Title: Black Hat Bash: Creative Scripting for Hackers and Pentesters, Author: Nick Aleks
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, Author: Mike Chapple
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly, Author: Dennis Andriesse
Title: The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting, Author: Mark Morowczynski
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: CASP+ CompTIA Advanced Security Practitioner Certification Kit: Exam CAS-004, Author: Jeff T. Parker
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Advanced Penetration Testing: Hacking the World's Most Secure Networks, Author: Wil Allsopp
Title: Zero Trust Networks: Building Secure Systems in Untrusted Networks, Author: Razi Rais
Title: IT Auditing Using Controls to Protect Information Assets, Third Edition, Author: Mike Kegerreis
Title: Network Programmability and Automation: Skills for the Next-Generation Network Engineer, Author: Matt Oswalt

Pagination Links