goodhousekeepingk[..]
Unknown
reactapplicationa[..]
HTML5, JavaScript and jQuery 24-Hour Trainer
Dane Cameron
foodnetworkmagazi[..]
adversarialtradec[..] (1)
Computer Security and Encryption
S. R. Chauhan & S. Jangra
Natural Language Processing Fundamentals for Developers
Oswald Campesato
Data Science for IoT Engineers
P. G. Madhavan
Cybersecurity: A Self-Teaching Introduction
C.P. Gupta & K.K. Goyal
Data Analytics
Christopher Greco
Fintech Fundamentals
Len Mei, Ph.D.
Wireless Sensor Networks
S. R. Vijayalakshmi & S. Muruganand
Tech Trends Industrial Revolution
Dong-Jin Pyo, Jaejin Hwang & Youngjin Yoon
Data Visualization for Business Decisions
Andres Fortino
ultimatekalilinux[..]
Threat Hunting with Elastic Stack
Andrew Pease
privilegeescalati[..]
Privilege Escalation Techniques
Alexis Ahmed
practicalthreatin[..]
Practical Threat Intelligence and Data-Driven Threat Hunting
Valentina Palacín
practicalthreatin[..] (1)
practicalhardware[..]
Practical Hardware Pentesting
Jean-Georges Valle
pentestingindustr[..]
Pentesting Industrial Control Systems
Paul Smith
penetrationtestin[..]
Penetration Testing Azure for Ethical Hackers
David Okeyode , Karl Fosaaen
microsoftazuresec[..]
Microsoft Azure Security Technologies Certification and Beyond
David Okeyode
microsoft365secur[..] ms-500examguide
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
masteringwindowss[..]
Mastering Windows Security and Hardening
Mark Dunkerley & Matt Tumbarello
masteringpaloalto[..]
Mastering Palo Alto Networks
Tom Piens
masteringmicrosof[..]
Mastering Microsoft Endpoint Manager
Christiaan Brinkhoff , Per Larsen
masteringkalilinu[..]
Mastering Kali Linux for Advanced Penetration
Vijay Kumar Velu
masteringdefensiv[..]
Mastering Defensive Security
Cesar Bravo
malwareanalysiste[..]
Malware Analysis Techniques
Dylan Barker
learnwireshark
Learn Wireshark - Fundamentals of Wireshark.
Lisa Bock
keycloak identityandaccess[..]
Keycloak - Identity and Access Management for Modern Applications: ...
Stian Thorgersen & Pedro Igor Silva
industrialcyberse[..]
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
cybersecuritycare[..]
Cybersecurity Career Master Plan
Dr. Gerald Auger , Jaclyn "Jax" Scott , Jonathan Helmus , Kim ...
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes, Erdal Ozkaya
CompTIA Security+: SY0-601 Certification Guide, Second Edition
antivirusbypasste[..]
adversarialtradec[..]
Adversarial Tradecraft in Cybersecurity
Dan Borges
cybersecurity attackanddefenses[..]
threathuntingwith[..]
cyberwarfare truthtacticsandst[..]
Software Quality Assurance
Rajiv Chopra
Empirical Cloud Security: Practical Intelligence to Evaluate ...
Aditya K. Sood
Data Cleaning
SQL Pocket Primer