Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim
Title: Introduction to Modern Cryptography: Revised Third Edition, Author: Jonathan Katz
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Secure APIs: Design, build, and implement, Author: José Haro Peralta
Title: Cybersecurity Law, Author: Jeff Kosseff
Title: Data-Driven Cybersecurity: Reducing risk with proven metrics, Author: Mariano Mattei
Title: Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors, Author: Dustin S. Sachs
Title: Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets, Author: Ron Eddings
Title: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership, Author: Walt Powell
Title: The Computer Security Workbook: A Course Companion Resource, Author: Juan Tapiador
Title: Certificate of Cloud Security Knowledge (CCSK v5) Study Guide: In-Depth Guidance and Practice, Author: Graham Thompson
Title: Cyber Risk Management in Practice: A Guide to Real-World Solutions, Author: Carlos Morales
Title: Everyday Cryptography 3e: Fundamental Principles and Applications, Author: Keith Martin
Title: Security and Privacy: 3rd International Conference, ICSP 2024, Jamshedpur, India, November 20-21, 2024, Proceedings, Author: Sihem Mesnager
Title: CompTIA Security+ (SY0-701) Certification Companion: Hands-on Preparation and Practice Guide, Author: Kodi A. Cochran
Title: Cyber Security, Forensics and National Security, Author: Vinay Aseri
Title: Foundations and Practice of Security: 17th International Symposium, FPS 2024, Montréal, QC, Canada, December 9-11, 2024, Revised Selected Papers, Part II, Author: Kamel Adi
Title: Cybersecurity: 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedings, Author: Isabel Praça
Title: Next Generation Data Science and Blockchain Technology for Industry 5.0: Concepts and Paradigms, Author: Amit Kumar Tyagi
Title: Cyber Security for Next-Generation Computing Technologies, Author: Inam Ullah Khan

Pagination Links