Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: Hacking: The Art of Exploitation, 2nd Edition, Author: Jon Erickson
Title: Network Security with OpenSSL: Cryptography for Secure Communications, Author: John Viega
Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh
Title: ISC2 CCSP Certified Cloud Security Professional Official Study Guide, Author: Mike Chapple
Title: Ultimate GDPR Practitioner Guide (2nd Edition): Demystifying Privacy & Data Protection, Author: Stephen R Massey
Title: How Cybersecurity Really Works: A Hands-On Guide for Total Beginners, Author: Sam Grubb
Title: The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting, Author: Mark Morowczynski
Title: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities, Author: Vickie Li
Title: Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs, Author: Carlos A. Lozano
Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity, Author: Zhassulan Zhussupov
Title: Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue, Author: Larry Clinton
Title: Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems, Author: Chris Sanders
Title: Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide, Author: Shane Sexton
Title: Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise, Author: Jennifer Minella
Title: Linux Firewalls: Attack Detection and Response, Author: Michael Rash
Title: BackTrack 4: Assuring Security by Penetration Testing, Author: Shakeel Ali
Title: Network Security Assessment: Know Your Network, Author: Chris McNab

Pagination Links