Title: Dark Screens: Hackers and Heroes in the Shadowy World of Ransomware, Author: Anja Shortland Pre-Order Now
Title: Field Manual for Cyber Incident Handling and Response: Prevent. Respond. Recover. A Tactical Guide to Leading Through Cyber Incide, Author: Austin Weedor
Title: Hacking For Dummies, Author: Kevin Beaver
Title: The Identity Theft Protection Guide, Author: Amanda Welsh
Title: Cybersecurity For Dummies, Author: Joseph Steinberg
Title: Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy, Author: Ronald J. Deibert
Title: Usages of ChatGPT in CyberSecurity, Author: Rafiqul Islam Rabbi
Title: Advanced Malware Analysis and Intelligence: Investigating malicious code with static and dynamic analysis and threat intelligence, Author: Mahadev Thukaram
Title: Cybersecurity and Privacy Law Introduction (cybersecurity beginner, #1), Author: ConvoCourses
Title: ISO 27001:2022 Information Security Management System Guide (ISO 27000 ISMS, #1), Author: bruce brown
Title: The Language of Cyber Attacks: A Rhetoric of Deception, Author: Aaron Mauro
Title: Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks, Author: Richard Torrenzano
Title: Secure Edge Computing for IoT: Master Security Protocols, Device Management, Data Encryption, and Privacy Strategies to Innovate Solutions for Edge Computing in IoT (English Edition), Author: Oluyemi James Odeyinka
Title: Arquitetura e estratégias para o Processamento Distribuído de Eventos Complexos, Author: Weslen Schiavon de Souza
Title: The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, Author: David Senecal
Explore Series
Title: Fortaleciendo la Seguridad: Guía Práctica de Arquitectura de Confianza Cero (Zero Trust Arquitecture, #1), Author: Gorka Arroyuelos
Title: The Code of Honor: Embracing Ethics in Cybersecurity, Author: Paul J. Maurer
Title: Starting with Security: An Introduction to Cyber Defense, Author: Charles Mukiibi
Title: Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap, Author: Travis DeForge
Title: Ultimate Penetration Testing with Nmap, Author: Travis DeForge

Pagination Links