Netzwerksicherheit

Mastering Modern Web Penetration Testing. Master the art of conducting modern pen testing attacks and techniques on your web application before the hacker does!

Prakhar Prasad, Rafay Baloch

Mastering NetScaler VPX. Learn how to deploy and configure all the available Citrix NetScaler features with the best practices and techniques you need to know

Rick Roetenberg, Marius Sandbu, Andy Paul

Mastering OAuth 2.0. Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework

Charles Bihis, Charles Bihis

Mastering Palo Alto Networks. Build, configure, and deploy network solutions for your infrastructure using features of PAN-OS - Second Edition

Tom Piens aka 'reaper', Kim Wens aka 'kiwi'

Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues

José Manuel Ortega

Mastering Python for Networking and Security. Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues - Second Edition

José Ortega

Mastering Python Forensics. Master the art of digital forensics and analysis with Python

Michael Spreitzenbarth, Johann Uhrmann

Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts

Paulino Calderon

Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition

Chris Childerhose

Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition

Mark Dunkerley, Matt Tumbarello

Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats

Andrew Crouthamel

Mastering Wireshark. Analyze data network like a professional by mastering Wireshark - From 0 to 1337

Charit Mishra, Piyush Verma

Metasploit 5.0 for Beginners. Perform penetration testing to secure your IT environment against threats and vulnerabilities - Second Edition

Sagar Rahalkar

Metasploit Bootcamp. The fastest way to learn Metasploit

Nipun Jaswal

Metasploit for Beginners. Create a threat-free environment with the best-in-class tool

Sagar Rahalkar

Metasploit Penetration Testing Cookbook. Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework - Third Edition

Daniel Teixeira, Abhinav Singh, Nipun Jaswal, Monika Agarwal

Metasploit. Receptury pentestera. Wydanie II

Abhinav Singh, Monika Agarwal

Metasploit Revealed: Secrets of the Expert Pentester. Build your defense against complex attacks

Sagar Rahalkar, Nipun Jaswal

Microsoft 365 Mobility and Security - Exam Guide MS-101. Explore threat management, governance, security, compliance, and device services in Microsoft 365

Nate Chamberlain

Microsoft 365 Security, Compliance, and Identity Administration. Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments

Peter Rising

Microsoft Defender for Cloud Cookbook. Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture

Sasha Kranjac

Microsoft Defender for Endpoint in Depth. Take any organization's endpoint security to the next level

Paul Huijbregts, Joe Anich, Justen Graves

Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment

Jordan Krause