| 1 |
|
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
by
really liked it 4.00 avg rating — 6 ratings
Joe
rated it 4 stars
See Review
|
|
| 2 |
|
Nmap: Network Exploration and Security Auditing Cookbook
by
4.12 avg rating — 8 ratings
|
|
| 3 |
|
Mastering pfSense,: Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4, 2nd Edition
by
3.50 avg rating — 2 ratings
|
|
| 4 |
|
Network Analysis Using Wireshark 2 Cookbook: Practical Recipes to Analyze and Secure Your Network Using Wireshark 2
by
really liked it 4.00 avg rating — 4 ratings
|
|
| 5 |
|
Hands-On Cybersecurity for Architects: Plan and design robust security architectures
by
2.17 avg rating — 6 ratings
|
|
| 6 |
|
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
by
4.13 avg rating — 70 ratings
|
|
| 7 |
|
Mastering Kali Linux for Advanced Penetration Testing
by
4.14 avg rating — 36 ratings
|
|
| 8 |
|
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
by
3.38 avg rating — 16 ratings
|
|
| 9 |
|
CompTIA Security+ Certification Guide: Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
by
3.71 avg rating — 14 ratings
|
|
| 10 |
|
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
by
4.25 avg rating — 4 ratings
|
|
| 11 |
|
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
by
4.17 avg rating — 35 ratings
|
|
| 12 |
|
Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents
by
really liked it 4.00 avg rating — 26 ratings
|
|
| 13 |
|
Industrial Cybersecurity: Efficiently secure critical infrastructure systems
by
4.09 avg rating — 23 ratings
|
|
| 14 |
|
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
by
4.20 avg rating — 10 ratings
|
|
| 15 |
|
Hands-On Penetration Testing on Windows: Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
by
4.33 avg rating — 3 ratings
|
|
| 16 |
|
Metasploit for Beginners: Create a threat-free environment with the best-in-class tool
by
2.71 avg rating — 7 ratings
|
|
| 17 |
|
Web Penetration Testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition
by
1.50 avg rating — 2 ratings
|
|