Title: Network Security and Cryptography, Author: Sarhan M. Musa
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, Author: Mike Wills
Title: Ethical Hacking: A Hands-on Introduction to Breaking In, Author: Daniel G. Graham
Title: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities, Author: Vickie Li
Title: Certified Ethical Hacker (CEH) Exam Cram, Author: William Easttom II
Title: Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition, Author: Brian Russell
Title: Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly, Author: Dennis Andriesse
Title: Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems, Author: Chris Sanders
Title: How Cybersecurity Really Works: A Hands-On Guide for Total Beginners, Author: Sam Grubb
Title: Cyberpower and National Security, Author: Franklin D Kramer
Title: Nmap: Network Exploration and Security Auditing Cookbook - Second Edition: Over 100 practical recipes related to network and application security auditing using the powerful Nmap, Author: Paulino Calderon
Title: The Art of Network Penetration Testing: How to take over any company in the world, Author: Royce Davis
Title: Hacking: The Art of Exploitation, 2nd Edition, Author: Jon Erickson
Title: Serious Cryptography: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Learning Penetration Testing with Python, Author: Christopher Duffy
Title: Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats, Author: Mark Dunkerley
Title: Mastering Veeam Backup & Replication 10: Protect your virtual environment and implement cloud backup using Veeam technology, Author: Chris Childerhose
Title: Wireless Reconnaissance in Penetration Testing, Author: Matthew Neely

Pagination Links