Title: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility, Author: Jai Singh Arun
Title: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility, Author: Jai Singh Arun
Title: Blockchain Platforms: A Look at the Underbelly of Distributed Platforms, Author: Stijn Van Hijfte
Title: Blockchain Platforms: A Look at the Underbelly of Distributed Platforms, Author: Stijn Van Hijfte
Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice
by Matt Walker
Narrated by  David Stifel
Audiobook (Unabridged) $29.99
. Price is $29.99 . You save %.
OR

FREE with a B&N Audiobooks Subscription trial!

Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy
Audiobook (Unabridged) $26.99
. Price is $26.99 . You save %.
OR

FREE with a B&N Audiobooks Subscription trial!

Title: Data Engineering for Cybersecurity: Build Secure Data Pipelines with Free and Open-Source Tools, Author: James Bonifield
Title: Data-Driven Cybersecurity: Reducing risk with proven metrics, Author: Mariano Mattei
Title: Hacking For Dummies, Author: Kevin Beaver
Title: Kryptographie, Author: Jürgen Fuß
Explore Series
Title: Microsoft Security Copilot: Master strategies for AI-driven cyber defense, Author: Bi Yue Xu
Title: Microsoft Security Copilot: Master strategies for AI-driven cyber defense, Author: Bi Yue Xu
Title: Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision, Author: Nikolay Matveev
Title: Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision, Author: Nikolay Matveev
Title: Penetrationstests erfolgreich umsetzen: Praxisleitfaden - Regulatorik - KI-Einflüsse, Author: Nina Wagner
Title: PostgreSQL Mistakes and How to Avoid Them, Author: Jimmy Angelakos
Title: PostgreSQL Mistakes and How to Avoid Them, Author: Jimmy Angelakos
Title: Privileged Access Management: Strategies for Zero Trust in the Enterprise, Author: Gregory C. Rasner
Title: Privileged Access Management: Strategies for Zero Trust in the Enterprise, Author: Gregory C. Rasner
Title: Redefining Information Security: How to Build a Security-Driven Organization, Author: Brian Wagner

Pagination Links