LangGraph
Sep 26, 2025
Unity 5.x Shaders and Effects Cookbook
Sep 25, 2025
Integration of Cloud Computing and IoT: Trends, Case Studies and Applications (Emerging Technologies)
Sep 25, 2025
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
Sep 24, 2025
Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID
Sep 24, 2025
The Developer's Playbook for Large Language Model Security: Building Secure AI Applications
Sep 23, 2025
TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY (Bitcoins, Hacking, Kali Linux)
Sep 23, 2025
Speed Up Your Python with Rust: Optimize Python performance by creating Python pip modules in Rust with PyO3
Sep 22, 2025
Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks
Sep 22, 2025
Microsoft Exam MD-100 Windows 10 Certification Guide: Learn the skills required to become a Microsoft Certified Modern Desktop Administrator
Sep 21, 2025
PASS the CompTIA Network+ Exam N10-007
Sep 21, 2025
Azure OpenAI Essentials: A practical guide to unlocking generative AI-powered innovation with Azure OpenAI
Sep 20, 2025
Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture
Sep 20, 2025
Cisco ThousandEyes: Digital Experience Monitoring and Troubleshooting (Networking Technology)
Sep 19, 2025
CompTIA A+ Complete Practice Tests: Core 1 Exam 220-1201 and Core 2 Exam 220-1202 (Sybex Study Guide)
Sep 19, 2025
Certified Kubernetes Administrator Study Companion : Preparing for the Linux Foundation's CKA Exam
Sep 18, 2025
Exploring Azure Container Apps: Scaling Modern and Cloud-Native Apps and Microservices
Sep 18, 2025
Azure for Developers: The definitive guide to creating secure, scalable Azure apps with GenAI, serverless, and DevOps pipelines
Sep 17, 2025
Pentesting Industrial Control Systems: An ethical hacker's guide to analyzing, compromising, mitigating, and securing industrial processes
Sep 17, 2025
Vibe Coding: The Future of Programming
Sep 16, 2025
Predictive Analytics with SAS and R
Sep 16, 2025
Quantum Programming in Depth: Solving problems with Q# and Qiskit
Sep 15, 2025
MCA Modern Desktop Administrator Complete Study Guide: Exam MD-100 and Exam MD-101
Sep 15, 2025
Learn Functional Programming with Elixir: New Foundations for a New World (The Pragmatic Programmers)
Sep 14, 2025
Ultimate Machine Learning with ML.NET: Build, Optimize, and Deploy Powerful Machine Learning Models for Data-Driven Insights with ML.NET
Sep 14, 2025
The Design of Web APIs, Second Edition
Sep 13, 2025
The Art of AI Product Development: Delivering business value
Sep 13, 2025
Practical Object-Oriented Design: An Agile Primer Using Ruby
Sep 12, 2025
Encyclopedia of Criminal Activities and the Deep Web
Sep 12, 2025
Cybersecurity Ops with bash: Attack, Defend, and Analyze from the Command Line
Sep 11, 2025
Digital Forensics with Kali Linux: Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
Sep 11, 2025
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Sep 10, 2025
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Sep 10, 2025
Complete A+ Guide to IT Hardware and Software Lab Manual: A CompTIA A+ Core 1 (220-1001) & CompTIA A+ Core 2 (220-1002) Lab Manual
Sep 09, 2025
Computer Science Distilled: Learn the Art of Solving Computational Problems (Code is Awesome)
Sep 09, 2025
Understanding Cisco Networking Technologies, Volume 1: Exam 200-301 (CCNA Certification, 1)
Sep 08, 2025
CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide
Sep 08, 2025
Windows Server 2025 Administration Fundamentals: A beginner's guide to managing and administering Windows Server environments
Sep 07, 2025
Zabbix 7 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 7 for designing, building, and maintaining your Zabbix
Sep 07, 2025
Building an Effective Security Program
Sep 06, 2025
Wi-Fi 7 In Depth: Your guide to mastering Wi-Fi 7, the 802.11be protocol, and their deployment
Sep 06, 2025
Azure Strategy and Implementation Guide: The essential handbook to cloud transformation with Azure
Sep 05, 2025
Blockchain Enabled Applications: Understand the Blockchain Ecosystem and How to Make it Work for You
Sep 05, 2025
Authentication and Access Control: Practical Cryptography Methods and Tools
Sep 04, 2025
AWS Certified Advanced Networking - Specialty Exam Guide: Build your knowledge and technical expertise as an AWS-certified networking
Sep 04, 2025
Vulkan 3D Graphics Rendering Cookbook: Implement expert-level techniques for high-performance graphics with Vulkan
Sep 03, 2025
Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud
Sep 03, 2025
The Ghidra Book: The Definitive Guide
Sep 02, 2025
The Ultimate iOS Interview Playbook: Conquer Swift, frameworks, design patterns, and app architecture for your dream job
Sep 02, 2025
Red Hat Certified Engineer (RHCE) Ansible Automation Study Guide: In-Depth Guidance and Practice
Sep 01, 2025
systemd for Linux SysAdmins: All You Need to Know About the systemd Suite for Linux Users
Sep 01, 2025
Advanced Front-End Development: Building Scalable and High-Performance Web Applications with React
Aug 31, 2025
Alice and Bob Learn Secure Coding
Aug 31, 2025
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Aug 30, 2025
Zero Trust in Resilient Cloud and Network Architectures (Networking Technology)
Aug 30, 2025
Wireless Hacking with Kali Linux: LEARN FAST HOW TO HACK ANY WIRELESS NETWORKS PENETRATION TESTING IMPLEMENTATION GUIDE
Aug 29, 2025
Wireless Communication in Underground Mines: RFID-based Sensor Networking
Aug 29, 2025
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Aug 28, 2025
Windows Virus and Malware Troubleshooting (Windows Troubleshooting)
Aug 28, 2025
Using and Administering Linux: Volume 1: Zero to SysAdmin: Getting Started
Aug 27, 2025
Unity Shaders and Effects Cookbook
Aug 27, 2025
Effective Conversational AI: Chatbots that work
Aug 26, 2025
Generative AI with Python and PyTorch: Navigating the AI frontier with LLMs, Stable Diffusion, and next-gen AI applications
Aug 26, 2025
File System Forensics
Aug 25, 2025
CLI Reference: FortiOS 7.4.0
Aug 25, 2025
Designing Websites with Publii and GitHub Pages
Aug 24, 2025
CCNP Enterprise Design ENSLD 300-420 Official Cert Guide
Aug 24, 2025
Design For Developers
Aug 23, 2025
Designing Large Language Model Applications: A Holistic Approach to LLMs
Aug 23, 2025
Data Analysis with LLMs: Text, tables, images and sound
Aug 22, 2025
Data Structures in Depth Using C++: A Comprehensive Guide to Data Structure Implementation and Optimization in C++
Aug 22, 2025
Computer Networking Bible: Your Complete Guide to Mastering Network Fundamentals, Enhancing Security, and Designing Scalable Networks
Aug 21, 2025
Data Science Foundations: Navigating digital insight
Aug 21, 2025
CISCO CCNA 200-301 Exam Prep
Aug 20, 2025
Coding with AI For Dummies (For Dummies: Learning Made Easy)
Aug 20, 2025
C++ Memory Management: Write leaner and safer C++ code using proven memory-management techniques
Aug 19, 2025
Cisco CCNA in 60 Days
Aug 19, 2025
Building Scalable Deep Learning Pipelines on AWS: Develop, Train, and Deploy Deep Learning Models
Aug 18, 2025
Building Quantum Software in Python: A developer's guide
Aug 18, 2025
pache Kafka in Action: From basics to production
Aug 17, 2025
Building CLI Applications with C# and .NET: A step-by-step guide to developing cross-platform CLI apps—from coding and testing to deployment
Aug 17, 2025
Azure Bicep QuickStart Pro: From JSON and ARM Templates to Advanced Deployment Techniques, CI/CD Integration, and Environment Management
Aug 16, 2025
Building Agentic AI Systems: Create intelligent, autonomous AI agents that can reason, plan, and adapt
Aug 16, 2025
AWS Certified Advanced Networking – Specialty (ANS-C01) Certification Guide: A pragmatic guide to acing the AWS ANS-C01 exam
Aug 15, 2025
Artificial Intelligence for Learning: Using AI and Generative AI to Support Learner Development
Aug 15, 2025
Argo CD: Up and Running: A Hands-On Guide to GitOps and Kubernetes
Aug 14, 2025
Learn Ansible
Aug 14, 2025
The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems (Wireless Networks and Mobile Communications)
Aug 13, 2025
Tor and The Dark Net: Remain Anonymous and Evade NSA Spying
Aug 13, 2025
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Aug 12, 2025
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Aug 12, 2025
RFID Toys: Cool Projects for Home, Office and Entertainment (ExtremeTech)
Aug 11, 2025
The Hardware Hacker: Adventures in Making and Breaking Hardware
Aug 11, 2025
RFID Strategic Implementation and ROI: A Practical Roadmap to Success
Aug 10, 2025
The Statistics and Calculus with Python Workshop: A comprehensive introduction to mathematics in Python for artificial intelligence
Aug 10, 2025
RFID Security: Techniques, Protocols and System-On-Chip Design
Aug 09, 2025
The Secret Life of Programs: Understand Computers -- Craft Better Code
Aug 09, 2025
RFID Security and Privacy: Concepts, Protocols, and Architectures
Aug 08, 2025
Kotlin: The Ultimate Beginner's Guide to Learn kotlin Programming
Aug 08, 2025
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations (Wireless Networks and Mobile Communications)
Aug 07, 2025
The Full Stack Developer: Your Essential Guide to the Everyday Skills Expected of a Modern Full Stack Web Developer
Aug 07, 2025
Python for Teenagers: Learn to Program like a Superhero
Aug 06, 2025
RFID Technology and Applications
Aug 06, 2025
RFID Systems: Research Trends and Challenges
Aug 05, 2025
Python: Academy - The Stress Free Way To Learning Python Inside & Out - Beginner
Aug 05, 2025
RFID at Ultra and Super High Frequencies: Theory and application
Aug 04, 2025
Python 3 Web Development Beginner's Guide
Aug 04, 2025
The complete Python & C++ Manual
Aug 03, 2025
RFID in Logistics: A Practical Introduction
Aug 03, 2025
Python: Tricks and Tips
Aug 02, 2025
The Dark Web: Breakthroughs in Research and Practice (Critical Explorations)
Aug 02, 2025
Social Engineering: The Art of Psychological Warfare, Human Hacking, Persuasion & Deception
Aug 01, 2025
Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID
Aug 01, 2025
Security and Privacy in Wireless and Mobile Networks
Jul 31, 2025
Security Issues and Privacy Concerns in Industry 4.0 Applications
Jul 31, 2025
Security in RFID and Sensor Networks
Jul 31, 2025
RFID-Enabled Sensor Design and Applications (Artech House Integrated Microsystems)
Jul 30, 2025
GREY HAT HACKER: THE PLAYBOOK OF A GENIUS
Jul 30, 2025
Python: The Complete Guide
Jul 29, 2025
The Essential Guide to HTML5: Using Games to Learn HTML5 and JavaScript
Jul 29, 2025
Learning Web Design: A Beginner's Guide to HTML, CSS, JavaScript, and Web Graphics
Jul 28, 2025
Learning Vue.js 2: Learn how to build amazing and complex reactive web applications easily with Vue.js
Jul 28, 2025
Network Basics for Hackers: How Networks Work and How They Break
Jul 27, 2025
Natural Language Processing with Java: Techniques for building machine learning and neural network models for NLP, 2nd Edition
Jul 27, 2025
Network Scanning Cookbook: Practical network security using Nmap and Nessus 7
Jul 26, 2025
Kali Linux: Advanced Methods and Strategies to Learn Kali Linux
Jul 26, 2025
Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure
Jul 25, 2025
Neural Network Programming with Java: Create and unleash the power of neural networks by implementing professional Java code
Jul 24, 2025
Neural Networks and Deep Learning: A Textbook
Jul 24, 2025
PostgreSQL Server Programming
Jul 23, 2025
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Jul 23, 2025
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Jul 22, 2025
Python Data Science: The Ultimate Crash Course, Tips, and Tricks to Learn Data Analytics, Machine Learning, and Their Application
Jul 22, 2025
Learning Robotics using Python: Design, simulate, program, and prototype an autonomous mobile robot using ROS, OpenCV, PCL, and Python
Jul 21, 2025
Python Data Cleaning Cookbook: Modern techniques and Python tools to detect and remove dirty data and extract key insights
Jul 21, 2025
How to Hack Like a Ghost: Breaching the Cloud
Jul 20, 2025
Intrusion Detection Guide
Jul 20, 2025
Head First Learn to Code: A Learner's Guide to Coding and Computational Thinking
Jul 19, 2025
Hands-On Neural Networks with TensorFlow 2.0: Understand TensorFlow, from static graph to eager execution, and design neural networks
Jul 19, 2025
Hands-On Neuroevolution with Python: Build high-performing artificial neural network architectures using neuroevolution-based algorithms
Jul 18, 2025
Hands-On Deep Learning with R: A practical guide to designing, building, and improving neural network models using R
Jul 18, 2025
Hacking with Kali Linux: A Guide to Ethical Hacking: A Beginner's Guide with Practical Examples to Test Infrastructure Security with Kali
Jul 17, 2025
Hacking: The Unlocking of Transparency
Jul 17, 2025
Hacking : The Ultimate Hacking for Beginners : How to Hack : Hacking Intelligence : Certified Hacking Book
Jul 16, 2025
Hacking Exposed Computer Forensics
Jul 16, 2025
Hacking Electronics: An Illustrated DIY Guide for Makers and Hobbyists
Jul 15, 2025
Hacking (Compact Research: The Internet)
Jul 15, 2025
Hacking: Beginner to Expert Guide to Computer Hacking, Basic Security, and Penetration Testing
Jul 14, 2025
Hack Attacks Testing: How to Conduct Your Own Security Audit
Jul 14, 2025
Game Theory and Machine Learning for Cyber Security
Jul 13, 2025
Fundamentals of Quantum Computing: Theory and Practice
Jul 13, 2025
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
Jul 12, 2025
Foundations of Information Security: A Straightforward Introduction
Jul 12, 2025
Ethical Hacking With Kali Linux: Learn Fast How To Hack Like A Pro
Jul 11, 2025
Ethical Hacking and Penetration Testing Guide
Jul 11, 2025
Ethical Hacking: A Hands-on Introduction to Breaking In
Jul 10, 2025
Head First HTML and CSS: A Learner's Guide to Creating Standards-Based Web Pages
Jul 10, 2025
Effective Cybersecurity: A Guide to Using Best Practices and Standards
Jul 09, 2025
Easily: Practical Machine Learning Algorithms with Python
Jul 09, 2025
Drone Technology in Architecture, Engineering and Construction: A Strategic Guide to Unmanned Aerial Vehicle Operation and Implementation
Jul 08, 2025
Doing Data Science: Straight Talk from the Frontline
Jul 08, 2025
Distributed Denial of Service Attacks: Real-world Detection and Mitigation
Jul 07, 2025
Distributed Artificial Intelligence: A Modern Approach (Internet of Everything (IoE))
Jul 07, 2025
Deep Reinforcement Learning with Python: Master classic RL, deep RL, distributional RL, inverse RL, and more with OpenAI Gym and TensorFlow
Jul 06, 2025
Deep Learning with PyTorch 1.x: Implement deep learning techniques and neural network architecture variants using Python
Jul 06, 2025
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Jul 05, 2025
Cyber-Security Threats, Actors, and Dynamic Mitigation
Jul 05, 2025
Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques
Jul 04, 2025
Cyber Security: Threats and Responses for Government and Business
Jul 04, 2025
Cyber Security: The CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief Information Security
Jul 03, 2025
Cyber Defense Mechanisms: Security, Privacy, and Challenges (Artificial Intelligence (AI): Elementary to Advanced Practices)
Jul 03, 2025
Cyber Victimology: Decoding Cyber-Crime Victimisation
Jul 02, 2025
Cyber Arms
Jul 02, 2025
Create Graphical User Interfaces with Python: How to build windows, buttons, and widgets for your Python projects
Jul 01, 2025
C++ Primer (5th Edition)
Jul 01, 2025
Computer Networking: A Top-Down Approach
Jun 30, 2025
Classic Computer Science Problems in Python
Jun 30, 2025
Building Computer Vision Applications Using Artificial Neural Networks: With Step-by-Step Examples in OpenCV and TensorFlow with Python
Jun 29, 2025
Building Android Apps in Python Using Kivy with Android Studio: With Pyjnius, Plyer, and Buildozer
Jun 29, 2025
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
Jun 28, 2025
The Little Black Book of Computer Viruses: The Basic Technology
Jun 28, 2025
Beginning Sensor Networks with XBee, Raspberry Pi, and Arduino: Sensing the World with Python and MicroPython
Jun 27, 2025
Beginning Programming With Python For Dummies, 2Ed
Jun 27, 2025
BackTrack 5 Wireless Penetration Testing Beginner's Guide
Jun 26, 2025
Azure Databricks Cookbook: Accelerate and scale real-time analytics solutions using the Apache Spark-based analytics service
Jun 26, 2025
Automate it
Jun 23, 2025
Asterisk Hacking
Jun 23, 2025
Artificial Intelligence With Python
Jun 23, 2025
Artificial Intelligence in Finance: A Python-Based Guide
Jun 23, 2025
Artificial Intelligence for .NET: Speech, Language, and Search: Building Smart Applications with Microsoft Cognitive Services APIs
Jun 21, 2025
Arduino Workshop: A Hands-On Introduction with 65 Projects
Jun 21, 2025
Arduino programming: the ultimate beginner's guide to learn Arduino programming step by step
Jun 20, 2025
Arduino Cookbook: Recipes to Begin, Expand, and Enhance Your Projects
Jun 20, 2025
Approach To Real World Hacking
Jun 19, 2025
Applied Deep Learning: A Case-Based Approach to Understanding Deep Neural Networks
Jun 19, 2025
Hacking With Experts
Jun 18, 2025
AngularJS Web Application Development Cookbook
Jun 18, 2025
Android Notes for Professionals
Jun 17, 2025
Android Design Patterns and Best Practice
Jun 17, 2025
AI Crash Course: A fun and hands-on introduction to machine learning, reinforcement learning, deep learning, and artificial intelligence
Jun 16, 2025
AI and Machine Learning for Coders: A Programmer's Guide to Artificial Intelligence
Jun 16, 2025
AI for Games
Jun 15, 2025
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
Jun 15, 2025
Advanced Smart Computing Technologies in Cybersecurity and Forensics
Jun 14, 2025
Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website
Jun 14, 2025
Absolute Beginner's Guide to Minecraft Mods Programming
Jun 14, 2025
A Beginner’s Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals
Jun 14, 2025
501 Web Site Secrets: Unleash the Power of Google, Amazon, eBay and More
Jun 12, 2025
3D Printing Blueprints
Jun 12, 2025
Voice Application Development for Android
Jun 11, 2025
Unity Game Development Scripting
Jun 11, 2025
Oracle Database 11gR2 Performance Tuning Cookbook
Jun 10, 2025
Linux Mint Essentials: A Practical Guide to Linux Mint for the Novice to the Professional
Jun 10, 2025
Learning Numpy Array
Jun 10, 2025
Instant PHP Web Scraping
Jun 10, 2025
GLSL Essentials
Jun 08, 2025
Getting Started With Electronic Projects
Jun 08, 2025
Force.com Development Blueprints
Jun 07, 2025
A Beginners Guide to Python 3 Programming
Jun 07, 2025
Asynchronous Android: Harness the Power of Multi-Core Mobile Processors to Build Responsive Android Applications
Jun 05, 2025
Python for Civil and Structural Engineers
Jun 05, 2025
Artificial Intelligence For Dummies
Jun 04, 2025
Optimizing Processes with RFID and Auto ID: Fundamentals, Problems and Solutions, Example Applications
Jun 04, 2025
Python GUI Programming Cookbook: Use recipes to develop responsive and powerful GUIs using Tkinter
Jun 03, 2025
Legal Programming: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond
Jun 03, 2025
CentOS 6 Linux Server Cookbook: A Practical Guide to Installing, Configuring, and Administering the Centos Community-based Enterprise Server
Jun 02, 2025
Auto-identification and Ubiquitous Computing Applications: Rfid and Smart Technologies for Information Convergence
Jun 02, 2025
Analog Circuit Design: Robust Design, Sigma Delta Converters, RFID
Jun 01, 2025
Head First JavaScript Programming: A Learner's Guide to Modern JavaScript
Jun 01, 2025
The Art of Network Penetration Testing: How to take over any company in the world
May 31, 2025
Pro RFID in BizTalk Server 2009 (Expert's Voice in BizTalk)
May 31, 2025
Radio Frequency Integrated Circuit Design (Artech House Microwave Library
May 30, 2025
The Art of Mac Malware, Volume 2: Detecting Malicious Software
May 30, 2025
Radio Frequency Identification Technologies
May 29, 2025
CompTIA Security+ Guide to Network Security Fundamentals
May 29, 2025
Radio Frequency Integrated Circuits and Technologies
May 28, 2025
RHCSA Red Hat Enterprise Linux 9 Certification Study Guide, Eighth Edition (Exam EX200)
May 28, 2025
Handbook of Smart Antennas for RFID Systems
May 27, 2025
Professional C++ (Tech Today)
May 27, 2025
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
May 26, 2025
Darknet Master: Tor and Deep Web Secrets
May 26, 2025
A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more
May 25, 2025
Cryptography and Network Security: Principles and Practice, Global Ed
May 25, 2025
Cryptography: Algorithms, Protocols, and Standards for Computer Security
May 24, 2025
Writing a C Compiler: Build a Real Programming Language from Scratch
May 24, 2025
Windows 10 System Programming, Part 2
May 23, 2025
Windows 10 System Programming, Part 1
May 23, 2025
Windows APT Warfare: Identify and prevent Windows APT attacks effectively
May 22, 2025
Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting
May 22, 2025
JavaScript for Sound Artists
May 21, 2025
Building Your Own JavaScript Framework: Architect extensible and reusable framework systems
May 21, 2025
Visual Threat Intelligence: An Illustrated Guide For Threat Researchers
May 20, 2025
12 Twisted Python Projects for Young Coders
May 20, 2025
Think Like a Software Engineering Manager
May 19, 2025
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities
May 19, 2025
The Android Malware Handbook: Detection and Analysis by Human and Machine
May 19, 2025
Software Engineering for Games in Serious Contexts: Theories, Methods, Tools, and Experiences
May 19, 2025
Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR
May 17, 2025
Security Testing with Raspberry Pi
May 17, 2025
Securing Cloud Applications
May 16, 2025
Quick JavaScript (Quick Programming)
May 16, 2025
Python Image Processing Cookbook: Over 60 recipes to help you perform complex image processing and computer vision tasks with ease
May 16, 2025
Python for Scientists
May 16, 2025
Practitioner’s Guide to Data Science (Chapman & Hall/CRC Data Science Series)
May 15, 2025
Practical Python Data Visualization: A Fast Track Approach To Learning Data Visualization With Python
May 15, 2025
Practical Julia: A Hands-On Introduction for Scientific Minds
May 14, 2025
Practical Ansible: Learn how to automate infrastructure, manage configuration, and deploy applications
May 14, 2025
Offensive Countermeasures: The Art of Active Defense
May 12, 2025
Microsoft Defender for Cloud
May 12, 2025
Professional JavaScript for Web Developers
May 11, 2025
Mastering Linux Security and Hardening: A practical guide to protecting your Linux system from cyber attacks
May 11, 2025
Mastering Python Networking: Utilize Python packages and frameworks for network automation, monitoring, cloud, and management
May 10, 2025
JavaScript for Web Developers: Understanding the Basics
May 10, 2025
Visual Data Insights Using SAS ODS Graphics: A Guide to Communication-Effective Data Visualization
May 09, 2025
Learning Vue: Core Concepts and Practical Patterns for Reusable, Composable, and Scalable User Interfaces
May 09, 2025
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures
May 08, 2025
Go Fundamentals: Gopher Guides
May 08, 2025
Extreme Privacy: What It Takes to Disappear
May 07, 2025
Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition
May 07, 2025
Design for Developers
May 06, 2025
Deep Learning with Python
May 06, 2025
Deep Learning for Data Architects: Unleash the power of Python's deep learning algorithms
May 05, 2025
Deep Dive: Exploring the Real-world Value of Open Source Intelligence
May 05, 2025
Codebreaking: A Practical Guide
May 04, 2025
Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
May 04, 2025
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
May 03, 2025
Data Science and Analytics Strategy: An Emergent Design Approach
May 03, 2025
Critical Visualization: Rethinking the Representation of Data
May 02, 2025
Data Visualization: A Practical Introduction
May 02, 2025
Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue
May 01, 2025
Concurrency with Modern C++: What every professional C++ programmer should know about concurrency
May 01, 2025
Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications
Apr 30, 2025
C# 12 and .NET 8 – Modern Cross-Platform Development Fundamentals: Start building websites and services with ASP.NET Core 8, Blazor
Apr 30, 2025
Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot
Apr 29, 2025
Black Hat Bash: Creative Scripting for Hackers and Pentesters
Apr 29, 2025
Applied Data Science: Data Translators Across the Disciplines
Apr 28, 2025
An In-Depth Guide to Mobile Device Forensics
Apr 28, 2025
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers
Apr 27, 2025
Accelerate DevOps with GitHub: Enhance software delivery performance with GitHub Issues, Projects, Actions, and Advanced Security
Apr 27, 2025
Advanced IPv6
Apr 26, 2025
Information Security Management Handbook, 6th Edition
Apr 26, 2025
AZ-900: Microsoft Azure Fundamentals: Study Guide with Practice Questions & Labs
Apr 25, 2025
Powershell Step-by Step
Apr 25, 2025
Beginner's Guide to Exploitation on ARM Vol 2
Apr 24, 2025
Beginner's Guide to Exploitation on ARM Vol 1
Apr 24, 2025
5G/5G-Advanced: The New Generation Wireless Access Technology
Apr 24, 2025
5G for Dummies
Apr 24, 2025
Cisco CCNA Command Guide: Tips and Tricks to Learn Cisco CCNA Command Guide
Apr 22, 2025
HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools
Apr 22, 2025
Inside Azure Management: The authoritative guide to Microsoft's hybrid management platform
Apr 21, 2025
Inside Cyber Warfare: Mapping the Cyber Underworld
Apr 21, 2025
Cryptography & Network Security
Apr 20, 2025
Intro to Python for Computer Science and Data Science: Learning to Program with AI, Big Data and The Cloud
Apr 20, 2025
Intelligent Mobile Malware Detection (Security, Privacy, and Trust in Mobile Communications)
Apr 19, 2025
Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security
Apr 19, 2025
You Don't Know JS: Scope & Closures
Apr 16, 2025
You Don't Know JS: ES6 & Beyond
Apr 14, 2025
You Don't Know JS: Async & Performance
Apr 14, 2025
Writing Security Tools and Exploits
Apr 13, 2025
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Apr 13, 2025
Wireshark 101: Essential Skills for Network Analysis
Apr 12, 2025
Wireshark Network Security
Apr 12, 2025
Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals
Apr 11, 2025
Windows Server 2022 & PowerShell All-in-One For Dummies
Apr 11, 2025
Wireless Network Security
Apr 10, 2025
Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel
Apr 10, 2025
Windows Malware Analysis Essentials: Master the Fundamentals of Malware Analysis for the Windows Platform and Enhance Your Anti-malware
Apr 09, 2025
Windows Kernel Programming
Apr 09, 2025
Windows Internals, Part 2 (Developer Reference)
Apr 08, 2025
Windows and Linux Penetration Testing from Scratch
Apr 08, 2025
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure
Apr 07, 2025
Web Application Advanced Hacking
Apr 07, 2025
You Don't Know JS: this & Object Prototypes
Apr 06, 2025
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Apr 06, 2025
Web Hacking 101
Apr 06, 2025
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs
Apr 04, 2025
Zero Trust Networks: Building Secure Systems in Untrusted Networks
Apr 04, 2025
You Don't Know JS: Types & Grammar
Apr 03, 2025
You Don't Know JS: Up & Going
Apr 03, 2025
Foundations of Linux Debugging, Disassembling, and Reversing: Analyze Binary Code, Understand Stack Memory Usage, and Reconstruct C/C++ Code
Apr 01, 2025
Foundations of ARM64 Linux Debugging, Disassembling, and Reversing: Analyze Code, Understand Stack Memory Usage, and Reconstruct Original
Apr 01, 2025
Viruses, Hardware and Software Trojans: Attacks and Countermeasures
Mar 31, 2025
Unleashing the Art of Digital Forensics
Mar 31, 2025
UNIX and Linux System Administration Handbook, 4th Edition
Mar 30, 2025
UNIX: The Textbook, Third Edition
Mar 30, 2025
Understanding Network Hacks: Attack and Defense with Python 3
Mar 29, 2025
Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program
Mar 29, 2025
Ubuntu Unleashed 2019: Covering 18.04, 18.10, 19.04, and 19.10
Mar 28, 2025
Troubleshooting & Maintaining PCs All-in-One For Dummies
Mar 28, 2025
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
Mar 27, 2025
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
Mar 27, 2025
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
Mar 26, 2025
Tor And The Deep Web 2020: A Beginner's Guide to Staying Anonymous, Dark Net Journey on How to Be Anonymous Online
Mar 26, 2025
TLS Mastery: Tux edition
Mar 25, 2025
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
Mar 25, 2025
Threat Modeling: Designing for Security
Mar 24, 2025
Write Great Code, Volume 2, 2nd Edition: Thinking Low-Level, Writing High-Level
Mar 24, 2025
Software Craftsman, The: Professionalism, Pragmatism, Pride
Mar 23, 2025
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Mar 23, 2025
The Quick Python Book, Second Edition
Mar 22, 2025
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Mar 22, 2025
The Official Raspberry Pi Beginner's Guide: How to use your new computer
Mar 21, 2025
The Official CompTIA Security+ Certification Study Guide
Mar 21, 2025
The Linux Programming Interface: A Linux and UNIX System Programming Handbook
Mar 20, 2025
The Hacker Playbook: Practical Guide To Penetration Testing
Mar 20, 2025
The Hacker Playbook 3: Practical Guide To Penetration Testing
Mar 19, 2025
The Docker Workshop: Learn how to use Docker containers effectively to speed up the development process
Mar 19, 2025
The Decision Intelligence Handbook: Practical Steps for Evidence-Based Decisions in a Complex World
Mar 18, 2025
The Complete Cyber Security Course
Mar 18, 2025
The Clean Coder: A Code of Conduct for Professional Programmers
Mar 17, 2025
CERT Oracle Secure Coding Standard for Java, The (SEI Series in Software Engineering)
Mar 17, 2025
The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer
Mar 16, 2025
The IDA Pro Book, 2nd Edition
Mar 16, 2025
The Definitive Guide to Security in Jakarta EE: Securing Java-based Enterprise Applications with Jakarta Security, Authorization
Mar 15, 2025
The UNIX-HATERS Handbook: Two of the most famous products of Berkeley are LSD and Unix. I don’t think that is a coincidence
Mar 15, 2025
The threat intelligence handbook
Mar 14, 2025
The Tangled Web: A Guide to Securing Modern Web Applications
Mar 14, 2025
The Social Engineer's Playbook: A Practical Guide to Pretexting
Mar 12, 2025
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
Mar 12, 2025
The Mac Hacker's Handbook
Mar 10, 2025
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
Mar 10, 2025
The Hacker Playbook 2: Practical Guide To Penetration Testing
Mar 09, 2025
The Complete Book of Locks and Locksmithing
Mar 09, 2025
The Analytics Setup Guidebook
Mar 08, 2025
Testing and Securing Android Studio Applications
Mar 08, 2025
TCP/IP Protocol Suite
Mar 07, 2025
Take Control of Wi-Fi Networking and Security
Mar 07, 2025
SwiftUI Essentials - iOS 14 Edition: Learn to Develop iOS Apps Using SwiftUI, Swift 5 and Xcode 12
Mar 06, 2025
Cryptography: Theory and Practice
Mar 06, 2025
Cryptography And Network Security: Principles and Practices
Mar 05, 2025
Cryptography and Network Security: Principles and Practice
Mar 05, 2025
SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks
Mar 04, 2025
Simplify Testing with React Testing Library: Create maintainable tests using RTL that do not break with changes
Mar 04, 2025
Silver Peak Advanced SDWAN Deployments Self-Paced Student Guide
Mar 03, 2025
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
Mar 03, 2025
Serverless Security: Understand, Assess, and Implement Secure and Reliable Applications in AWS, Microsoft Azure, and Google Cloud
Mar 01, 2025
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
Mar 01, 2025
Security in Computing
Feb 28, 2025
Security Warrior: Know Your Enemy
Feb 28, 2025
Security Testing with Kali NetHunter
Feb 27, 2025
Security Engineering: A Guide to Building Dependable Distributed Systems
Feb 27, 2025
Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments
Feb 26, 2025
Security Strategies in Linux Platforms and Applications
Feb 26, 2025
Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges
Feb 25, 2025
Security Automation with Ansible 2
Feb 25, 2025
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Feb 24, 2025
Secure Programming with Static Analysis
Feb 24, 2025
Secure PHP Development: Building 50 Practical Applications
Feb 23, 2025
Automated Machine Learning with Microsoft Azure: Build highly accurate and scalable end-to-end AI solutions with Azure AutoML
Feb 23, 2025
Rust Web Programming: A hands-on guide to developing fast and secure web apps with the Rust programming language
Feb 22, 2025
Modern Vulnerability Management: Predictive Cybersecurity
Feb 22, 2025
Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
Feb 21, 2025
Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
Feb 21, 2025
RHCSA Red Hat Enterprise Linux 8: Training and Exam Preparation Guide (EX200)
Feb 20, 2025
Reverse Engineering Questions and Answers - George Duckett
Feb 20, 2025
Red Team Development and Operations: A practical guide
Feb 19, 2025
Red Hat Linux Security and Optimization
Feb 19, 2025
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
Feb 18, 2025
The Red Team Handbook - The Army's Guide To Making Better Decisions
Feb 18, 2025
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)
Feb 18, 2025
Real-World Python: A Hacker's Guide to Solving Problems with Code
Feb 17, 2025
Raspberry Pi Assembly Language Programming: ARM Processor Coding
Feb 17, 2025
Ransomware and Cyber Extortion: Response and Prevention
Feb 17, 2025
Racket Programming the Fun Way: From Strings to Turing Machines
Feb 15, 2025
Python for Data Analysis: Data Wrangling with pandas, NumPy, and Jupyter
Feb 15, 2025
Python: Penetration Testing for Developers
Feb 15, 2025
Python Hacking Essentials
Feb 14, 2025
Python GUI Programming with Tkinter: Design and build functional and user-friendly GUI applications
Feb 14, 2025
Python for Professionals: Hands-on Guide for Python Professionals
Feb 14, 2025
Python 201: Intermediate Python
Feb 13, 2025
Python 101: 2nd Edition
Feb 13, 2025
Python Made Simple: Full Beginner’s Guide to Mastering Python
Feb 13, 2025
Protective Security: Creating Military-Grade Defenses for Your Digital Business
Feb 12, 2025
Pro PHP Security
Feb 12, 2025
Programming Linux Anti-Reversing Technique
Feb 12, 2025
Programming and Automating Cisco Networks: A guide to network programmability and automation in the data center, campus, and WAN
Feb 10, 2025
Professor Messer's CompTIA A+ 220-901 and 220-902 Course Notes
Feb 10, 2025
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Feb 10, 2025
Pro Ember Data: Getting Ember Data to Work with Your API
Feb 09, 2025
Privacy in Practice (Security, Audit and Leadership Series)
Feb 09, 2025
Preventing Ransomware: Understand, prevent, and remediate ransomware attacks
Feb 09, 2025
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Feb 08, 2025
Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Feb 08, 2025
Practical WebDriverIO: Learn to Automate Effectively Using WebDriverIO APIs
Feb 08, 2025
Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
Feb 07, 2025
Practical Rust Web Projects: Building Cloud and Web-Based Applications
Feb 07, 2025
Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems
Feb 07, 2025
Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition
Feb 01, 2025
Practical Linux System Administration: A Guide to Installation, Configuration, and Management
Feb 01, 2025
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT
Feb 01, 2025
Practical C Programming: Solutions for modern C developers to create efficient and well-structured programs
Jan 30, 2025
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Jan 30, 2025
Practical Linux Security Cookbook
Jan 30, 2025
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
Jan 27, 2025
PowerShell for Sysadmins: Workflow Automation Made Easy
Jan 27, 2025
PowerShell 7 for IT Professionals: A Guide to Using PowerShell 7 to Manage Windows Systems
Jan 27, 2025
Power BI: Moving Beyond the Basics of Power BI and Learning about DAX Language
Jan 25, 2025
PoC or GTFO, Volume 2
Jan 25, 2025
PoC or GTFO, Volume 3
Jan 25, 2025
PoC or GTFO, Volume 1
Jan 24, 2025
Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology
Jan 24, 2025
Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Jan 24, 2025
PGP & GPG: Email for the Practical Paranoid
Jan 22, 2025
Personal Digital Security: Protecting Yourself from Online Crime
Jan 22, 2025
Perform a web penetration test
Jan 22, 2025
Penetration Testing With Perl
Jan 22, 2025
Linux Forensics
Jan 21, 2025
Pentest Secrets: Breaking The Unbreakable Enterprise Security
Jan 21, 2025
Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools
Jan 21, 2025
Penetration Testing For Dummies
Jan 21, 2025
PASS the CompTIA Network+ Exam N10-007
Jan 20, 2025
Hands-On Red Team Tactics
Jan 20, 2025
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition: Discover risk mitigation strategies for modern threats
Jan 20, 2025
Metasploit 5.0 for Beginners - Second Edition: Perform penetration testing to secure your IT environment against threats and vulnerabilities
Jan 19, 2025
Cybersecurity Attacks - Red Team Strategies
Jan 19, 2025
Practical Web Penetration Testing
Jan 19, 2025
Network Security with pfSense
Jan 19, 2025
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
Jan 18, 2025
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Jan 18, 2025
OWASP Mobile Security Testing Guide
Jan 18, 2025
Software Architecture with C++: Design modern systems using effective architecture concepts, design patterns, and techniques with C++20
Jan 17, 2025
OSSTMM 3
Jan 17, 2025
MacOS and iOS Internals, Volume III: Security & Insecurity
Jan 17, 2025
MacOS and iOS Internals, Volume I: User Mode
Jan 17, 2025
Linux System Programming: Talking Directly to the Kernel and C Library
Jan 16, 2025
Understanding the Linux Kernel
Jan 16, 2025
Operator Handbook: Red Team + OSINT + Blue Team Reference
Jan 16, 2025
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
Jan 15, 2025
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Jan 15, 2025
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Jan 15, 2025
Ontologies with Python: Programming OWL 2.0 Ontologies with Python and Owlready2
Jan 15, 2025
Official (ISC)2 Guide to the CISSP-ISSMP CBK
Jan 15, 2025
Offensive Shellcode from Scratch: Get to grips with shellcode countermeasures and discover how to bypass them
Jan 14, 2025
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
Jan 14, 2025
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments
Jan 13, 2025
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Jan 13, 2025
NGINX Cookbook
Jan 13, 2025
Networking All-in-One For Dummies
Jan 13, 2025
Exam 98-366 Networking Fundamentals, 2nd Edition
Jan 12, 2025
Windows Server Administration Fundamentals
Jan 12, 2025
Network Security: Private Communication in a Public World
Jan 12, 2025
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
Jan 11, 2025
Network Security Assessment: Know Your Network
Jan 11, 2025
Network Security and Cryptography
Jan 11, 2025
Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI
Jan 11, 2025
Network Forensics: Tracking Hackers through Cyberspace
Jan 10, 2025
Network Design Cookbook: Architecting Cisco Networks
Jan 10, 2025
Network Connectivity: Concepts, Computation, and Optimization
Jan 10, 2025
National Cyber Summit (NCS) Research Track 2020
Jan 09, 2025
MSSQL Penetration Testing - Metasploit
Jan 09, 2025
MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410
Jan 09, 2025
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security
Jan 09, 2025
ModSecurity Handbook
Jan 08, 2025
Modern System Administration: Managing Reliable and Sustainable Systems
Jan 08, 2025
Modern Full-Stack Development: Using TypeScript, React, Node.js, Webpack, and Docker
Jan 08, 2025
Modern DevOps Practices: Implement and secure DevOps in the public cloud with cutting-edge tools, tips, tricks, and techniques
Jan 08, 2025
Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization
Jan 08, 2025
Mobile Deep Learning with TensorFlow Lite, ML Kit and Flutter
Jan 07, 2025
Mining Social Media: Finding Stories in Internet Data
Jan 07, 2025
Minimizing and Exploiting Leakage in VLSI Design
Jan 07, 2025
Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition
Jan 06, 2025
Migrating Linux to Microsoft Azure: A hands-on guide to efficiently relocating your Linux workload to Azure
Jan 06, 2025
Microsoft 365 Security Administration: MS-500 Exam Guide
Jan 06, 2025
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900
Jan 06, 2025
Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge
Jan 05, 2025
Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy
Jan 05, 2025
Microprocessor 5: Software and Hardware Aspects of Development, Debugging and Testing - The Microcomputer
Jan 05, 2025
Microprocessor 2: Communication in a Digital System
Jan 05, 2025
Microprocessor 1: Prolegomena - Calculation and Storage Functions - Models of Computation and Computer Architecture
Jan 04, 2025
Python 101: 2nd Edition
Jan 04, 2025
Metasploit: The Penetration Tester's Guide
Jan 04, 2025
Memory Systems: Cache, DRAM, Disk
Jan 04, 2025
Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders and malware attacks
Jan 04, 2025
Mastering Windows Group Policy: Control and secure your Active Directory environment with Group Policy
Jan 03, 2025
Mastering Python Forensics
Jan 03, 2025
Mastering Docker: Enhance your containerization and DevOps skills to deliver production-ready applications
Jan 03, 2025
Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
Jan 03, 2025
Mastering Cyber Intelligence: Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
Jan 03, 2025
Mastering Azure Security: Keeping your Microsoft Azure workloads safe, 2nd Edition
Jan 02, 2025
Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
Jan 02, 2025
Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS
Jan 02, 2025
Mastering Windows Security and Hardening: Secure and protect your Windows environment from cyber threats using zero-trust security principle
Jan 01, 2025
Mastering Palo Alto Networks
Jan 01, 2025
Mastering Modern Linux
Jan 01, 2025
Mastering Mobile Forensics
Jan 01, 2025
Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT
Dec 31, 2024
Mastering Windows Network Forensics and Investigation
Dec 31, 2024
Windows Internals - Part 2
Dec 31, 2024
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
Dec 31, 2024
Malware Forensics: Investigating and Analyzing Malicious Code
Dec 30, 2024
Malware Forensics Field Guide for Windows Systems
Dec 30, 2024
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Dec 30, 2024
Machine Learning Mastery With Python: Understand Your Data, Create Accurate Models and Work Projects End-To-End
Dec 30, 2024
Machine Learning for Cybersecurity: Innovative Deep Learning Solutions
Dec 29, 2024
LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202
Dec 29, 2024
Lock Picking for Beginners: A Complete Step-by-Step Visual Guide on How to Pick Locks with Simple Tools Using Quick and Effective Techniques
Dec 29, 2024
LOCK PICKING EQUIPMENT FOR BEGINNERS
Dec 29, 2024
LOCK PICKING: The Complete Guide for Beginners to Master the Art of Lock Picking Skills and Avoid Beginner Mistakes
Dec 28, 2024
LLVM Essentials: Become familiar with the LLVM infrastructure and start using LLVM libraries to design a compiler
Dec 28, 2024
Linux 101 hacks
Dec 28, 2024
Linux Command Line and Shell Scripting Bible
Dec 28, 2024
Linux System Administration for the 2020s
Dec 28, 2024
Linux Hardening in Hostile Networks
Dec 27, 2024
Linux Firewalls: Enhancing Security with nftables and Beyond: Enhancing Security with nftables and Beyond
Dec 27, 2024
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Dec 27, 2024
Linux System Administration: Solve Real-life Linux Problems Quickly
Dec 27, 2024
Linux Server Security: Hack and Defend
Dec 27, 2024
Linux Kernel Debugging: Leverage proven tools and advanced techniques to effectively debug Linux kernels and kernel modules
Dec 25, 2024
Linux Inside
Dec 25, 2024
Linux Fundamentals
Dec 25, 2024
Linux for Networking Professionals: Securely configure and operate Linux network services for the enterprise
Dec 25, 2024
Linux For Hacking - Install Test And Hack
Dec 25, 2024
Linux: Embedded Development
Dec 24, 2024
Linux Command Line and Shell Scripting Bible
Dec 24, 2024
Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
Dec 24, 2024
Learning iOS Forensics
Dec 24, 2024
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
Dec 24, 2024
Learning Java by Building Android Games
Dec 23, 2024
Learning the vi and Vim Editors: Text Processing at Maximum Speed and Power
Dec 23, 2024
Learning Nessus for Penetration Testing
Dec 23, 2024
Learning Metasploit Exploitation and Development
Dec 23, 2024
Learning Linux Binary Analysis
Dec 22, 2024
Learning DevOps - Second Edition
Dec 22, 2024
Learn to Program with Kotlin: From the Basics to Projects with Text and Image Processing
Dec 22, 2024
Learn PowerShell in a Month of Lunches, Fourth Edition
Dec 22, 2024
Learn Linux Quickly: A Friendly Guide to Easily Master the World's Most Powerful Operating System
Dec 21, 2024
Learn How to Hack Like a Pro
Dec 21, 2024
Learn Computer Forensics - Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence
Dec 21, 2024
Laptops For Dummies
Dec 21, 2024
Kubernetes Security and Observability
Dec 20, 2024
Kubernetes Security - Operating Kubernetes Clusters and Applications Safely
Dec 20, 2024
Keyboard Shortcuts For Data Scientists
Dec 20, 2024
Kali Linux Reference Guide: A Pentester's Voyage
Dec 20, 2024
Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
Dec 20, 2024
Kali Linux Wireless Penetration Testing Beginner's Guide
Dec 20, 2024
Kali Linux Revealed: Mastering the Penetration Testing Distribution
Dec 20, 2024
Kali Linux Ctf Blueprints
Dec 19, 2024
Kali Linux
Dec 19, 2024
JNCIP: Juniper Networks Certified Internet Professional Study Guide
Dec 19, 2024
Jumpstarting the Raspberry Pi Zero W: Control the World Around You with a $10 Computer
Dec 19, 2024
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Dec 19, 2024
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide
Dec 19, 2024
ISO/IEC 9899:1999, Programming languages -- C
Dec 19, 2024
JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron
Dec 17, 2024
(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test
Dec 17, 2024
ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide
Dec 17, 2024
IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT
Dec 17, 2024
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
Dec 17, 2024
iOS Application Security: The Definitive Guide for Hackers and Developers
Dec 17, 2024
iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics
Dec 17, 2024
Investigating Windows Systems
Dec 16, 2024
Investigating Internet Crimes
Dec 16, 2024
Introduction to Computer Organization
Dec 16, 2024
Introduction to Compiler Design
Dec 16, 2024
Incident Response Techniques for Ransomware Attacks
Dec 16, 2024
Incident Response with Threat Intelligence
Dec 16, 2024
Incident Response & Computer Forensics, Third Edition
Dec 15, 2024
Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration
Dec 15, 2024
Implementing Effective Code Reviews: How to Build and Maintain Clean Code
Dec 15, 2024
Implementing Cryptography Using Python
Dec 15, 2024
Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide
Dec 15, 2024
Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,
Dec 15, 2024
Implementing Cisco IP Switch Networks (300-115)
Dec 15, 2024
IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over
Dec 15, 2024
IBM b-type Gen 7 Installation, Migration, and Best Practices Guide
Dec 15, 2024
Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud
Dec 15, 2024
How Linux Works, 3rd Edition: What Every Superuser Should Know
Dec 15, 2024
How to Measure Anything in Cybersecurity Risk
Dec 15, 2024
How to Hack Like a Legend: Breaking Windows
Dec 13, 2024
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
Dec 13, 2024
History of REvil
Dec 13, 2024
Hiding from the Internet: Eliminating Personal Online Information
Dec 13, 2024
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis
Dec 12, 2024
Hash Crack: Password Cracking Manual v.3
Dec 12, 2024
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
Dec 12, 2024
Hardware Security: A Hands-on Learning Approach
Dec 12, 2024
Hands-On Penetration Testing on Windows
Dec 11, 2024
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Dec 11, 2024
Hands-On Chatbots and Conversational UI Development
Dec 11, 2024
Hands-On Penetration Testing with Kali NetHunter
Dec 11, 2024
Handbook for CTFers
Dec 10, 2024
Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook
Dec 10, 2024
Hacking: The Art of Exploitation, 2nd Edition
Dec 10, 2024
Hacking Android
Dec 10, 2024
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Dec 08, 2024
Hacking Kubernetes: Threat-Driven Analysis and Defense
Dec 08, 2024
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future
Dec 08, 2024
Hacking Exposed: Malware & Rootkits Secrets & Solutions
Dec 08, 2024
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur
Dec 08, 2024
Hacking APIs: Breaking Web Application Programming Interfaces
Dec 08, 2024
Hacking SaaS: An Insider's Guide to Managing Software Business Success
Dec 08, 2024
Hacking Multifactor Authentication
Dec 08, 2024
HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX
Dec 07, 2024
Hacking VoIP: Protocols, Attacks, and Countermeasures
Dec 07, 2024
Hacking the Xbox: An Introduction to Reverse Engineering
Dec 07, 2024
Hacking Gps
Dec 07, 2024
Hacking For Dummies
Dec 07, 2024
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Dec 07, 2024
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
Dec 06, 2024
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition
Dec 06, 2024
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools
Dec 06, 2024
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Dec 05, 2024
Google Hacking for Penetration Testers
Dec 05, 2024
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo
Dec 05, 2024
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense
Dec 05, 2024
Go Programming Language For Dummies
Dec 05, 2024
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Dec 05, 2024
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy
Dec 05, 2024
Get Programming with Go
Dec 05, 2024
Game Hacking: Developing Autonomous Bots for Online Games by Cano
Dec 05, 2024
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU
Dec 05, 2024
Fuzzing for Software Security
Dec 04, 2024
Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL
Dec 04, 2024
Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL
Dec 04, 2024
Full Stack Python Security: Cryptography, TLS, and attack resistance
Dec 04, 2024
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
Dec 04, 2024
Foundational Java: Key Elements and Practical Programming
Dec 04, 2024
Linux All-In-One For Dummies
Dec 04, 2024
Flutter for Beginners
Dec 04, 2024
FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES
Dec 03, 2024
Finding Beacons in the Dark
Dec 03, 2024
Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!
Dec 03, 2024
Ethical Hacker's Certification Guide (CEHv11)
Dec 03, 2024
Ethical Hacking-Joe Grant
Dec 03, 2024
Ethical Hacking: Techniques, Tools, and Countermeasures
Dec 03, 2024
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
Dec 03, 2024
Essential Of Artificial Intelligence
Dec 03, 2024
Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World
Dec 02, 2024
Enterprise Level Security 1 & 2
Dec 02, 2024
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
Dec 02, 2024
Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide
Dec 02, 2024
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
Dec 02, 2024
Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow
Dec 02, 2024
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Dec 02, 2024
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
Dec 02, 2024
Embedded Linux Development Using Yocto Project
Dec 02, 2024
Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming
Dec 01, 2024
Eleventh Hour CISSP: Study Guide
Dec 01, 2024
Reversing: Secrets of Reverse Engineering
Dec 01, 2024
Efficient Linux at the Command Line: Boost Your Command-Line Skills
Dec 01, 2024
Effective Cybersecurity: A Guide to Using Best Practices and Standards
Dec 01, 2024
Effective C: An Introduction to Professional C Programming
Dec 01, 2024
Easy Learning Design Patterns Javascript: Build Better Coding and Design Patterns
Dec 01, 2024
Dynamically Enabled Cyber Defense
Nov 28, 2024
Drones to Go: A Crash Course for Scientists and Makers
Nov 28, 2024
Docker Cookbook: Solutions and Examples for Building Distributed Applications
Nov 28, 2024
Docker in Practice
Nov 28, 2024
Cyber Intelligence Report: 2020 Quarter 1: Dive Into the 5th Domain: Threat Intelligence
Nov 28, 2024
Distributed Denial of Service Attacks: Real-world Detection and Mitigation
Nov 28, 2024
Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats
Nov 28, 2024
Digital Security: Cyber Terror and Cyber Security
Nov 28, 2024
Digital Forensics in the Era of Artificial Intelligence
Nov 28, 2024
Digital Forensics Explained
Nov 27, 2024
Digital Forensics Basics: A Practical Guide Using Windows OS
Nov 27, 2024
Elsevier's Dictionary of Information Security
Nov 27, 2024
DevOps and Containers Security: Security and Monitoring in Docker Containers
Nov 27, 2024
DevOps Troubleshooting: Linux Server Best Practices
Nov 27, 2024
Designing Secure Software: A Guide for Developers
Nov 27, 2024
Designing BSD Rootkits: An Introduction to Kernel Hacking
Nov 27, 2024
Deployment CISCO SD-WAN LAB ON EVE-NG
Nov 27, 2024
Demystifying Intelligent Multimode Security Systems
Nov 27, 2024
Demystified Object-Oriented Programming with C++
Nov 27, 2024
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance
Nov 26, 2024
Data Science Projects with Python - Second Edition
Nov 26, 2024
The DataOps Revolution
Nov 26, 2024
Database Security: Problems and Solutions
Nov 26, 2024
Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime
Nov 26, 2024
Data Science on the Google Cloud Platform
Nov 26, 2024
Data Science Crash Course for Beginners: Fundamentals and Practices with Python
Nov 26, 2024
Data Pipelines with Apache Airflow
Nov 26, 2024
Data Communications and Networking
Nov 25, 2024
Data Center Handbook: Plan, Design, Build, and Operations of a Smart Data Center
Nov 25, 2024
Data Analytics for Cybersecurity
Nov 25, 2024
Data Privacy: A runbook for engineers
Nov 25, 2024
Data Analysis with Python and PySpark
Nov 25, 2024
Data Analysis And Visualization
Nov 25, 2024
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Nov 24, 2024
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back
Nov 24, 2024
Scratch 3 Programming Playground: Learn to Program by Making Cool Games
Nov 24, 2024
Data Center Handbook
Nov 24, 2024
Cyberwarfare: Threats to Critical Infrastructure
Nov 24, 2024
Cybersecurity Fundamentals
Nov 24, 2024
Cybersecurity for Beginners: How to prevent Phishing & Social Engineering Attacks
Nov 24, 2024
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Nov 24, 2024
Cybercrime Investigators Handbook
Nov 24, 2024
Cyberjutsu: Cybersecurity for the Modern Ninja
Nov 23, 2024
Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security
Nov 23, 2024
Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic Security
Nov 23, 2024
Cyber Forensics
Nov 23, 2024
Cyber Security and IT Infrastructure Protection
Nov 23, 2024
Cyber Security: The complete guide to cyber threats and protection
Nov 23, 2024
Cyber Risks and Insurance: The Legal Principles
Nov 22, 2024
Cyber Crime Investigator's Field Guide
Nov 22, 2024
Cuckoo Malware Analysis
Nov 22, 2024
Cryptography and Network Security: Principles and Practice
Nov 22, 2024
SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition
Nov 22, 2024
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Nov 22, 2024
Cryptography and Network Security
Nov 22, 2024
The Security Risk Assessment Handbook
Nov 22, 2024
The Art of Linux Kernel Design
Nov 21, 2024
Secure Data Science
Nov 21, 2024
Container Security: Fundamental Technology Concepts that Protect Containerized Applications
Nov 21, 2024
Computer Science Distilled: Learn the Art of Solving Computational Problems
Nov 21, 2024
Computer Networking and Cybersecurity
Nov 21, 2024
Computer Security -- ESORICS 2013
Nov 21, 2024
Computer Graphics from Scratch: A Programmer's Introduction to 3D Rendering
Nov 21, 2024
Computer Forensics With Ftk
Nov 21, 2024
Computer Forensics and Cyber Crime
Nov 21, 2024
Computer and Network Security Essentials
Nov 20, 2024
CompTIA Security+: SY0-601 Certification Guide - Second Edition: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+
Nov 20, 2024
CompTIA Security+ Certification Practice Exams, Fourth Edition
Nov 20, 2024
CompTIA Network+ N10_007 Practice Exam Questions
Nov 20, 2024
Mike Meyers' CompTIA Network+ Certification Passport, Seventh Edition - Exam N10-008
Nov 20, 2024