Title: Managing Modern Security Operations Center & Building Perfect Career as SOC Analyst, Author: Publicancy Ltd
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground, Author: Kevin Poulsen
Title: Networking for Beginners: Complete Guide To Learn Basics of Networking For Beginners And Intermediates, Author: Megane Noel
Explore Series
Title: How to Protect Yourself from Your Computer, Author: Marc-Anthony C Arena
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: OSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre, Author: Rob Botwright
Title: Pentest+ Exam Pass: Penetration Testing And Vulnerability Management For Cybersecurity Professionals, Author: Rob Botwright
Title: Nothing New Under the Sun: Benefiting from the Great Lessons of History to Develop a Coherent Cyberspace Deterrence Strategy, Author: Joint Advanced Warfighting School
Title: How to Hack Like a Legend (Hacking the Planet, #7), Author: sparc Flow
#7 in Series
Title: TLS Mastery: Beastie Edition, Author: Michael W. Lucas
Title: Zero Trust Security: Building Cyber Resilience & Robust Security Postures, Author: Rob Botwright
Title: Investigating the Chinese Threat, Part I: Military and Economic Aggression, Author: Committee on Foreign Affairs House of Representatives
Title: OSINT Cracking Tools: Maltego, Shodan, Aircrack-Ng, Recon-Ng, Author: Rob Botwright
Title: Cybersecurity's Next Frontier: Navigating the Cyber Threat Landscape: A Comprehensive Guide, Author: James Harrison
Title: DNSSEC Mastery, Author: Michael W. Lucas
Title: How to Talk to Your Kids About Pornography, Author: Educate and Empower Kids
Title: Pentesting For Small Business, Author: VICTOR P HENDERSON
Title: China, the United States, and Next Generation Connectivity - 5th Generation Wireless Technology (5G), Internet of Things (IOT) Standards and Technology Development, Huawei and ZTE Security Controversy, Author: Progressive Management
Title: The Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices, Author: Emily Foster

Pagination Links