Cisco Networks Engineers‘ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cisco Networks Engineers‘ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

Cisco Networks Engineers‘ Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA — Second Edition — Chris Carthern William Wilson Noel Rivera

Download for Windows

Company: Cisco

Visit Company Website

Hacking Of Computer Network
Hacking Of Computer Network

Download for Windows

Company: By Hidaia Mahmood Alassouli

Visit Company Website

Packet Attacking & Exploiting Modern Web.Applications
Packet Attacking & Exploiting Modern Web.Applications

This book is aimed at anyone who must ensure their organization’s security. It’s for penetration testers and red teamers who want to deepen their knowledge of the current security challenges for web applications, Developers and DevOps Engineers who want to get into the mindset of an attacker, and Security Managers and Chief Information Security Officers (CISOs) who want to truly understand the impact and risk of the Web, IoT, and smart contracts from an attacker’s point of view.

Download for Windows

Company: Packt

Visit Company Website

Cloud Attack Vector
Cloud Attack Vector

Building Effective Cyber-Defense Strategies to Protect Cloud Resources

Download for Windows

Company: Apress

Visit Company Website

Arm Assembly Internals & Reverse Engineering
Arm Assembly Internals & Reverse Engineering

Part I Arm Assembly Internals 1 Chapter 1 Introduction to Reverse Engineering 3 Chapter 2 ELF File Format Internals 21 Chapter 3 OS Fundamentals 69 Chapter 4 The Arm Architecture 93 Chapter 5 Data Processing Instructions 129 Chapter 6 Memory Access Instructions 195 Chapter 7 Conditional Execution 243 Chapter 8 Control Flow 275 Part II Reverse Engineering 305 Chapter 9 Arm Environments 307 Chapter 10 Static Analysis 321 Chapter 11 Dynamic Analysis 363 Chapter 12 Reversing arm64 macOS Malware

Download for Windows

Company:

Visit Company Website

IoT and OT SecurityHandbook
IoT and OT SecurityHandbook

Vasantha Lakshmi works at Microsoft India as a technology specialist and was previously a program manager. She holds the Certified Information System Security Professional (CISSP) certification, which aids in aligning with the industry standard of security. She has worked on various security products for the last 7 years. She has more than 12 years of experience working as an architect of end-to-end cybersecurity solutions (for devices, data, apps, O365, identity, and so on) for Microsoft 365. Her Prosci Certified Change Practitioner certification has also aided her on her journey to digitally transform organizations. She holds many other certifications, such as M365 Enterprise Administrator Expert, M365 Desktop Administrator Associate, SC-200, SC-300, and MS-500.

Download for Windows

Company: Packt

Visit Company Website

Empirical Cloud Security 2nd Edition
Empirical Cloud Security 2nd Edition

Devops engineers, penetration testers, cloud security engineers, and cloud software developers who are interested in learning practical approaches to cloud security. I assume that you understand the basics of cloud infrastructure, and that you are familiar with DevOps practices in which applications are developed and deployed with security, reliability, and agility baked

Download for Windows

Company: Mercury Learning and Information

Visit Company Website

HASH CRACK
HASH CRACK

cracking tool usage and supportive tools that assist network defenders and pentesters in password recovery (cracking). This manual will not be covering the installation of these tools, but will include references to their proper installation, and if all else fails, Google. Updates and additions to this manual are planned yearly as advancements in cracking evolve. Password recovery is a battle against math, time, cost, and human behavior. Much like any battle, the tactics are constantly evolving.ACK

Download for Windows

Company: Netmux

Visit Company Website

HACKING LINUX
HACKING LINUX

The emergence of viruses has caused huge losses to computers on the Internet. These viruses can cause the system to fail to operate normally, and the system will be formatted and data will be formatted. In order to prevent the harm caused by these viruses, users need to install anti-virus software on the computer and turn on real-time monitoring. In addition, due to the improvement of virus production techniques and means, new viruses are constantly appearing, so users need to upgrade anti-virus software in time, so that anti-virus software can prevent new viruses in the Internet.

Download for Windows

Company: PHIL J HACK

Visit Company Website

Introduction to Forensic and Criminal Psychology
Introduction to Forensic and Criminal Psychology

Pearson is dedicated to creating bias-free content that reflects the diversity, depth and breadth of all learners’ lived experiences. We embrace the many dimensions of diversity including, but not limited to, race, ethnicity, gender, sex, sexual orientation, socioeconomic status, ability, age and religious or political beliefs.

Download for Windows

Company: Pearson

Visit Company Website

Hybrid Cloud Security Patterns
Hybrid Cloud Security Patterns

cloud security remains an important focus area to both mitigate risk and achieve compliance. Leveraging his hands-on experience in building cloud delivered products, as well as solution engagements with customers to address their challenges, Sreekanth has done a wonderful job in outlining a practical approach to cloud security

Download for Windows

Company: Packt

Visit Company Website

Nmap Network Exploration and Security Auditing Cookbook Network
Nmap Network Exploration and Security Auditing Cookbook Network

Nmap and its scripts, advanced workflows, and configurations to fine-tune their scans. Seasoned users will find new applications and third-party tools that can help them manage scans and even take a leap to the next step and start developing their own Nmap Scripting Engine scripts.

Download for Windows

Company: Packt

Visit Company Website

Cardwell K Tactical Wireshark A Deep Dive into Intrusion Analysis
Cardwell K Tactical Wireshark A Deep Dive into Intrusion Analysis

Shyam Sundar Ramaswami is a Senior Staff Cyber Security Architect at GE Healthcare, and his areas of work include security research, healthcare forensics, offensive security, and defensive security for health-care products. Shyam is a two-time TEDx speaker, co-author of the book titled It’s Your Digital Life, and a teacher of cybersecurity. Shyam has delivered talks in top-notch international cybersecurity conferences like Black Hat, Qubit, Nullcon, Deepsec, and Hack fest. Shyam has delivered 100+ bootcamps on malware and memory forensics across the globe. Shyam runs a mentoring program called “Being Robin” where he mentors students all over the globe on cybersecurity. Interviews with him have been published on leading websites like ZDNet and CISO MAG.

Download for Windows

Company: Apress

Visit Company Website

Digital Forensics Basics
Digital Forensics Basics

Digital forensic field and you do not know where to start, this is your book! Digital Forensics Basics is your introductory guide to understanding and implementing digital forensics to investigate computer crime using Windows, the most widely used operating system

Download for Windows

Company: Apress

Visit Company Website

Database Security
Database Security

work will not beliable for damages of any kind arising out of the use of (or the inability to use) the algorithms, source code, computer programs, or textual material contained in this publication. This includes, but is not limited to, loss of revenue or profit, or other incidental, physical, or consequential damages arising out of the use of this Work.The data used throughout this text, including names of persons and companies are for instructional purposes only. They have been researched with care but are not guaranteed for any intent beyond their educational purpose.

Download for Windows

Company: Mercury Learning and Information

Visit Company Website

CISSP Cert Guide, 4th Edition.epub
CISSP Cert Guide, 4th Edition.epub

CISSP Cert Guide, Fourth Edition is a comprehensive exam study guide. Leading IT certification experts Robin Abernathy and Darren Hayes share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

Download for Windows

Company: Pearson IT Certification

Visit Company Website

PTES Technical Guideline
PTES Technical Guideline

PTES Technical Guideline

Download for Windows

Company: Night Watch LLC

Visit Company Website

Evading EDR
Evading EDR

Covers a specific EDR sensor or group of components used to collect some type of data. We begin by walking through how developers commonly implement the component,

Download for Windows

Company: Evading EDR

Visit Company Website

INTELLIGENT APPROACHES TO CYBER SECURITY
INTELLIGENT APPROACHES TO CYBER SECURITY

Intelligent Approaches to Cyber Security provides details of important cyber security threats and their mitigation and the influence of machine learning (ML), deep learning (DL) and blockchain technologies in the realm of cyber security

Download for Windows

Company: Narendra M Shekokar,Hari Vasudevan,.

Visit Company Website

USING AND ADMINISTERING LINUX
USING AND ADMINISTERING LINUX

This Linux course will allow you to learn Linux right from the beginning with the objective of becoming a SysAdmin

Download for Windows

Company: David Both

Visit Company Website