Free Delivery Over $100
9855 books were found.
Written as an interactive tutorial, this book covers the core of Kali Linux with realworld examples and step by... Read More >>
The book is written to suit an easyreading style, using typical problems in access control to illustrate the need... Read More >>
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This... Read More >>
Privacy-Preserving Machine Learning is a practical guide to keeping ML data anonymous and secure. You'll learn the... Read More >>
"Numerous sample programs & examples demonstrating the application of python tools to streamline network automation... Read More >>
"""RAND researchers examine the reasons behind Russia's evolution toward a unified strategic operation, as well... Read More >>
This book helps you set up your own virtual and portable forensic lab and guides on memory analysis and full forensic... Read More >>
A practical guide to mastering C# and .NET MAUI to build native cross-platform apps with a single codebase Purchase... Read More >>
"This book is the third volume in the ""Ethical Hacking"" series, which is a set of 21 comprehensive guides designed... Read More >>
Secure your business in a post-pandemic world: Master digital risk identification and defense Purchase of the print... Read More >>
Read More >>
This book includes high-quality research papers presented at the Fourth International Conference on Communication,... Read More >>
Effective cyber security strategy requires creating a culture of security awareness. As remote work and new technologies... Read More >>
50+ Sample Automation Programs across Configuration Management, Container Orchestration, Kubernetes, and Cloud Networking... Read More >>
"""Mastering Go Network Administration"" is a structured beginning for network administrators looking to improve... Read More >>
This book features selected papers presented at the 4th International Conference on Recent Innovations in Computing... Read More >>
"""Behavioral Game Theory Analysis of Cybersecurity With Deception and IDS"" presents a comprehensive study of cybersecurity... Read More >>
Behavior-based authentication is a relatively new approach that has gained traction in recent years for protecting... Read More >>
The book offers an essential overview for researchers who are new to the field, while also equipping them to explore... Read More >>
"In today's world, smartphones have become an integral part of our lives, and we use them for various purposes such... Read More >>
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for... Read More >>
It's been 50 years since the discipline of cybersecurity originated, but users and developers still spread and succumb... Read More >>