Hacking

Would you like to get into the world of cybercrime and modern technologies? If so, you are sure to like our online library. Here you will find the books due to which you‘ll get to know methods used by hackers. You will also learn how to efficiently protect data as well as to test programs and spot bugs in them.

Cloud Forensics Demystified. Decoding cloud investigation complexities for digital forensic professionals

Ganesh Ramakrishnan, Mansoor Haqanee

Cloud Identity Patterns and Strategies. Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory

Giuseppe Di Federico, Fabrizio Barcaroli

Cloud Penetration Testing. Learn how to effectively pentest AWS, Azure, and GCP applications

Kim Crawley

Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack

Prashant Priyam

CMake Cookbook. Building, testing, and packaging modular software with modern CMake

Radovan Bast, Roberto Di Remigio

Coding Roblox Games Made Easy. The ultimate guide to creating games with Roblox Studio and Lua programming

Zander Brumbaugh

Combating Crime on the Dark Web. Learn how to access the dark web safely and not fall victim to cybercrime

Nearchos Nearchou

CompTIA CASP+ CAS-004 Certification Guide. Develop CASP+ skills and learn all the key topics needed to prepare for the certification exam

Mark Birch

CompTIA Network+ N10-008 Certification Guide. The ultimate guide to passing the N10-008 exam - Second Edition

Glen D. Singh

CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification

Ian Neil

CompTIA Security+: SY0-601 Certification Guide. Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt - Second Edition

Ian Neil

CompTIA Security+ SY0-701 Certification Guide. Master cybersecurity fundamentals and pass the SY0-701 exam on your first attempt - Third Edition

Ian Neil

Computer Networks in Packet Tracer for advanced users

Jerzy Kluczewski

Computer Networks in Packet Tracer for beginners

Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski

Computer Networks in Packet Tracer for intermediate users

Damian Strojek, Jerzy Kluczewski

Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801. Configure advanced Windows Server services for on-premises, hybrid, and cloud environments

Chris Gill, Shannon Kuehn

Crafting Secure Software. An engineering leader's guide to security by design

Greg Bulmash, Thomas Segura

Creative DIY Microcontroller Projects with TinyGo and WebAssembly. A practical guide to building embedded applications for low-powered devices, IoT, and home automation

Tobias Theel

Critical Infrastructure Security. Cybersecurity lessons learned from real-world breaches

Soledad Antelada Toledano

Cryptography Algorithms. A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption

Massimo Bertaccini

Cryptography Algorithms. Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography - Second Edition

Massimo Bertaccini

Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox

Digit Oktavianto, Iqbal Muhardianto

Cyber Minds. Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe

Shira Rubinoff

Cyber Warfare - Truth, Tactics, and Strategies. Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare

Dr. Chase Cunningham, Gregory J. Touhill