Network security

Digital Forensics with Kali Linux. Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022.x - Third Edition

Shiva V. N. Parasram

Diving into Secure Access Service Edge. A technical leadership guide to achieving success with SASE at market speed

Jeremiah Ginn, David H. Brown

Docker Networking Cookbook. Click here to enter text

Jon Langemak

Effective Python Penetration Testing. Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and tools

Rejah Rehim

Electron Projects. Build over 9 cross-platform desktop applications from scratch

Denys Vuika

Empirical Cloud Security. A Guide To Practical Intelligence to Evaluate Risks and Attacks

Mercury Learning and Information, Aditya K. Sood

Ethernet. Biblia administratora

Charles E. Spurgeon, Joann Zimmerman

Ethical Password Cracking. Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking

James Leyte-Vidal

Etyczne łamanie haseł. John the Ripper, hashcat i inne zaawansowane techniki

James Leyte-Vidal

Executive's Cybersecurity Program Handbook. A comprehensive guide to building and operationalizing a complete cybersecurity program

Jason Brown

Firewall nie powstrzyma prawdziwego smoka, czyli jak zadbać o cyberbezpieczeństwo. Przewodnik dla niefachowców. Wydanie III

Carey Parker

Getting Started with FortiGate. This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations

Fabrizio Volpe, Rosato Fabbri

Getting Started with Web Components. Build modular and reusable components using HTML, CSS and JavaScript

Prateek Jadhwani

Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

SURI PULLEMLA, Santhosh Sivarajan

Hacking and Security. The Comprehensive Guide to Penetration Testing and Cybersecurity

Rheinwerk Publishing, Inc, Michael Kofler, Klaus Gebeshuber, ...

Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications

Carlos A. Lozano, Dhruv Shah, Riyaz Ahemed Walikar