Title: 97 Things Every Application Security Professional Should Know, Author: Reet Kaur
Title: A Beginner's Guide To Web Application Penetration Testing, Author: Ali Abdollahi
Title: A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program, Author: Debra Baker
Title: Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts, Author: Nitesh Dhanjani
Title: Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers, Author: Chiheb Chebbi
Title: Advanced Penetration Testing: Hacking the World's Most Secure Networks, Author: Wil Allsopp
Title: Advances in Cyber Security: Technology, Operations, and Experiences, Author: D. Frank Hsu
Title: Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps, Author: John Sotiropoulos
Title: Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security, Author: Rebecca Blair
Title: Android Hacker's Handbook, Author: Joshua J. Drake
Title: Anti-Hacker Tool Kit, Fourth Edition, Author: Mike Shema
Title: Apache Cookbook: Solutions and Examples for Apache Administration, Author: Rich Bowen
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: Applied Incident Response, Author: Steve Anson
Title: Applied Network Security Monitoring: Collection, Detection, and Analysis, Author: Chris Sanders
Title: Authenticity: Reading, Remembering, Performing, Author: Patrick Finney
Title: AWS Security Cookbook: Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS, Author: Heartin Kanikathottu
Title: AWS Security Cookbook: Practical solutions for securing AWS cloud infrastructure with essential services and best practices, Author: Heartin Kanikathottu
Title: BackTrack 4: Assuring Security by Penetration Testing, Author: Shakeel Ali
Title: Bash Shell Scripting for Pentesters: Master the art of command-line exploitation and enhance your penetration testing workflows, Author: Steve Campbell

Pagination Links