Title: The Practice of Network Security Monitoring: Understanding Incident Detection and Response, Author: Richard Bejtlich
Title: How to Protect Yourself from Your Computer, Author: Marc-Anthony C Arena
Title: Network Security and Cryptography, Author: Sarhan M. Musa
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: The Tangled Web: A Guide to Securing Modern Web Applications, Author: Michal Zalewski
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Web Security for Developers: Real Threats, Practical Defense, Author: Malcolm McDonald
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, Author: Mike Wills
Title: The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online, Author: Violet Blue
Title: Secrets and Lies: Digital Security in a Networked World / Edition 1, Author: Bruce Schneier
Title: The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime, Author: Scott Augenbaum
Title: Ethical Hacking: A Hands-on Introduction to Breaking In, Author: Daniel G. Graham
Title: Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers, Author: TJ O'Connor
Title: IT Auditing Using Controls to Protect Information Assets, Third Edition, Author: Mike Kegerreis
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: CEH v10 Certified Ethical Hacker Study Guide, Author: Ric Messier
Title: Obfuscation: A User's Guide for Privacy and Protest, Author: Finn Brunton
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: Security Chaos Engineering: Sustaining Resilience in Software and Systems, Author: Kelly Shortridge

Pagination Links