Title: Linux Basics for Hackers, 2nd Edition: Getting Started with Networking, Scripting, and Security in Kali, Author: OccupyTheWeb
Title: Hacking For Dummies, Author: Kevin Beaver
Title: The Web Beneath the Waves: The Fragile Cables that Connect our World, Author: Samanth Subramanian
Title: The Web Beneath the Waves: The Fragile Cables that Connect our World, Author: Samanth Subramanian
Title: Energy Fundamentals of Radio, Author: Joel L. Dawson
Title: Data Engineering for Cybersecurity: Build Secure Data Pipelines with Free and Open-Source Tools, Author: James Bonifield
Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim
Title: Practical Purple Teaming: The Art of Collaborative Defense, Author: Alfie Champion
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: WINDOWS SECURITY: Master Your Digital Fortress A Step-by-Step Guide to Shielding Your System from Cyber Threats, Author: Reed Amelia
Title: Massive MIMO in Practice: From 5G to 6G, Author: Henrik Asplund
Title: TOP SECRET CONFIDENTIAL - Password Keeper Book with Alphabetical Tabs Simple Modern Black: Small Pocket Size Internet Logbook for Seniors - Remember Website Address Account Details - Secure Digital Notebook, Author: Luxe Stationery
Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh
Title: Agentic AI in Enterprise: Harnessing Agentic AI for Business Transformation, Author: Sumit Ranjan
Title: Exam Ref DP-300 Administering Microsoft Azure SQL Solutions, Author: Craig Zacker
Title: Network Programming in Elixir and Erlang: Write High-Performance, Scalable, and Reliable Apps with TCP and UDP, Author: Andrea Leopardi
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Drone and UAV Forensics: A Hands-On Approach, Author: Hudan Studiawan
Title: Intelligent Continuous Security: AI-Enabled Transformation for Seamless Protection, Author: Marc Hornbeek
Title: Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Author: John Chirillo

Pagination Links