Title: Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide, Author: Shane Sexton
Title: (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, Author: Mike Wills
Title: Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise, Author: Jennifer Minella
Title: Linux Firewalls: Attack Detection and Response, Author: Michael Rash
Title: Network Security and Cryptography, Author: Sarhan M. Musa
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: Ethical Hacking: A Hands-on Introduction to Breaking In, Author: Daniel G. Graham
Title: Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications, Author: Stian Thorgersen
Title: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities, Author: Vickie Li
Title: Certified Ethical Hacker (CEH) Exam Cram, Author: William Easttom II
Title: Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition, Author: Brian Russell
Title: Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly, Author: Dennis Andriesse
Title: Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems, Author: Chris Sanders
Title: How Cybersecurity Really Works: A Hands-On Guide for Total Beginners, Author: Sam Grubb
Title: Hands-On Ethical Hacking Tactics: Strategies, tools, and techniques for effective cyber defense, Author: Shane Hartman
Title: Cyberpower and National Security, Author: Franklin D Kramer
Title: Nmap: Network Exploration and Security Auditing Cookbook - Second Edition: Over 100 practical recipes related to network and application security auditing using the powerful Nmap, Author: Paulino Calderon
Title: The Art of Network Penetration Testing: How to take over any company in the world, Author: Royce Davis
Title: Hacking: The Art of Exploitation, 2nd Edition, Author: Jon Erickson

Pagination Links