Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

Adversarial Tradecraft in Cybersecurity. Offense versus defense in real-time computer conflict

Dan Borges

AWS Certified Cloud Practitioner Exam Guide. Build your cloud computing knowledge and build your skills as an AWS Certified Cloud Practitioner (CLF-C01)

Rajesh Daswani

Bezpiecznie już było. Jak żyć w świecie sieci, terrorystów i ciągłej niepewności

Paulina Polko, Roman Polko

Building a Cyber Resilient Business. A cyber handbook for executives and boards

Dr. Magda Lilia Chelly, Shamane Tan, Hai Tran

Cloud Auditing Best Practices. Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans

Shinesa Cambric, Michael Ratemo

Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory

Giuseppe Di Federico, Fabrizio Barcaroli

CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam

Mark Birch

Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare

Dr. Chase Cunningham

Cybersecurity and Privacy Law Handbook. A beginner's guide to dealing with privacy and security while keeping hackers at bay

Walter Rocchi

Cybersecurity Career Master Plan. Proven techniques and effective tips to help you advance in your cybersecurity career

Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, ...

Cybersecurity Leadership Demystified. A comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO

Dr. Erdal Ozkaya

Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career

Kenneth Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway

iOS Forensics for Investigators. Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

Gianluca Tiepolo

Learn Computer Forensics. Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence

William Oettinger

Machine Learning Security Principles. Keep data, networks, users, and applications safe from prying eyes

John Paul Mueller, Rod Stephens

Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition

Tom Piens aka 'reaper', Kim Wens aka 'kiwi'