Title: Network Security and Cryptography, Author: Sarhan M. Musa
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, Author: Mike Wills
Title: Ethical Hacking: A Hands-on Introduction to Breaking In, Author: Daniel G. Graham
Title: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities, Author: Vickie Li
Title: Certified Ethical Hacker (CEH) Exam Cram, Author: William Easttom II
Title: Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition, Author: Brian Russell
Title: Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly, Author: Dennis Andriesse
Title: Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems, Author: Chris Sanders
Title: How Cybersecurity Really Works: A Hands-On Guide for Total Beginners, Author: Sam Grubb
Title: Cyberpower and National Security, Author: Franklin D Kramer
Title: Nmap: Network Exploration and Security Auditing Cookbook - Second Edition: Over 100 practical recipes related to network and application security auditing using the powerful Nmap, Author: Paulino Calderon
Title: The Art of Network Penetration Testing: How to take over any company in the world, Author: Royce Davis
Title: Hacking: The Art of Exploitation, 2nd Edition, Author: Jon Erickson
Title: Serious Cryptography: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Seven Deadliest Wireless Technologies Attacks, Author: Brad Haines
Title: Protecting Critical Infrastructures Against Cyber-Attack, Author: Stephen Lukasik
Explore Series
Title: Securing the Smart Grid: Next Generation Power Grid Security, Author: Tony Flick
Title: Mastering Veeam Backup & Replication 10: Protect your virtual environment and implement cloud backup using Veeam technology, Author: Chris Childerhose

Pagination Links