Title: Real-World Bug Hunting: A Field Guide to Web Hacking, Author: Peter Yaworski
Title: The Language of Deception: Weaponizing Next Generation AI, Author: Justin Hutchens
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, Author: Howard E. Poston III
Title: American Black Chamber, Author: Herbert O. Yardley
Title: Python for Cybersecurity: Using Python for Cyber Offense and Defense, Author: Howard E. Poston III
Title: The Art of Attack: Attacker Mindset for Security Professionals, Author: Maxie Reynolds
Title: Microcontroller Exploits, Author: Travis Goodspeed
Title: The Cybernetic Society: How Humans and Machines Will Shape the Future Together, Author: Amir Husain Pre-Order Now
Title: Implementing Cryptography Using Python, Author: Shannon W. Bray
Title: Rise of the Machines: A Project Zero Trust Story, Author: George Finney Pre-Order Now
Title: How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life, Author: J. J. Luna
Title: Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem, Author: Chris Hughes
Title: Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto, Author: Roger A. Grimes
Title: Certified CMMC Professional Student Workbook: Developed by CyberDI, Author: J. Gregory Mcverry
Title: 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, Author: Kim Crawley
Title: Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level, Author: Paul Huijbregts
Title: The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity, Author: Phil Quade
Title: Eleventh Hour CISSP®: Study Guide / Edition 3, Author: Joshua Feldman
Title: Gray Hat Python: Python Programming for Hackers and Reverse Engineers, Author: Justin Seitz

Pagination Links