Most Popular Books
- Cyber Intelligence Report: 2020 Quarter 1: Dive Into the 5th Domain: Threat Intelligence (Cyber Secrets)
- A network defender's guide to threat detection: Using Zeek, Elasticsearch, Logstash, Kibana, Tor, and more. (IWC Blue Team)
- Launching Exploits: One Small Vulnerability For A Company, One Giant Heap for Port Bind (Cyber Secrets)
- Threat Hunting, Hacking, and Intrusion Detection: SCADA, Dark Web, and APTs
- Cryptography Basics & Practical Usage