CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summary

Learning Linux Binary Analysis

Learning DevOps - Second Edition

Learn to Program with Kotlin: From the Basics to Projects with Text and Image Processing

Learn PowerShell in a Month of Lunches, Fourth Edition

Learn Linux Quickly: A Friendly Guide to Easily Master the World's Most Powerful Operating System

Learn How to Hack Like a Pro

Learn Computer Forensics - Second Edition: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence

Laptops For Dummies

Kubernetes Security and Observability

Kubernetes Security - Operating Kubernetes Clusters and Applications Safely

Keyboard Shortcuts For Data Scientists

Kali Linux Reference Guide: A Pentester's Voyage

Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition

Kali Linux Wireless Penetration Testing Beginner's Guide

Kali Linux Revealed: Mastering the Penetration Testing Distribution

Kali Linux Ctf Blueprints

Kali Linux

JNCIP: Juniper Networks Certified Internet Professional Study Guide

Jumpstarting the Raspberry Pi Zero W: Control the World Around You with a $10 Computer

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide

ISO/IEC 9899:1999, Programming languages -- C

JavaScript Everywhere: Building Cross-Platform Applications with GraphQL, React, React Native, and Electron

(ISC)2 Certified Information Systems Security Professional CISSP Realistic - Practice Test

ISACA Certified in Risk and Information Systems Control (CRISC) Exam Guide

IoT and OT Security Handbook: Assess risks, manage vulnerabilities, and monitor threats with Microsoft Defender for IoT

iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence

iOS Application Security: The Definitive Guide for Hackers and Developers

iOS 14 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics

Investigating Windows Systems

Investigating Internet Crimes

Introduction to Computer Organization

Introduction to Compiler Design

Incident Response Techniques for Ransomware Attacks

Incident Response with Threat Intelligence

Incident Response & Computer Forensics, Third Edition

Implementing VxRail HCI Solutions: A complete guide to VxRail Appliance administration and configuration

Implementing Effective Code Reviews: How to Build and Maintain Clean Code

Implementing Cryptography Using Python

Implementing and Administering Cisco Solutions 200-301 CCNA Exam Guide

Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking,

Implementing Cisco IP Switch Networks (300-115)

IEEE 802.3BW-2015 EEE Standard for Ethernet Amendment 1: Physical Layer Specifications and Management Parameters for 100 Mb/s Operation over

IBM b-type Gen 7 Installation, Migration, and Best Practices Guide

Hybrid Cloud Security Patterns: Leverage modern repeatable architecture patterns to secure your workloads on the cloud

How Linux Works, 3rd Edition: What Every Superuser Should Know

How to Measure Anything in Cybersecurity Risk

How to Hack Like a Legend: Breaking Windows

How to Catch a Phish: A Practical Guide to Detecting Phishing Emails

History of REvil

Hiding from the Internet: Eliminating Personal Online Information

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

Hash Crack: Password Cracking Manual v.3

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

Hardware Security: A Hands-on Learning Approach

Hands-On Penetration Testing on Windows

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Hands-On Chatbots and Conversational UI Development

Hands-On Penetration Testing with Kali NetHunter

Handbook for CTFers

Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook

Hacking: The Art of Exploitation, 2nd Edition

Hacking Android

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Hacking Kubernetes: Threat-Driven Analysis and Defense

Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future

Hacking Exposed: Malware & Rootkits Secrets & Solutions

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Hacking APIs: Breaking Web Application Programming Interfaces

Hacking SaaS: An Insider's Guide to Managing Software Business Success

Hacking Multifactor Authentication

HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX

Hacking VoIP: Protocols, Attacks, and Countermeasures

Hacking the Xbox: An Introduction to Reverse Engineering

Hacking Gps

Hacking For Dummies

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Google Hacking for Penetration Testers

Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo

Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

Go Programming Language For Dummies

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy

Get Programming with Go

Game Hacking: Developing Autonomous Bots for Online Games by Cano

Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU

Fuzzing for Software Security

Full-Stack React, TypeScript, and Node: Build cloud-ready web applications using React 17 with Hooks and GraphQL

Full Stack Serverless: Modern Application Development with React, AWS, and GraphQL

Full Stack Python Security: Cryptography, TLS, and attack resistance

From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Foundational Java: Key Elements and Practical Programming

Linux All-In-One For Dummies

Flutter for Beginners

FIREWALLS DON'T STOP DRAGONS: A STEP-BY-STEP GUIDE TO COMPUTER SECURITY FOR NON-TECHIES

Finding Beacons in the Dark

Ethical Hacking 101: How to conduct professional pentestings in 21 days or less!

Ethical Hacker's Certification Guide (CEHv11)

Ethical Hacking-Joe Grant

Ethical Hacking: Techniques, Tools, and Countermeasures

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

Essential Of Artificial Intelligence

Enterprise Level Security 2: Advanced Techniques for Information Technology in an Uncertain World

Enterprise Level Security 1 & 2

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

Enterprise Cloud Adminstration (ECA) 5.15 - Course Guide

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Encyclopedia of Criminal Activities and the Deep Web by Mehdi Khosrow

Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Embedded Linux Development Using Yocto Project

Eloquent JavaScript, 3rd Edition: A Modern Introduction to Programming

Eleventh Hour CISSP: Study Guide

Reversing: Secrets of Reverse Engineering

Efficient Linux at the Command Line: Boost Your Command-Line Skills

Effective Cybersecurity: A Guide to Using Best Practices and Standards

Effective C: An Introduction to Professional C Programming

Easy Learning Design Patterns Javascript: Build Better Coding and Design Patterns

Dynamically Enabled Cyber Defense

Drones to Go: A Crash Course for Scientists and Makers

Docker Cookbook: Solutions and Examples for Building Distributed Applications

Docker in Practice

Cyber Intelligence Report: 2020 Quarter 1: Dive Into the 5th Domain: Threat Intelligence

Distributed Denial of Service Attacks: Real-world Detection and Mitigation

Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats

Digital Security: Cyber Terror and Cyber Security

Digital Forensics in the Era of Artificial Intelligence

Digital Forensics Explained

Digital Forensics Basics: A Practical Guide Using Windows OS

Elsevier's Dictionary of Information Security

DevOps and Containers Security: Security and Monitoring in Docker Containers

DevOps Troubleshooting: Linux Server Best Practices

Designing Secure Software: A Guide for Developers

Designing BSD Rootkits: An Introduction to Kernel Hacking

Deployment CISCO SD-WAN LAB ON EVE-NG

Demystifying Intelligent Multimode Security Systems

Demystified Object-Oriented Programming with C++

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

Data Science Projects with Python - Second Edition

The DataOps Revolution

Database Security: Problems and Solutions

Data Security: Technical and Organizational Protection Measures against Data Loss and Computer Crime

Data Science on the Google Cloud Platform

Data Science Crash Course for Beginners: Fundamentals and Practices with Python

Data Pipelines with Apache Airflow

Data Communications and Networking

Data Center Handbook: Plan, Design, Build, and Operations of a Smart Data Center

Data Analytics for Cybersecurity

Data Privacy: A runbook for engineers

Data Analysis with Python and PySpark

Data Analysis And Visualization

Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More

A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend Them Back

Scratch 3 Programming Playground: Learn to Program by Making Cool Games

Data Center Handbook

Cyberwarfare: Threats to Critical Infrastructure

Cybersecurity Fundamentals

Cybersecurity for Beginners: How to prevent Phishing & Social Engineering Attacks

Cybersecurity First Principles: A Reboot of Strategy and Tactics

Cybercrime Investigators Handbook

Cyberjutsu: Cybersecurity for the Modern Ninja

Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security

Cyber Security: This book includes: Kali Linux for Hackers and Hacker Basic Security

Cyber Forensics

Cyber Security and IT Infrastructure Protection

Cyber Security: The complete guide to cyber threats and protection

Cyber Risks and Insurance: The Legal Principles

Cyber Crime Investigator's Field Guide

Cuckoo Malware Analysis

Cryptography and Network Security: Principles and Practice

SSLP Certified Secure Software Lifecycle Professional All-in-One Exam Guide, Third Edition

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Cryptography and Network Security

The Security Risk Assessment Handbook

The Art of Linux Kernel Design

Secure Data Science

Container Security: Fundamental Technology Concepts that Protect Containerized Applications

Computer Science Distilled: Learn the Art of Solving Computational Problems

Computer Networking and Cybersecurity

Computer Security -- ESORICS 2013

Computer Graphics from Scratch: A Programmer's Introduction to 3D Rendering

Computer Forensics With Ftk

Computer Forensics and Cyber Crime

Computer and Network Security Essentials

CompTIA Security+: SY0-601 Certification Guide - Second Edition: SY0-601 Certification Guide: Complete coverage of the new CompTIA Security+

CompTIA Security+ Certification Practice Exams, Fourth Edition

CompTIA Network+ N10_007 Practice Exam Questions

Mike Meyers' CompTIA Network+ Certification Passport, Seventh Edition - Exam N10-008

CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61

CompTIA Cloud+ Certification All-in-One Exam Guide - Exam CV0-003

CompTIA CASP+ CAS-004 Certification Guide

CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide

CompTIA A+ Core 2 Exam: Guide to Operating Systems and Security

Comptia A Plus Core 1 and Core 2 Exam Practice Questions & Dumps: 200+ Exam Questions for Comptia A+

CompTIA CASP+ CAS-004 Exam Guide

CompTIA Security+ Exam Study Guide

Penetration Testing And Network Defense

CompTIA PenTest+ Certification For Dummies

CompTIA Pentest+ Technology Workbook

Complete A+ Guide to IT Hardware and Software Lab Manual

Coding Art: The Four Steps to Creative Programming with the Processing Language

Coding Python : The Ultimate Tool To Progress Your Python Programming From Good To Great While Making Coding In Scratch Look Easy

Cloud Native Security

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance

Cloud Computing LPU

Clean Agile: Back to Basics

CISSP in 21 Days, Second Edition

CISSP Exam Cram

Cissp: 4 in 1- Beginner's Guide+ Guide to learn CISSP Principles+ The Fundamentals of Information Security Systems for CISSP Exam+ A Compreh

Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition

Practical Go: Building Scalable Network and Non-Network Applications

Practical Automation with PowerShell: Effective scripting from the console to the cloud

Penetration Testing with Shellcode

Agile Security Operations: Engineering for agility in cyber defense, detection, and response

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

Cisco Catalyst 9000 - A new era of intent-based networking

CISA Review Manual, 27th Edition

CISA Review Manual, 26th Edition

Certified Application Security Engineer | JAVA: Technology Workbook

The Official (ISC)2 CCSP CBK Reference

Certified Blackhat: Methodology to Unethical Hacking

Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications

CCNP R&S Practical Workbook

CCNA Voice Lab Manual

CC Certified in Cybersecurity All-in-One Exam Guide

Tactical Wireshark: A Deep Dive into Intrusion Analysis, Malware Incidents, and Extraction of Forensic Evidence

The Car Hacker's Handbook: A Guide for the Penetration Tester

C++20: Get the Details

C How to Program

Building an Effective Security Program

Building Mobile Apps at Scale: 39 Engineering Challenges

Bug Bounty Automation With Python

Cybersecurity Blue Team Strategies

Blockchains for Network Security: Principles, technologies and applications

Blockchain for Cybersecurity and Privacy

Black Hat GraphQL: Attacking Next Generation APIs

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Big Data Forensics: Learning Hadoop Investigations

Beyond the Basic Stuff with Python: Best Practices for Writing Clean Code

Beyond BIOS: Developing with the Unified Extensible Firmware Interface, Third Edition

Beginning Flutter: A Hands On Guide to App Development

Beginning Security with Microsoft Technologies

Networking with MikroTik: MTCNA Study Guide

Becoming The Hacker

Basic Security Testing With Kali Linux, Third Edition

Bash Quick Start Guide: Get up and running with shell scripting with Bash

Azure Security Cookbook

AWS Penetration Testing

AWS Certified Solutions Architect Associate: The ultimate guide for the SAA-C02 exam

AWS Certified Security - Specialty Exam Guide

Programming in Python 3

Automating DevOps with GitLab CI/CD Pipelines

Arm Assembly Internals and Reverse Engineering

Applied Text Analysis with Python

Applied Incident Response

API Testing and Development with Postman

Android Apps Security: Mitigate Hacking Attacks and Security Breaches

Android Programming for Beginners

Android Malware and Analysis

Android Security Internals: An In-Depth Guide to Android's Security Architecture

Pentesting Industrial Control Systems

Android Security: Attacks and Defenses

Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software

Anti-Hacker Tool Kit, Fourth Edition

Amazon Connect - Up and Running

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Aligning Security Operations with the MITRE ATT&CK Framework

Alice and Bob Learn Application Security

AI Self-Driving Cars Divulgement: Practical Advances In Artificial Intelligence And Machine Learning

Advanced API Security

Advanced Apple Debugging & Reverse Engineering

Advanced Programming in the UNIX Environment, 3rd Edition

Advanced Penetration Testing: Hacking the World's Most Secure Networks

Advanced Penetration Testing for Highly-Secured Environments

Learning Pentesting for Android Devices

Accelerated Windows Memory Dump Analysis

Raspberry Pi Cookbook: Software and Hardware Problems and Solutions

Practical Security for Agile and DevOps

6800 assembly language programming

101 Labs - CompTIA Network+

55 Ways to Have Fun With Google

The Art of Deception: Controlling the Human Element of Security

Practical Forensic Analysis of Artifacts on iOS and Android Devices

Practical Linux System Administration

Practical Security Automation

Nmap Network Exploration and Security Auditing Cookbook

Network Protocols for Security Professionals

The Road to React with Firebase: Your journey to master advanced React for business web applications

Reactive Programming with RxJS 5

Practical Social Engineering: A Primer for the Ethical Hacker

A Python Guide for Web Scraping

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Practical Memory Forensics: Jumpstart effective forensic analysis of volatile memory

Python for Cybersecurity: Using Python for Cyber Offense and Defense

Practical SQL, 2nd Edition: A Beginner's Guide to Storytelling with Data

Practical Malware Analysis

The Security Hippie

Practical Data Science with Jupyter

PHP 8 Quick Scripting Reference: A Pocket Guide to PHP Web Scripting

Privacy, Security And Forensics in The Internet of Things (IoT)

Pro ASP.NET Core 3 (Develop Cloud-Ready Web Applications Using MVC 3, Blazor, and Razor Pages)

Pro Angular 9: Build Powerful and Dynamic Web Apps

Ransomware Protection Playbook

Pro Active Directory Certificate Services

Python Tricks: A Buffet of Awesome Python Features

Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation

Python Basics A Practical Introduction to Python 3

The Foundations of Threat Hunting

Security Analytics A Data Centric Approach to Information Security

The Kubernetes Bible: The definitive guide to deploying and managing Kubernetes across major cloud platforms

OWASP Web Security Testing Guide WSTG

Warez: The Infrastructure and Aesthetics of Piracy

Reactive Programming with Kotlin (Second Edition): Learn RX with RxJava, RxKotlin and RxAndroid

Ransomware and Cybercrime

Unauthorised Access: Physical Penetration Testing For IT Security Teams

Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic

Response Evidence Preservation and Collection

RTFM - Red Team Field Manual v2

Real-World Bug Hunting: A Field Guide to Web Hacking

Red Team Guide A Practical Guide For Red Team And Offensive Security

Seeking the Truth from Mobile Evidence

SQL kurz und gut

Spring Security in Action

The PowerShell Scripting & Toolmaking Book

Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication

The Cybersecurity Playbook for Modern Enterprises

The Complete Book Of Locks And Locksmithing

Ten Strategies of a World Class Cybersecurity Operations Center

The Practice of Network Security Monitoring

The Nmap cookbook Beat the Beast

The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer (Cyber Secrets)

What Every Engineer Should Know About Cyber Security and Digital Forensics (ISSN)

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Mastering Linux System Administration

Data Engineering with Python

Data Networks, IP and the Internet: Protocols, Design and Operation

CPython Internals: Your Guide to the Python 3 Interpreter

Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid

CompTIA Network+ Practice Tests - Exam N10-008, 2nd Edition

Cybersecurity for Connected Medical Devices

Cybersecurity Ethics, Legal, Risks, and Policies

CompTIA Server+ Study Guide - Exam SK0-005, 2nd Edition

Cyber Security and Network Security

Linux Service Management Made Easy with systemd

Logging in Action With Fluentd, Kubernetes and more

Mastering Malware Analysis

Little Black Book of Lockpicking Lock opening and Bypass techniques

Linux Command Line and Shell Scripting Techniques

Machine Learning With PyTorch and Scikit-Learn

Microservices Security in Action

CYBER SECURITY - JOHN G. VOELLER

Mobile Forensics - The File Format Handbook

Microsoft Azure Fundamentals Certification and Beyond

Microsoft Exchange Server 2019 Administration Guide

Cyber Security and Digital Forensics - Challenges and Future Trends

CompTIA Linux+ Practice Tests - Exam XK0-005 Third Edition

Cloud Native Security Cookbook Recipes for a Secure Cloud

CISSP Cert Guide, 4th Edition

Microprocessor 4 Development Aspects and Architectures Evolution

MCSA Guide to Configuring Advanced Microsoft Windows Server 2012 /R2 Services, Exam 70-412

Machine Learning Automation with TPOT - Build, validate, and deploy

Linux Command Line - Getting Started with Bash and Shell Scripting

The Art of Mac Malware: The Guide to Analyzing Malicious Software

The DevOps Career Handbook

The Ultimate Kali Linux Book

The Art and Science of NFC Programming

The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime

Cybersecurity A Practical Engineering Approach

CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)

Certified Ethical Hacker (CEH) v11 312-50 Exam Guide

Theoretical Cybersecurity - Principles and Advanced Concepts

Think Like a Programmer - An Introduction to Creative Problem Solving

Complete A+ Guide to It Hardware and Software

CISSP For Dummies (For Dummies (Computer/Tech))

Machine Learning for Cybersecurity Cookbook

MR ROBOT Red Wheelbarrow by Sam Esmail, Courtney Looney

Microprocessor 3 Core Concepts Hardware Aspects by Philippe Darche

Practical Cloud Native Security with Falco

CEH – Certified Ethical Hacker v11 +1200 Exam Practice Questions

Network Flow Analysis by Michael W. Lucas

Official Google Cloud Certified Professional Cloud Architect

Network Security Strategies - Protect your network and enterprise

Open source Intelligence Tools and Resources Handbook

CISO Desk Reference Guide Executive Primer The Executive’s Guide

Cybersecurity Career Guide

Clean Code A Handbook of Agile Software Craftsmanship

Cybersecurity and Digital Forensics

CISM Certified Information Security Manager

Computer Programming For Beginners - 4 Books

CISSP Passport

CEH Certified Ethical Hacker Practice Exams, 5th Edition

Cybersecurity: The Beginner's Guide - A comprehensive guide to getting started in cybersecurity

Cloud Security Handbook

Cisco Certified CyberOps Associate 200-201 Certification Guide

Certified Information Systems Auditor (CISA) Cert Guide

CompTIA Cybersecurity Analyst (CSA+) Cert Guide

Hacking - How to Make Your Own Keylogger in C++ Programming Language

Hands On Blockchain Development in 7 Days

How Cybersecurity Really Works - A Hands On Guide for Total Beginners

Clean Code in JavaScript

Clean Architecture A Craftsmans Guide to Software Structure and Design

DEPLOYING JUNOS TIMING AND SYNCHRONIZATION

Cisco CCNA Command Guide

Deep LearningCrash Course for Beginners with Python

CEH v10 EC-Council Certified - Ethical Hacker

CCNA The Ultimate Beginners Guide Cisco Certified Network Associate

C# 8 0 in a Nutshell The Definitive Reference

C++ System Programming Cookbook

Breaking and Entering - The Extraordinary Story of a Hacker

IEEE Standard for Local and metropolitan area networks - Bridges and Bridged Networks

Bash Scripting Learning the bash Shell, 1st Edition by Bach,John

Beginners Step by step THEC64 Coding Course by Richard Stals

Blockchain with Hyperledger Fabric by Nitin Gaur, Anthony ODowd

Big Data Surveillance and Security Intelligence - The Canadian Case

Google Cloud Platform for Architects

Malware Data Science Attack Detection and Attribution

Learn Wireshark

Expert Linux Administration Guide

Hack the Cybersecurity Interview

Design of Intelligent Applications Using Machine Learning and Deep Learning Techniques

CYBER FORENSICS

Cryptography Algorithms A guide to algorithms in blockchain

Mastering Ubuntu A Beginners Guide

crypto dictionary curious cryptographer

Crime Science and Digital Forensics A Holistic View

Cracking the SQL Interview for Data Scientists

Cloud Attack Vectors

CCNP and CCIE Enterprise Core & CCNP Enterprise Advanced Routing

CCNP Security Virtual Private Networks SVPN 300-730

CCIE Enterprise Infrastructure Foundation, 2nd Edition

CASP+ CompTIA Advanced Security Practitioner Practice Tests Exam

Bug Bounty Playbook V2

Brute Forcing And Supply Chain Attacks

Azure Active Directory for Secure Application Development - Sjoukje Zaal

Bash Guide For Beginners

AZ-104T00 Microsoft Azure Administrator

AWS Certified Cloud Practitioner Exam Guide - Rajesh Daswani

AWS Certified Developer Associate Practice Tests 2020 - Examsdigest

AWS Certified Database Specialty DBS C01 Certification Guide - Kate Gawron

Brain Computer Interface - Narayan Panigrahi & Saraju P. Mohanty

Bash Idioms - Carl Albing and JP Vossen

Blue Team Handbook - Don Murdoch

ATTACKING NETWORK PROTOCOLS - James Forshaw

Begining React and Firebase - Nabendu Biswas

AWS for System Administrators - Prashant Lakhera

Android Hacker's Handbook - John Wiley & Sons, Inc.

ASP.NET.Core.Security - CHRISTIAN WENZ

Alcatel-Lucent Scalable IP Networks Self-Study Guide

Advanced Python Programming - Dr. Gabriele Lanaro, Quan Nguyen, Sakis Kasampalis

Active Directory Administration Cookbook - Sander Berkouwer

A Practical Guide to Database Design - Rex Hogan

A Complete Guide to Burp Suite - Sagar Rahalkar

100 Most Important C++ Programs - Bakran Ajas