Skip to main content

Shopping Cart

You're getting the VIP treatment!

Item(s) unavailable for purchase
Please review your cart. You can remove the unavailable item(s) now or we'll automatically remove it at Checkout.
itemsitem
itemsitem

Recommended For You

Loading...

Linux eBooks

If you like Linux eBooks, then you'll love these top picks.
Showing 1 - 24 of 1385 Results
Skip side bar filters
  • Red Team Operator's Handbook

    Gain invaluable insights into the art of offensive cybersecurity

    Jumpstart your career in red team cybersecurity by mastering the art of planning, deploying, and mitigating modern cyber-attacks in a safe and controlled home lab environment. Key FeaturesMaster red team tools and techniques while developing an adversarial mindsetLearn to simulate cyberattacks and test the security posture of your network and systemsAcquire to elevate from red team hobbyist to ... Read more

    $32.99 USD

    PRE-ORDER

  • How to Switch from Windows to Linux at Home without Fear of Change, Aimed at Users with No Experience in Linux and with Amazing Results

    The main objective of the explanation in this installation is that the user can im-agine installing this operating system next to Windows either in a virtual machine or in a physical machine, fully aware of the intangibles they can expect from the new operating system.That you can install it next to Windows as a way to start working in the Linux en-vironment, but having Windows next to it to lose ... Read more

    $9.99 USD

    PRE-ORDER

  • Linux Basics for Hackers, 2nd Edition

    by OccupyTheWeb ...
    The second edition of this bestselling introduction to the Linux operating system for hackers and penetration testers has been fully updated and revised, covering the latest version of Kali.If you’re getting started along the exciting path of hacking, cybersecurity, and pentesting, this book is an excellent first step. Using Kali Linux—an advanced penetration testing distribution of Linux—you’ll ... Read more

    $23.99 USD

    PRE-ORDER

  • Black Hat Bash

    Bash Scripting for Hackers and Pentesters

    Master the art of offensive bash scripting. This highly practical hands-on guide covers chaining commands together, automating tasks, crafting living-off-the-land attacks, and more!Bash is one of the first building blocks that expert penetration testers learn. But every hacker, regardless of experience level, should know their way around a bash shell—its powerful scripting language lets you scale ... Read more

    $35.99 USD

    PRE-ORDER

  • Evasive Malware

    Understanding Deceptive and Self-Defending Threats

    by Kyle Cucci ...
    Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.Dive into the fascinating and terrifying world of evasive malware—malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting ... Read more

    $35.99 USD

    PRE-ORDER

  • Introduction to Kali Purple

    Protect critical IT assets with an all-in-one approach to cybersecurity

    by Karl Lane ...
    Leverage the offensive power of Kali Linux with the defensive power of a security operations center (SOC) for cybersecurity business and training purposesKey FeaturesGain practical experience in defensive security methodsLearn the correct process for acquiring, installing, and configuring a robust SOC from homeUnderstand how to train junior technicians and analysts through live demonstrations of ... Read more

    $39.99 USD

    PRE-ORDER

  • The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity

    Series series AAP Advances in Artificial Intelligence and Robotics
    With the ever-increasing threat of cyber-attacks, especially as the COVID-19 pandemic helped to ramp up the use of digital communications technology, there is a continued need to find new ways to maintain and improve cybersecurity. This new volume investigates the advances in artificial intelligence and soft computing techniques in cybersecurity. It specifically looks at cybersecurity during the ... Read more

    $169.99 USD

    PRE-ORDER

  • Mastering Endpoint Defense

    ​A practical guide to endpoint detection and response (EDR) strategies in your organization

    by Guven Boyraz ...
    Elevate your expertise in endpoint detection and response by mastering advanced EDR/XDR concepts with real-life examples to fortify your organization's cyber defense strategyKey FeaturesLearn how to tackle current endpoint security problems in your organizationApply endpoint hardening through the practical guidance and real world examplesImplement EDR/XDR tools hands-on in your organization for ... Read more

    $28.99 USD

    PRE-ORDER

  • Microsoft eDiscovery in Depth

    Become an expert in Microsoft Purview content search and eDiscovery

    Learn about the locations of Microsoft 365 data, grasp the concepts of content search and eDiscovery, acquire the skills to craft powerful KQL queries, and explore how real organizations tackle complex issues through eDiscoveryKey FeaturesLearn about the concept of eDiscovery and distinguish it from content searchDelve into more complex aspects like multi-geo and attorney-client privilegeApply ... Read more

    $32.99 USD

    PRE-ORDER

  • Learn PowerShell Scripting in a Month of Lunches, Second Edition

    Write and organize scripts and tools

    Series series In a Month of Lunches
    Automate complex tasks and processes with PowerShell scripts. This amazing book teaches you how to write, test, and organize high-quality, reusable scripts for Windows, Linux, and cloud-based systems.Learn PowerShell Scripting in a Month of Lunches, Second Edition takes you beyond command-line PowerShell and opens up the amazing world of scripting and automation. In just 27 bite-sized lessons, you ... Read more

    $43.99 USD

    PRE-ORDER

  • Cybersecurity Strategies and Best Practices

    A Comprehensive Guide to Enterprise Cyber Defense

    by Milad Aslaner ...
    Elevate your organization's cybersecurity posture by implementing proven strategies and best practices that will help you stay ahead of emerging threatsKey FeaturesBenefit from a holistic approach and practical guidance to align security strategies with your business goalsLearn from real-world scenarios and case studies to gain actionable strategies and insightsDemystify vendor claims and make ... Read more

    $35.99 USD

    PRE-ORDER

  • Raspberry Pi OS Text Editors, git, and LXC

    A Practical Approach

    Series series Raspberry Pi OS System Administration with systemd
    The third volume in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on the insights from Volumes 1 and 2 to provide a compendium of easy-to-use and essential guidance for Raspberry Pi system administration for novice users, with specific focus on Text Editors, git/ GitHub, and LXC/LXD.The overriding idea behind system administration of a ... Read more

    $59.99 USD

    PRE-ORDER

  • The Zero Trust Framework and Privileged Access Management (PAM)

    by Ravindra Das ...
    This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another.Another key ... Read more

    $37.99 USD

    PRE-ORDER

  • The Ultimate Kali Linux Book

    Harness Nmap, Metasploit, Aircrack-ng, and Empire for Cutting-Edge Pentesting in this 3rd Edition

    by Glen D. Singh ...
    Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratch Purchase of the print or Kindle book includes a free PDF eBookKey FeaturesLearn to think like an adversary to strengthen your cyber defencesExecute sophisticated real-life penetration tests, uncovering vulnerabilities in enterprise networks that go beyond the surface levelSecurely manipulate ... Read more

    $39.99 USD

    PRE-ORDER

  • Security Monitoring with Wazuh

    A hands-on guide to effective enterprise security using real-life use cases in Wazuh

    Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud security monitoring from scratchKey FeaturesGet a thorough overview of Wazuh’s features and learn how to make the most of themDetect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behaviorBuild a monitoring system for security ... Read more

    $32.99 USD

    PRE-ORDER

  • Cyber Shield

    Unlock the Secrets of Cyber Defense: Fortify Your Enterprise Against the Ever-Evolving Digital Threats with Comprehensive Strategies.In the digital age, where cyber threats lurk in every corner, protecting your enterprise is not just important-it's vital. For those who seek to fortify their organizations against the silent predators of the cyber realm, Cyber Shield: A Comprehensive Guide to ... Read more

    $7.99 USD

    PRE-ORDER

  • Advances in Emerging Financial Technology and Digital Money

    The financial sector is witnessing rapid technological innovations, leading to the emergence of Fintech (financial technologies), revolutionizing national and international financial landscapes. Fintech is expanding and enhancing financial products and services, making them more accessible and affordable while transforming customer relationships, payment methods, financing, and transfers.Advances ... Read more

    $64.99 USD

  • Microsoft 365 Security and Compliance for Administrators

    A definitive guide to planning, implementing, and maintaining Microsoft 365 security posture

    Master the art of configuring and securing Microsoft 365, emphasizing robust security and compliance features, and managing privacy and risk in the Microsoft 365 environmentKey FeaturesProtect and defend your organization with the capabilities of the Microsoft 365 Defender familyDiscover, classify, and safeguard sensitive organizational data against loss, leakage, and exposureCollaborate securely ... Read more

    $35.99 USD or Free with Kobo Plus

  • Desktop Support Crash Course

    Technical Problem Solving And Network Troubleshooting

    by Rob Botwright ...
    ����️ Desktop Support Crash Course Bundle! ����️Are you ready to take your IT skills to the next level? Introducing the Desktop Support Crash Course bundle, your ultimate guide to mastering technical problem-solving and network troubleshooting. ����With four comprehensive books packed with practical knowledge and expert insights, this bundle is your roadmap to becoming a desktop support superstar. ... Read more

    $7.99 USD

  • Desktop Support Crash Course

    Technical Problem Solving And Network Troubleshooting

    by Rob Botwright ...
    ️ Desktop Support Crash Course Bundle! ️Are you ready to take your IT skills to the next level? Introducing the Desktop Support Crash Course bundle, your ultimate guide to mastering technical problem-solving and network troubleshooting. With four comprehensive books packed with practical knowledge and expert insights, this bundle is your roadmap to becoming a desktop support superstar. Book 1: ... Read more

    $7.99 USD or Free with Kobo Plus

  • Mastering Linux Administration

    Take your sysadmin skills to the next level by configuring and maintaining Linux systems

    A one-stop Linux administration guide to developing advanced strategies for on-premises and cloud environmentsKey FeaturesLearn how to deploy Linux to the cloud with AWS and AzureFamiliarize yourself with Docker and Ansible for automation and Kubernetes for container managementBecome proficient in everyday Linux administration tasks by mastering the Linux command line and automation ... Read more

    $35.99 USD or Free with Kobo Plus

  • Stepping Through Cybersecurity Risk Management

    A Systems Thinking Approach

    Stepping Through Cybersecurity Risk ManagementAuthoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.Stepping Through Cybersecurity Risk Management covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in ... Read more

    $76.00 USD

  • From Exposed to Secure

    The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep Your Company Safe

    From Exposed To Secure reveals the everyday threats that are putting your company in danger and where to focus your resources to eliminate exposure and minimize risk.Top cybersecurity and compliance professionals from around the world share their decades of experience in utilizing data protection regulations and complete security measures to protect your company from fines, lawsuits, loss of ... Read more

    $8.99 USD or Free with Kobo Plus

  • Linux for Novices

    "Linux for Novices: A Beginner's Guide to Mastering the Linux Operating System" is your comprehensive introduction to the world of Linux, designed to empower beginners with the knowledge and skills to navigate this powerful and versatile operating system with confidence.Inside this beginner-friendly guide, you'll explore:Linux Basics: A clear and concise introduction to the fundamental concepts ... Read more

    $4.99 USD or Free with Kobo Plus