Title: Microsoft eDiscovery in Depth: Become an expert in Microsoft Purview content search and eDiscovery, Author: Ryan John Murphy Pre-Order Now
Title: Artificial Intelligence in Cybersecurity: Use AI to Protect Your Organization, Author: Lisa Ventura Pre-Order Now
Title: Securing Cloud Native Apps, Author: Michael Anderson Pre-Order Now
Title: Hacking For Dummies, Author: Kevin Beaver Pre-Order Now
Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice Pre-Order Now
by Matt Walker
Narrated by  David Stifel
Audiobook (Unabridged) $29.99
. Price is $29.99 . You save %.
OR

FREE with a B&N Audiobooks Subscription trial!

Title: Practical Purple Teaming: The Art of Collaborative Defense, Author: Alfie Champion Pre-Order Now
Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh Pre-Order Now
Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh Pre-Order Now
Title: Data Engineering for Cybersecurity, Author: James Bonifield Pre-Order Now
Title: Data Engineering for Cybersecurity, Author: James Bonifield Pre-Order Now
Title: Linux Basics for Hackers, 2nd Edition: Getting Started with Networking, Scripting, and Security in Kali, Author: OccupyTheWeb Pre-Order Now
Title: Learning Kubernetes Security: A practical guide for secure and scalable containerized environments, Author: Raul Lapaz Pre-Order Now
Title: Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Author: John Chirillo
Title: Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Author: John Chirillo
Title: Cyber Security Kill Chain - Tactics and Strategies: Breaking down the cyberattack process and responding to threats, Author: Gourav Nagar
Title: Cyber Security Kill Chain - Tactics and Strategies: Breaking down the cyberattack process and responding to threats, Author: Gourav Nagar
Title: Mastering Palo Alto Networks - Third Edition: The complete journey to firewall mastery from setup to advanced security, Author: Tom Piens Aka 'Reaper
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Negotiating In The Dark: How Millions Are Lost Every Day To Cyber Criminals And Their Networks - A Top Negotiator Testifies, Author: Geert Baudewijns
Title: Cloud Security Handbook: Effectively secure cloud environments using AWS, Azure, and GCP, Author: Eyal Estrin

Pagination Links