All Episodes
CyberSecurity Summary — 198 episodes
ITF+ CompTIA IT Fundamentals All-in-One Exam Guide, Second Edition (Exam FC0-U61)
CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
CCNA Certification Study Guide: Exam 200-301, Volume 2 (Sybex Study Guide)
Computer Networks: A Systems Approach (The Morgan Kaufmann Series in Networking)
Practical Guide to Security in the AWS Cloud
C++ For Dummies
Cisco Unified Contact Center Enterprise (Networking Technology: IP Communications)
5G Mobile and Wireless Communications Technology
Learn Linux Quickly: A beginner-friendly guide to getting up and running with the world's most powerful operating system
Cisco Voice Gateways and Gatekeepers (Networking Technology)
Exam Ref AZ-204 Developing Solutions for Microsoft Azure
Write Great Code, Volume 3: Engineering Software
Building Virtual Pentesting Labs for Advanced Penetration Testing
Building Telegram Bots: Develop Bots in 12 Programming Languages using the Telegram Bot API
What You Need to Know about Docker: The absolute essentials you need to get Docker up and running
Build Your Own Website: A Comic Guide to HTML, CSS, and WordPress
Azure DevOps Explained: Get started with Azure DevOps and develop your DevOps practices
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Bash Cookbook 1st Edition
bash Cookbook: Solutions and Examples for bash Users 2nd Edition
Beginning Ethical Hacking with Python
Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Autonomic Computing and Networking
Android Cookbook: Problems and Solutions for Android Developers
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
31 Days Before Your CCNA Security Exam: A Day-By-Day Review Guide for the IINS 210-260 Certification Exam
31 Days Before Your CCNA Routing & Switching Exam: A Day-by-Day Review Guide for the ICND1/CCent (100-105), ICND2 (200-105)
Implement NLP use-cases using BERT: Top Expert-Led Coding Interview Question Bank for Python Aspirants
CompTIA CySA+ Practice Exams: A Time Compressed Resource to Passing the CompTIA CySA+ (CS0-002) Exam on the First Attempt
Demystifying Azure DevOps Services: A Guide to Architect, Deploy, and Administer DevOps Using Microsoft Azure DevOps Services
MongoDB Complete Guide: Develop Strong Understanding of Administering MongoDB, CRUD Operations, MongoDB Commands, MongoDB Compass
Wi-Fi Hacking For Everyone
TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS
Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption
The Book of Batch Scripting: From Fundamentals to Advanced Automation
CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide (Certification Guide)
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW)
Computer Security: Principles and Practice
Cyber Security in the Age of Artificial Intelligence and Autonomous Weapons
Cybersecurity for Scada Systems
Network Forensics with Wireshark: Build Practical Expertise in Network Monitoring, Threat Detection, and Cyber Forensics with Wireshark
VCP-DCV for vSphere 7.x (Exam 2V0-21.20) Official Cert Guide (VMware Press Certification)
Practical Purple Teaming: The Art of Collaborative Defense
AWS Certified Cloud Practitioner CLF-C02 Cert Guide (Certification Guide)
Linux Bible
Malware Analysis Using Artificial Intelligence and Deep Learning
Huntpedia: Your Threat Hunting Knowledge Compendium
Architecting High-Performance Embedded Systems: Design and build high-performance real-time digital systems based on FPGAs
Write Great Code, Volume 1, 2nd Edition: Understanding the Machine
Unity Certified Programmer: Exam Guide: Expert tips and techniques to pass the Unity certification exam at the first attempt
Practical Microservices with Dapr and .NET: A developer's guide to building cloud-native applications using the Dapr event-driven runtime
Python Interview Questions: Brush up for your next Python interview with 240+ solutions on most common challenging interview questions
Social Engineering: The Art of Human Hacking
Permanent Record
Operating Systems: Internals and Design Principles
Okta Administration: Up and Running: Implement enterprise-grade identity and access management for on-premises and cloud apps
Microsoft Azure Administrator Exam Prep (AZ-104): Make Your Career with Microsoft Azure Platform Using Azure Administered Exam Prep
Buffer Overflow Attacks: Detect, Exploit, Prevent
Cisco CCNA Command Guide: An Introductory Guide for CCNA & Computer Networking Beginners
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
Terraform Cookbook: Recipes for Codifying Infrastructure
Ruby Data Structures and Algorithms
Reinforcement Learning for Cyber Operations: Applications of Artificial Intelligence for Penetration Testing
Ransomware: Penetration Testing and Contingency Planning (Cyber Shorts)
Build A SaaS App in Rails 7
Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects
Penetration Testing with Kali NetHunter: Hands-on Android and iOS penetration testing
Penetration Testing Step-By-Step Guide
React in Depth
Kubernetes for Developers
Inside Cyber Warfare: Mapping the Cyber Underworld
Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit
Component-Based Rails Applications: Large Domains Under Control
Hacker: Hack The System: The "Ethical" Python Hacking Guide
Ruby Programming: Building Future-proof Scalable Applications
Password Cracking with Kali Linux
Cybersecurity First Principles: A Reboot of Strategy and Tactics
Computer Science Distilled: Learn the Art of Solving Computational Problems (Code is Awesome)
Coding Democracy: How Hackers Are Disrupting Power, Surveillance, and Authoritarianism
Cisco CCNA Command Guide For Beginners And Intermediates: A Practical Step By Step Guide to Cisco CCNA Routing And Switching Command Line
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills
CCNA Cisco Certified Network Associate Exam (200-301): Technology Workbook with Practice Questions and Labs
CCNA: 3 in 1: Beginners Guide+ Simple and Effective Strategies+Advanced Method and Strategies to learn Routing and Switching Essentials
High Performance PostgreSQL for Rails: Reliable, Scalable, Maintainable Database Applications
Android Application Development Cookbook: Over 100 recipes to help you solve the most common problems faced by Android Developers today
Prompt Engineering: Empowering Communication
Programming Ruby 3.3: The Pragmatic Programmers' Guide (Pragmatic Programmers; Facets of Ruby
Productionizing AI: How to Deliver AI B2B Solutions with Cloud and Python
Pro Spring Boot 3 with Kotlin: In-Depth Guide to Best Practices for Cloud-Native and Microservices Development
PowerShell Fast Track: Hacks for Non-Coders
Software Testing: A Craftsman's Approach
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
Android Internals::Power User's View
5G Mobile Core Network: Design, Deployment, Automation, and Testing Strategies
5G LTE Narrowband Internet of Things (NB-IoT)
Windows Terminal Tips, Tricks, and Productivity Hacks: Optimize your command-line usage and development processes with pro-level techniques
Secrets of Network Cartography: A Comprehensive Guide to Nmap
Pro Ember Data: Getting Ember Data to Work with Your API
Practical Web Scraping for Data Science: Best Practices and Examples with Python
Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices
Practical LPIC-3 300: Prepare for the Highest Level Professional Linux Certification
Microsoft Azure Network Security (IT Best Practices - Microsoft Press)
Mastering Linux Security and Hardening: Protect your Linux systems from intruders, malware attacks, and other cyber threats
LPIC-1 Linux Professional Institute Certification Study Guide: Exam 101-500 and Exam 102-500
LPIC-1 Linux Professional Institute Certification Practice Tests: Exam 101-500 and Exam 102-500
Linux+ and LPIC-1 Guide to Linux Certification, Loose-leaf Version (MindTap Course List)
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence
CCNAv7: Introduction to Networks Companion Guide by Cisco
Introduction to Modern Cryptography: Third Edition (Chapman & Hall/CRC Cryptography and Network Security Series)
Introduction to Compiler Construction in a Java World
Hands-On Python Deep Learning for the Web: Integrating neural network architectures to build smart web apps with Flask, Django
Hacklog Volume 2 Web Hacking: Manuale sulla Sicurezza Informatica e Hacking Etico
GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
RxJS Cookbook for Reactive Programming: Discover 40+ real-world solutions for building async, event-driven web apps
React Key Concepts: An in-depth guide to React's core features
Prompt Engineering for Generative AI
C++20 Quick Syntax Reference: A Pocket Guide to the Language, APIs, and Library
Building Web Apps with Python and Flask: Learn to Develop and Deploy Responsive RESTful Web Applications Using Flask Framework
Building Machine Learning Systems Using Python: Practice to Train Predictive Models and Analyze Machine Learning Results with Real Use-Cases
Building Enterprise Blockchain Solutions on AWS: A Developer's Guide to Build, Deploy, and Managed Apps Using Ethereum, Hyperledger Fabric
Building Decentralized Blockchain Applications: Learn How to Use Blockchain as the Foundation for Next-Gen Apps
Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs
Blockchain in e-Governance: Driving the next Frontier in G2C Services
Beginning Java MVC 1.0: Model View Controller Development to Build Web, Cloud, and Microservices Applications
AWS Certified Machine Learning Specialty: MLS-C01 Certification Guide: The definitive guide to passing the MLS-C01 exam on the very first
The Fast-Track Guide to VXLAN BGP EVPN Fabrics: Implement Today’s Multi-Tenant Software-Defined Networks
The Pythonic Way: An Architect’s Guide to Conventions and Best Practices for the Design, Development, Testing, and Management of Enterprise
Traefik API Gateway for Microservices: With Java and Python Microservices Deployed in Kubernetes
Systems Analysis and Design Global Ed
Loose Leaf for Systems Analysis and Design
THE COMPLETE GUIDE TO COMPUTER HACKING: All What You Needs To Learn To Be An Amazing Hacker
Synchronizing 5G Mobile Networks
Statistics for Machine Learning: Implement Statistical methods used in Machine Learning using Python
Swift in 30 Days: Build iOS Apps by Learning Swift, Xcode, and SwiftUI in Just Four Weeks
Scalable Data Streaming with Amazon Kinesis: Design and secure highly available, cost-effective data streaming applications
Securing Social Networks in Cyberspace
Security for Telecommunications Networks (Advances in Information Security Book 40)
Enterprise Security Architecture: A Business-Driven Approach
Embracing Technology: Get Tech-Savvy by Learning About Your Computer, Smartphone, Internet, and Social Media Applications
Data Scientist Pocket Guide: Over 600 Concepts, Terminologies, and Processes of Machine Learning and Deep Learning Assembled Together
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
Cracking the Coding Interview: 189 Programming Questions and Solutions
Computer Networks, Global Edition
Computer Forensics: Incident Response Essentials
CompTIA Pentest+ (Practice Exams)
CISA – Certified Information Systems Auditor Study Guide: Aligned with the CISA Review Manual
Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing
The Active Defender: Immersion in the Offensive Security Mindset (Tech Today)
The Cybersecurity Manager's Guide: The Art of Building Your Security Program
Certificate of Cloud Auditing Knowledge Study Guide
Combating Crime on the Dark Web: Learn how to access the dark web safely and not fall victim to cybercrime
Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals
Wireless Network Simulation: A Guide using Ad Hoc Networks and the ns-3 Simulator
Zabbix 5 IT Infrastructure Monitoring Cookbook: Explore the new features of Zabbix 5 for designing, building, and maintaining your Zabbix
Beginning Blockchain: A Beginner's Guide to Building Blockchain Solutions
UX for XR: User Experience Design and Strategies for Immersive Technologies (Design Thinking)
Visual Studio Code for Python Programmers
Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future
Hands-on Data Virtualization with Polybase: Administer Big Data, SQL Queries and Data Accessibility Across Hadoop, Azure, Spark, Cassandra
Hands-on DevOps with Linux: Build and Deploy DevOps Pipelines Using Linux Commands, Terraform, Docker, Vagrant, and Kubernetes
Hands-on Penetration Testing for Web Applications: Run Web Security Testing on Modern Applications Using Nmap, Burp Suite and Wireshark
IBM Watson Solutions for Machine Learning: Achieving Successful Results Across Computer Vision, Natural Language Processing and AI Projects
Google Analytics Kickstarter Guide: Get Tips to Boost Your Traffic and Sales Using Google Analytics
Cloud Native Applications with Jakarta EE: Build, Design, and Deploy Cloud-Native Applications and Microservices with Jakarta EE
Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing
Linux Device Driver Development: Everything you need to start with device driver development for Linux kernel and embedded Linux
Enterprise DevOps for Architects: Leverage AIOps and DevSecOps for secure digital transformation
Five Principles for Deploying and Managing Linux in the Cloud
Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022
Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success
Losing the Cybersecurity War And What We Can Do to Stop It
Mastering Go: Harness the power of Go to build professional utilities and concurrent servers and services
MS-900 :Microsoft 365 Fundamentals: Exam Cram Notes
Navigating the Cybersecurity Career Path
Red Hat Enterprise Linux 8 Administration: Master Linux administration skills and prepare for the RHCSA certification exam
Solutions Architect's Handbook: Kick-start your solutions architect career by learning architecture design principles and strategies
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery)
Head First Go
HCISPP HealthCare Information Security and Privacy Practitioner All-in-One Exam Guide
Hands-on Pipeline as YAML with Jenkins: A Beginner's Guide to Implement CI/CD Pipelines for Mobile, Hybrid, and Web Applications
Hacking with Spring Boot 2.4: Classic Edition
Guide to Networking Essentials
From GSM to LTE-Advanced Pro and 5G: An Introduction to Mobile Networks and Mobile Broadband
Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders
Secure Access Service Edge (SASE) For Dummies
Machine Learning for High-Risk Applications: Approaches to Responsible AI
Reinventing ITIL in the Age of DevOps: Innovative Techniques to Make Processes Agile and Relevant
Python Ethical Hacking from Scratch: Think like an ethical hacker, avoid detection, and successfully develop, deploy, detect
Opportunistic Networks: Fundamentals, Applications and Emerging Trends
Open Source Security: Your Network More Secure With Open Source Tools
Networks
Network Performance and Security: Testing and Analyzing Using Open Source and Low-Cost Tools
Mastering Tableau 2021: Implement advanced business intelligence techniques and analytics with Tableau
MCSA Guide to Installation, Storage, and Compute with Microsoft Windows Server 2016, Exam 70-740 (Networking)
Mastering Power BI: Build Business Intelligence Applications Powered with DAX Calculations, Insightful Visualizations, Advanced BI Technique