Title: Zero to Hero: Your Guide to a Career in Cybersecurity, Author: Felix Kyei Asare
Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs, Author: Ryan Soper
Title: You: For Sale: Protecting Your Personal Data and Privacy Online, Author: Stuart Sumner
Title: Yahoo Mail Security: Safeguarding Your Email, Author: Vijay Kumar Yadav
Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: Writing Secure Code, Author: David LeBlanc
Title: Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework, Author: Jessey Bullock
Title: Wireshark 2 Quick Start Guide: Secure your network through protocol analysis, Author: Charit Mishra
Title: Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing, Author: James Forshaw
Title: Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender, Author: Marius Sandbu
Title: Windows Forensics Cookbook: Maximize the power of Windows Forensics to perform highly effective forensic investigations, Author: Oleg Skulkin
Title: What Is Computer Science?: An Information Security Perspective, Author: Daniel Page
Title: Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs, Author: Simson Garfinkel
Title: Web Commerce Security: Design and Development, Author: Hadi Nahari
Title: Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Author: Ryan C. Barnett
Title: Waging Cyber War: Technical Challenges and Operational Constraints, Author: Jacob G. Oakley
Title: VMware View Security Essentials, Author: Daniel Langenhan
Title: VMware NSX Cookbook: Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere, Author: Bayu Wibowo
Title: USING SCIENCE IN CYBERSECURITY, Author: Leigh Barnes Metcalf

Pagination Links