Title: A Hacker Manifesto, Author: McKenzie Wark
Title: A Hacker Manifesto, Author: McKenzie Wark
Title: Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict, Author: Dan Borges
Title: Agile Security Operations: Engineering for agility in cyber defense, detection, and response, Author: Hinne Hettema
Title: Attacking and Exploiting Modern Web Applications: Discover the mindset, techniques, and tools to perform modern web attacks and exploitation, Author: Simone Onofri
Title: Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code, Author: Dennis Chow
Title: Big Crisis Data: Social Media in Disasters and Time-Critical Situations, Author: Carlos Castillo
Title: Bloggerati, Twitterati: How Blogs and Twitter Are Transforming Popular Culture, Author: Mary Cross
Title: Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively, Author: Ashish M Kothekar
Title: Building and Automating Penetration Testing Labs in the Cloud: Set up cost-effective hacking environments for learning cloud security on AWS, Azure, and GCP, Author: Joshua Arvin Lat
Title: Building Internet Firewalls: Internet and Web Security, Author: Elizabeth D. Zwicky
Title: Building Relationships: Online Dating and the New Logics of Internet Culture, Author: Dawn Shepherd
Title: Building Social Web Applications: Establishing Community at the Heart of Your Site, Author: Gavin Bell
Title: Building Tools with GitHub: Customize Your Workflow, Author: Chris Dawson
Title: Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying, Author: Sameer K. Hinduja
Title: Bullying Today: Bullet Points and Best Practices, Author: Justin W. Patchin
Title: Cached: Decoding the Internet in Global Popular Culture, Author: Stephanie Ricker Schulte
Title: ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills, Author: Clint Bodungen
Title: Cloud Capacity Management: Capacity Management, Author: Navin Sabharwal
Title: Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP, Author: Eyal Estrin

Pagination Links