Title: ISC2 CCSP Certified Cloud Security Professional Official Study Guide, Author: Mike Chapple
Title: Black Hat Bash: Creative Scripting for Hackers and Pentesters, Author: Nick Aleks
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Network Security Bible, Author: Eric Cole
#768 in Series
Title: Network Security with OpenSSL: Cryptography for Secure Communications, Author: John Viega
Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: Ultimate GDPR Practitioner Guide (2nd Edition): Demystifying Privacy & Data Protection, Author: Stephen R Massey
Title: How Cybersecurity Really Works: A Hands-On Guide for Total Beginners, Author: Sam Grubb
Title: The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting, Author: Mark Morowczynski
Title: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities, Author: Vickie Li
Title: Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs, Author: Carlos A. Lozano
Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity, Author: Zhassulan Zhussupov
Title: Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue, Author: Larry Clinton
Title: Cyberpower and National Security, Author: Franklin D Kramer
Title: Information Systems Security NIST 800 2-in-1, Author: bruce brown
Title: Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert, Author: Dr. Erdal Ozkaya
Title: Mastering Python Forensics, Author: Dr. Michael Spreitzenbarth

Pagination Links