Title: Hacked: The Inside Story of America's Struggle to Secure Cyberspace, Author: Charlie Mitchell
Title: The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk, Author: Jeremy Swinfen Green
Title: SpamAssassin: A practical guide to integration and configuration, Author: Alistair McDonald
Title: Configuring IPCop Firewalls: Closing Borders with Open Source, Author: Barrie Dempster
Title: Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it, Author: Sion Retzkin
Title: The Internet of Risky Things: Trusting the Devices That Surround Us, Author: Sean Smith
Title: Learning Python Web Penetration Testing: Automate web penetration testing activities using Python, Author: Christian Martorella
Title: VMware vCloud Security, Author: Prasenjit Sarkar
Title: The Ultimate GDPR Practitioner Guide: Demystifying Privacy & Data Protection, Author: Stephen R Massey
Title: Seven Deadliest Network Attacks, Author: Stacy Prowell
Title: Seven Deadliest USB Attacks, Author: Brian Anderson
Title: Seven Deadliest Web Application Attacks, Author: Mike Shema
Title: Seven Deadliest Social Network Attacks, Author: Carl Timm
Title: Seven Deadliest Unified Communications Attacks, Author: Dan York
Title: Seven Deadliest Wireless Technologies Attacks, Author: Brad Haines
Title: Kali Linux Cookbook, Author: Willie L. Pritchett
Title: Learn Azure Sentinel: Integrate Azure security with artificial intelligence to build secure cloud systems, Author: Richard Diver
Title: Cybersecurity in the COVID-19 Pandemic, Author: Kenneth Okereafor
Title: Binary Analysis Cookbook: Actionable recipes for disassembling and analyzing binaries for security risks, Author: Michael Born
Title: Hacking VoIP: Protocols, Attacks, and Countermeasures, Author: Himanshu Dwivedi

Pagination Links