Title: Securing Cloud Native Apps, Author: Michael Anderson Pre-Order Now
Title: Practical Purple Teaming: The Art of Collaborative Defense, Author: Alfie Champion Pre-Order Now
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh Pre-Order Now
Title: Wireshark Essentials: Simplifying Network Security and Troubleshooting, Author: Arun Soni Pre-Order Now
Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh Pre-Order Now
Title: Data Engineering for Cybersecurity, Author: James Bonifield Pre-Order Now
Title: Cyber Defense: Best Practices for Digital Safety, Author: Jason Edwards
Title: Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Author: John Chirillo
Title: Mentalidad inhackeable: Técnicas para evitar la manipulación psicológica en la era digital, Author: María Aperador
Title: Intelligent Continuous Security, Author: Marc Hornbeek
Title: Cyber Security Kill Chain - Tactics and Strategies: Breaking down the cyberattack process and responding to threats, Author: Gourav Nagar
Title: How to Check your Android Phone for Spyware!, Author: Joe Seanor
Title: Praxisbuch Windows-Sicherheit: Authentifizierung, Autorisierung und Überwachung, Author: James Forshaw
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Optimal Spending on Cybersecurity Measures: Third Party Risk Management, Author: Tara Kissoon
Title: Optimal Spending on Cybersecurity Measures: AI and Governance, Author: Tara Kissoon
Title: The Identity Theft Protection Guide, Author: Amanda Welsh
Title: Security Issues in Communication Devices, Networks and Computing Models: Volume 1, Author: Budati Anil Kumar
Title: Security Issues in Communication Devices, Networks and Computing Models: Volume 2, Author: Budati Anil Kumar
Title: DevSecOps in Oracle Cloud: Securing and Automating Oracle Cloud Infrastructure, Author: Erik Benner

Pagination Links