Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: Black Hat Bash: Creative Scripting for Hackers and Pentesters, Author: Nick Aleks
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Advanced Penetration Testing: Hacking the World's Most Secure Networks, Author: Wil Allsopp
Title: Aggressive Network Self-Defense / Edition 1, Author: Neil R. Wyler
Title: (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, Author: Mike Chapple
Title: Cyber Strategy: Risk-Driven Security and Resiliency / Edition 1, Author: Carol A. Siegel
Title: (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, Author: Mike Wills
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory / Edition 1, Author: Michael Hale Ligh
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Grokking Web Application Security, Author: Malcolm McDonald
Title: Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly, Author: Dennis Andriesse
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Security Metrics: Replacing Fear, Uncertainty, and Doubt / Edition 1, Author: Andrew Jaquith
Title: The Practice of Network Security Monitoring: Understanding Incident Detection and Response, Author: Richard Bejtlich
Title: The Tangled Web: A Guide to Securing Modern Web Applications, Author: Michal Zalewski
Title: IT Auditing Using Controls to Protect Information Assets, Third Edition, Author: Mike Kegerreis

Pagination Links