Create account Create free account
Sign in
  • Home
    • Business
    • Career development
    • Data
    • Design
    • Hardware
    • Math Science Engineering
    • Other
    • Security
    • Software Development
    • System Administration
    • Travel Hobbies
    • Web Mobile
    • Recommendation
    • Trending Now

eBook Reading

Search Button
All Ebooks
Free Ebooks
Premium Ebooks
  • Title: A to Z
  • Title: Z to A
  • Release Date: Newest to Oldest
  • Release Date: Oldest to Newest
  • View ↓
  • View ↑

Search Results

1 - 30 of 98 results

Filter
Categories
  • All (35603)
  • Security(1455)
    • Network Security(98)
      • Oauth(7)
      • Ssh(1)
      • Hardening(16)
      • Firewalls(25)
      • Advanced Persistent Threat(17)
The Art of Attack Ebook only for VIP member

The Art of Attack

Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers Ebook only for VIP member

Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers

Adversarial Tradecraft in Cybersecurity Ebook only for VIP member

Adversarial Tradecraft in Cybersecurity

Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations Ebook only for VIP member

Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

Cyberjutsu Ebook only for VIP member

Cyberjutsu

Protective Security: Creating Military-Grade Defenses for Your Digital Business Ebook only for VIP member

Protective Security: Creating Military-Grade Defenses for Your Digital Business

The Ransomware Threat Landscape Ebook only for VIP member

The Ransomware Threat Landscape

Practical Threat Intelligence and Data-Driven Threat Hunting Ebook only for VIP member

Practical Threat Intelligence and Data-Driven Threat Hunting

Mastering Python for Networking and Security - Second Edition Ebooks for all member

Mastering Python for Networking and Security - Second Edition

The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Ebooks for all member

The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks

Network Security Strategies Ebook only for VIP member

Network Security Strategies

Aditya Mukherjee

Network Security, Firewalls, and VPNs, 3rd Edition Ebook only for VIP member

Network Security, Firewalls, and VPNs, 3rd Edition

J. Michael Stewart, Denise Kinsey

Mastering Palo Alto Networks Ebook only for VIP member

Mastering Palo Alto Networks

Tom Piens

Mastering Windows Security and Hardening Ebook only for VIP member

Mastering Windows Security and Hardening

Mark Dunkerley, Matt Tumbarello

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations Ebook only for VIP member

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

Morey J. Haber

Real-Time Phoenix Ebooks for all member

Real-Time Phoenix

Stephen Bussey

Mastering Linux Security and Hardening - Second Edition Ebook only for VIP member

Mastering Linux Security and Hardening - Second Edition

Donald A. Tevault

Advanced API Security: OAuth 2.0 and Beyond Ebooks for all member

Advanced API Security: OAuth 2.0 and Beyond

Prabath Siriwardena

Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 Ebooks for all member

Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

Abhishek Hingnikar, Yvonne Wilson

The Cybersecurity Playbook Ebook only for VIP member

The Cybersecurity Playbook

Allison Cerra

Tribe of Hackers Ebooks for all member

Tribe of Hackers

Jennifer Jin, Marcus J. Carey

Modern Defense in Depth Ebooks for all member

Modern Defense in Depth

Stephen Gates

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks Ebooks for all member

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Mike O'Leary

Securing Network Infrastructure Ebook only for VIP member

Securing Network Infrastructure

Sagar Rahalkar, Sairam Jetty

Framing the Threat Ebooks for all member

Framing the Threat

Imke Köhler

The Generation Myth Ebooks for all member

The Generation Myth

Dr. Michael J. Urick

A concise introduction to the NIS Directive - A pocket guide for digital service providers Ebook only for VIP member

A concise introduction to the NIS Directive - A pocket guide for digital service providers

Alan Calder

Network Scanning Cookbook Ebooks for all member

Network Scanning Cookbook

Sairam Jetty

Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies Ebook only for VIP member

Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Carey Parker

Network Vulnerability Assessment Ebook only for VIP member

Network Vulnerability Assessment

Sagar Rahalkar

  • The Art of Attack by Ebook only for VIP member

    The Art of Attack

    Author
    Release Date 2021/08

    Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of ....
  • Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers by Ebook only for VIP member

    Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers

    Author
    Release Date 2021/08

    Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. Adopting an....
  • Adversarial Tradecraft in Cybersecurity by Ebook only for VIP member

    Adversarial Tradecraft in Cybersecurity

    Author
    Release Date 2021/06

    Master cutting-edge techniques and countermeasures to protect your organization from live hackers. Learn how to harness cyber deception in your operations to gain an edge over the competition.Key FeaturesGain an advantage against live hackers in a competition or real computing environmentUnderstand ....
  • Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations by Ebook only for VIP member

    Multi-Site Network and Security Services with NSX-T: Implement Network Security, Stateful Services, and Operations

    Author
    Release Date 2021/05

    Know the basics of network security services and other stateful services such as NAT, gateway and distributed firewalls (L2-L7), virtual private networks (VPN), load balancing (LB), and IP address management. This book covers these network and security services and how NSX-T also offers integration ....
  • Cyberjutsu by Ebook only for VIP member

    Cyberjutsu

    Author
    Release Date 2021/04

    Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a cyber warfare specialist and former NSA developer, analyzes once-secret Japanese scrolls, drawing parallels to modern infosec concepts to prov....
  • Protective Security: Creating Military-Grade Defenses for Your Digital Business by Ebook only for VIP member

    Protective Security: Creating Military-Grade Defenses for Your Digital Business

    Author
    Release Date 2021/04

    This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-crit....
  • The Ransomware Threat Landscape by Ebook only for VIP member

    The Ransomware Threat Landscape

    Author
    Release Date 2021/02

    Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in p....
  • Practical Threat Intelligence and Data-Driven Threat Hunting by Ebook only for VIP member

    Practical Threat Intelligence and Data-Driven Threat Hunting

    Author
    Release Date 2021/02

    Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniquesKey FeaturesSet up an environment to centralize all data in an Elasticsearch, Logstash, and Kibana (ELK) server that enables threat huntingCarry out atomic hunts to start the threat h....
  • Mastering Python for Networking and Security - Second Edition by Ebooks for all member

    Mastering Python for Networking and Security - Second Edition

    Author
    Release Date 2021/01

    Tackle security and networking issues using Python libraries such as Nmap, requests, asyncio, and scapyKey FeaturesEnhance your Python programming skills in securing systems and executing networking tasksExplore Python scripts to debug and secure complex networksLearn to avoid common cyber events wi....
  • The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks by Ebooks for all member

    The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks

    Author
    Release Date 2020/12

    This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
  • Network Security Strategies by Aditya Mukherjee Ebook only for VIP member

    Network Security Strategies

    Author Aditya Mukherjee
    Release Date 2020/11

    Build a resilient network and prevent advanced cyber attacks and breachesKey FeaturesExplore modern cybersecurity techniques to protect your networks from ever-evolving cyber threatsPrevent cyber attacks by using robust cybersecurity strategiesUnlock the secrets of networ....
  • Network Security, Firewalls, and VPNs, 3rd Edition by J. Michael Stewart, 
            Denise Kinsey Ebook only for VIP member

    Network Security, Firewalls, and VPNs, 3rd Edition

    Author J. Michael Stewart , Denise Kinsey
    Release Date 2020/10

    Network Security, Firewalls, and VPNs, third Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet.
  • Mastering Palo Alto Networks by Tom Piens Ebook only for VIP member

    Mastering Palo Alto Networks

    Author Tom Piens
    Release Date 2020/09

    Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platformKey FeaturesUnderstand how to optimally use PAN-OS featuresBuild firewall solutions to safeguard local, cloud, and mobile networksProtec....
  • Mastering Windows Security and Hardening by Mark Dunkerley, 
            Matt Tumbarello Ebook only for VIP member

    Mastering Windows Security and Hardening

    Author Mark Dunkerley , Matt Tumbarello
    Release Date 2020/07

    Enhance Windows security and protect your systems and servers from various cyber attacksKey FeaturesProtect your device using a zero-trust approach and advanced security techniques Implement efficient security measures using Microsoft Intune, Configuration Manager, and A....
  • Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations by Morey J. Haber Ebook only for VIP member

    Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

    Author Morey J. Haber
    Release Date 2020/06

    See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization wi....
  • Real-Time Phoenix by Stephen Bussey Ebooks for all member

    Real-Time Phoenix

    Author Stephen Bussey
    Release Date 2020/03

    Give users the real-time experience they expect, by using Elixir and Phoenix Channels to build applications that instantly react to changes and reflect the application's true state. Learn how Elixir and Phoenix make it easy and enjoyable to create real-time applications ....
  • Mastering Linux Security and Hardening - Second Edition by Donald A. Tevault Ebook only for VIP member

    Mastering Linux Security and Hardening - Second Edition

    Author Donald A. Tevault
    Release Date 2020/02

    A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a L....
  • Advanced API Security: OAuth 2.0 and Beyond by Prabath Siriwardena Ebooks for all member

    Advanced API Security: OAuth 2.0 and Beyond

    Author Prabath Siriwardena
    Release Date 2019/12

    Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is conv....
  • Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 by Abhishek Hingnikar, Yvonne Wilson Ebooks for all member

    Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0

    Author Abhishek Hingnikar , Yvonne Wilson
    Release Date 2019/12

    Know how to design and use identity management to protect your application and the data it manages.At a time when security breaches result in increasingly onerous penalties, it is paramount that application developers and owners understand identity management and t....
  • The Cybersecurity Playbook by Allison Cerra Ebook only for VIP member

    The Cybersecurity Playbook

    Author Allison Cerra
    Release Date 2019/09

    The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can tak....
  • Tribe of Hackers by Jennifer Jin, Marcus J. Carey Ebooks for all member

    Tribe of Hackers

    Author Jennifer Jin , Marcus J. Carey
    Release Date 2019/08

    Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published asTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introd....
  • Modern Defense in Depth by Stephen Gates Ebooks for all member

    Modern Defense in Depth

    Author Stephen Gates
    Release Date 2019/04

    Despite deploying the latest security technologies, organizations still struggle to defend cloud-based web applications against sophisticated cyberattacks. Many companies have turned to the popular defense-in-depth (DiD) technique, but this multilayered approach ha....
  • Cyber Operations: Building, Defending, and Attacking Modern Computer Networks by Mike O'Leary Ebooks for all member

    Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

    Author Mike O'Leary
    Release Date 2019/03

    Know how to set up, defend, and attack computer networks with this revised and expanded second edition.You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and....
  • Securing Network Infrastructure by Sagar Rahalkar, Sairam Jetty Ebook only for VIP member

    Securing Network Infrastructure

    Author Sagar Rahalkar , Sairam Jetty
    Release Date 2019/03

    Plug the gaps in your network's infrastructure with resilient network security modelsKey FeaturesDevelop a cost-effective and end-to-end vulnerability management programExplore best practices for vulnerability scanning and risk assessmentUnderstand and implement n....
  • Framing the Threat by Imke Köhler Ebooks for all member

    Framing the Threat

    Author Imke Köhler
    Release Date 2019/03

    There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat,....
  • The Generation Myth by Dr. Michael J. Urick Ebooks for all member

    The Generation Myth

    Author Dr. Michael J. Urick
    Release Date 2019/02

    Many assumed characteristics of generational groupings are actually “myths,” meaning that generational stereotypes are not accurate across all members of a generation.This book explores the Generation Myth by highlighting the complexity of the “generation” concept ....
  • A concise introduction to the NIS Directive - A pocket guide for digital service providers by Alan Calder Ebook only for VIP member

    A concise introduction to the NIS Directive - A pocket guide for digital service providers

    Author Alan Calder
    Release Date 2018/11

    This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENIS....
  • Network Scanning Cookbook by Sairam Jetty Ebooks for all member

    Network Scanning Cookbook

    Author Sairam Jetty
    Release Date 2018/09

    Discover network vulnerabilities and threats to design effective network security strategiesKey FeaturesPlunge into scanning techniques using the most popular tools Effective vulnerability assessment techniques to safeguard network infrastructure Explore the Nmap S....
  • Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies by Carey Parker Ebook only for VIP member

    Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

    Author Carey Parker
    Release Date 2018/08

    Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure ....
  • Network Vulnerability Assessment by Sagar Rahalkar Ebook only for VIP member

    Network Vulnerability Assessment

    Author Sagar Rahalkar
    Release Date 2018/08

    Build a network security threat model with this comprehensive learning guideKey FeaturesDevelop a network security threat model for your organization Gain hands-on experience in working with network scanning and analyzing tools Learn to secure your network infrastr....
1 2 3 4 Next
  • Recommended
  • Privacy Policy
  • About