Title: Black Hat Bash: Creative Scripting for Hackers and Pentesters, Author: Nick Aleks
Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Security Chaos Engineering: Sustaining Resilience in Software and Systems, Author: Kelly Shortridge
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly, Author: Dennis Andriesse
Title: Practical Purple Teaming: The Art of Collaborative Defense, Author: Alfie Champion
Title: Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time, Author: O. Sami Saydjari
Title: ISC2 CCSP Certified Cloud Security Professional Official Study Guide, Author: Mike Chapple
Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim
Title: Network Forensics: Tracking Hackers through Cyberspace, Author: Sherri Davidoff
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Zero Trust Networks: Building Secure Systems in Untrusted Networks, Author: Razi Rais
Title: The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting, Author: Mark Morowczynski

Pagination Links