Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim
Title: Introduction to Modern Cryptography: Revised Third Edition, Author: Jonathan Katz
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Secure APIs: Design, build, and implement, Author: José Haro Peralta
Title: Cybersecurity Law, Author: Jeff Kosseff
Title: Data-Driven Cybersecurity: Reducing risk with proven metrics, Author: Mariano Mattei
Title: Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors, Author: Dustin S. Sachs
Title: Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets, Author: Ron Eddings
Title: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership, Author: Walt Powell
Title: The Computer Security Workbook: A Course Companion Resource, Author: Juan Tapiador
Title: Certificate of Cloud Security Knowledge (CCSK v5) Study Guide: In-Depth Guidance and Practice, Author: Graham Thompson
Title: Cyber Risk Management in Practice: A Guide to Real-World Solutions, Author: Carlos Morales
Title: Everyday Cryptography 3e: Fundamental Principles and Applications, Author: Keith Martin
Title: Security Technologies for Law Enforcement Agencies, Author: Kazim Duraklar
Title: Systematic Security: A CISO's Playbook, Author: Timur Qader
Title: Mastering Cybersecurity: A Practical Guide to Cyber Tools and Techniques (Volume 2), Author: Akashdeep Bhardwaj
Title: Applied Cryptography and Network Security: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025, Proceedings, Part III, Author: Marc Fischlin
Title: Cyber Security for Next-Generation Computing Technologies, Author: Inam Ullah Khan
Title: Hacking Voice-Controllable Devices, Author: Sergio Esposito
Title: Cyber Insecurity: Examining the Past, Defining the Future, Author: Vladas Leonas

Pagination Links