Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing, Author: James Forshaw
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Locksport: A Hackers Guide to Lockpicking, Impressioning, and Safe Cracking, Author: Jos Weyers
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: CompTIA Security+ Certification Study Guide: Network Security Essentials, Author: Ahmed F. Sheikh
Title: Alice and Bob Learn Application Security, Author: Tanya Janca
Title: Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence, Author: Nick Furneaux
Title: Threat Modeling: Designing for Security / Edition 1, Author: Adam Shostack
Title: Inside Cyber Warfare: Mapping the Cyber Underworld, Author: Jeffrey Caruso
Title: Practical Linux Forensics: A Guide for Digital Investigators, Author: Bruce Nikkel
Title: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, Author: Michael Sikorski
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: Malware Data Science: Attack Detection and Attribution, Author: Joshua Saxe

Pagination Links