Title: Army Techniques Publication ATP 6-02.71 Techniques for Department of Defense Information Network Operations April 2019, Author: United States Government Us Army
Title: DoD 5220.22-M National Industrial Security Program Operating Manual Incorporating Change 2 May 2016, Author: United States Government Us Army
Title: The Ethical Hacker's Handbook: A Comprehensive Guide to Cybersecurity Assessment, Author: Josh Luberisse
Title: Hacker Mindset: Psychological Tactics and Strategies for Mastering Social Engineering, Author: Josh Luberisse
Title: Cracking the Fortress: Bypassing Modern Authentication Mechanism, Author: Josh Luberisse
Title: Defending the Digital Perimeter Network Security Audit Readiness Strategies, Author: J. L. Parham
Title: Hack the Airwaves: Advanced BLE Exploitation Techniques, Author: Josh Luberisse
Title: Leave No Trace: A Red Teamer's Guide to Zero-Click Exploits, Author: Josh Luberisse
Title: Mastering Kali Purple: For Vulnerability Assessment and Penetration Testing, Author: EL MOSTAFA OUCHEN
Title: The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation, Author: Josh Luberisse
Title: Evolving Roles of Chief Information Security Officers and Chief Risk Officers, Author: Dr. Michael C. Redmond Phd