Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: Writing Secure Code, Author: David LeBlanc
Title: What Is Computer Science?: An Information Security Perspective, Author: Daniel Page
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: Trade What You See: How To Profit from Pattern Recognition, Author: Larry Pesavento
Title: TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS, Author: Dr. Paul Duplys
Title: Threat Modeling Gameplay with EoP: A reference manual for spotting threats in software architecture, Author: Brett Crawley
Title: Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, Author: Chris Peiris
Title: The Zero Trust Framework and Privileged Access Management (PAM), Author: Ravindra Das
Title: The Security Hippie, Author: Barak Engel
Explore Series
Title: The Reader of Gentlemen's Mail: Herbert O. Yardley and the Birth of American Codebreaking, Author: David Kahn
Title: The Essential Turing, Author: B. Jack. Copeland
Title: The Essential John Nash, Author: John Nash
Title: The Cybersecurity Manager's Guide, Author: Todd Barnum
Title: The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet, Author: Shawn James Rosenheim
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: The American Black Chamber, Author: Herbert O. Yardley
Title: Still Searching for Satoshi: Unveiling the Blockchain Revolution, Author: Anders Lisdorf
Title: SSH, the Secure Shell: The Definitive Guide, Author: Daniel J. Barrett
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson

Pagination Links