
Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux
Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux Author:by Karl Lane (Author...
Defensive Security with Kali Purple: Cybersecurity strategies using ELK Stack and Kali Linux Author:by Karl Lane (Author...
IT Audit Field Manual: Strengthen your cyber defense through proactive IT auditing Author:by Lewis Heuermann (Author) Pu...
Minimal CMake: Learn the best bits of CMake to create and share your own libraries and applications Author:by Tom Hulton...
Kubernetes – An Enterprise Guide: Master containerized application deployments, integrate enterprise systems, and achiev...
Explore Software Defined Radio: Use SDR to Receive Satellite Images and Space Signals Author:by Wolfram Donat (Author) P...
ROS 2 from Scratch: Get started with ROS 2 and create robotics applications with Python and C++ Author:by Edouard Renard...
IDS and IPS with Snort 3: Get up and running with Snort 3 and discover effective solutions to your security issues Autho...
Zabbix 7 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 7 for designing, building, and mainta...
Real-World Edge Computing: Scale, secure, and succeed in the realm of edge computing with Open Horizon Author:by Robert ...
LPIC-3 Virtualization and Containerization Study Guide: Certification Companion for the LPIC-3 305 Exam (Certification S...