Title: Managing Modern Security Operations Center & Building Perfect Career as SOC Analyst, Author: Publicancy Ltd
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground, Author: Kevin Poulsen
Title: Networking for Beginners: Complete Guide To Learn Basics of Networking For Beginners And Intermediates, Author: Megane Noel
Explore Series
Title: How to Protect Yourself from Your Computer, Author: Marc-Anthony C Arena
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: OSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre, Author: Rob Botwright
Title: Pentest+ Exam Pass: Penetration Testing And Vulnerability Management For Cybersecurity Professionals, Author: Rob Botwright
Title: The Art of Exploit Development: A Practical Guide to Writing Custom Exploits for Red Teamers, Author: Josh Luberisse
Title: How to Investigate Like a Rockstar (Hacking the Planet), Author: sparc Flow
Explore Series
Title: Network And Security Fundamentals For Ethical Hackers: Advanced Network Protocols, Attacks, And Defenses, Author: Rob Botwright
Title: Burp Suite: Novice To Ninja: Pen Testing Cloud, Network, Mobile & Web Applications, Author: Rob Botwright
Title: 7 Rules to Influence Behaviour and Win at Cyber Security Awareness, Author: Chirag Joshi
Title: Stalking a Diva, Author: Leandra Ramm
Title: Networking For Systems Administrators, Author: Michael W Lucas
#5 in Series
Title: TLS Mastery: Tux Edition, Author: Michael W. Lucas
#16 in Series
Title: The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and our Democratic Process, Author: David Burnham
Title: Cyber Shield: A Comprehensive Guide to Enterprise Cybersecurity, Author: Dr. Torrez L. Grace
Title: Cybersecurity Analyst in Healthcare - The Comprehensive Guide (Vanguard Professionals), Author: Viruti Shivan
Title: Cyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers, Author: Rob Botwright

Pagination Links