
Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux
Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux Author:by Karl Lane (Author...

Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux Author:by Karl Lane (Author...

IT Audit Field Manual: Strengthen your cyber defense through proactive IT auditing Author:by Lewis Heuermann (Author) Pu...

Minimal CMake: Learn the best bits of CMake to create and share your own libraries and applications Author:by Tom Hulton...

Kubernetes – An Enterprise Guide: Master containerized application deployments, integrate enterprise systems, and achiev...

Explore Software Defined Radio: Use SDR to Receive Satellite Images and Space Signals Author:by Wolfram Donat (Author) P...

ROS 2 from Scratch: Get started with ROS 2 and create robotics applications with Python and C++ Author:by Edouard Renard...

IDS and IPS with Snort 3: Get up and running with Snort 3 and discover effective solutions to your security issues Autho...

Zabbix 7 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 7 for designing, building, and mainta...

Real-World Edge Computing: Scale, secure, and succeed in the realm of edge computing with Open Horizon Author:by Robert ...

LPIC-3 Virtualization and Containerization Study Guide: Certification Companion for the LPIC-3 305 Exam (Certification S...