Title: 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy, Author: Eric Rzeszut
Title: 97 Things Every Information Security Professional Should Know: Collective Wisdom from the Experts, Author: Christina Morillo
Title: A Beginner's Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals, Author: Brij B. Gupta
Title: A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities, Author: Sagar Rahalkar
Title: A Cryptography Primer: Secrets and Promises, Author: Philip N. Klein
Title: A Guide to Kernel Exploitation: Attacking the Core, Author: Computer Science Perla B.Sc.
Title: A Practical Guide to Trusted Computing, Author: David Challener
Title: Accelerating DevSecOps on AWS: Create secure CI/CD pipelines using Chaos and AIOps, Author: Nikit Swaraj
Title: Achieving and Sustaining Secured Business Operations: An Executive's Guide to Planning and Management, Author: Neelesh Ajmani
Title: Advanced API Security: OAuth 2.0 and Beyond, Author: Prabath Siriwardena
Title: Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques, Author: Robert J Girod
Title: Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies, Author: Ira Winkler
Title: Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization, Author: Eric Cole
Title: Alice and Bob Learn Application Security, Author: Tanya Janca
Title: An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments, Author: Kushantha Gunawardana
Title: Android Application Security Essentials, Author: Pragati Ogal Rai
Title: Android Security Cookbook, Author: Keith Makan
Title: Android Security Internals: An In-Depth Guide to Android's Security Architecture, Author: Nikolay Elenkov
Title: Anti-Hacker Tool Kit, Fourth Edition, Author: Mike Shema
Title: Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software, Author: Nir Yehoshua

Pagination Links