Title: Cracking: Reverse Engineering with Ghidra, Author: Rob Botwright
Title: Cybersecurity For Dummies, Author: Joseph Steinberg
Title: Negotiating In The Dark: How Millions Are Lost Every Day To Cyber Criminals And Their Networks - A Top Negotiator Testifies, Author: Geert Baudewijns
Title: The Age of Paranoia: Cybersecurity, National Security and You:, Author: Lorien Larkvale
Title: Securing the Digital Frontier: Cyber Security for Responsible Citizens and Strategic Thinkers, Author: Andrew Martin
Title: Datensicherheit: Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität, Author: Thomas H. Lenhard
Title: Ransom War: How Cyber Crime Became a Threat to National Security, Author: Max Smeets
Title: Practical OPNsense: Building Enterprise Firewalls with Open Source, Author: Markus Stubbig
Title: CCISO Exam Guide and Security Leadership Essentials: Essential strategies for today's security leaders (English Edition), Author: Gopi Thangavel
Title: (ISC)2 Certified Cloud Security Professional CCSP Realistic Practice Tests: 6 Realistic Practice Tests with 280+ Questions and detailed explanations to get you CCSP certified, Author: Certsquad Professional Trainers
Title: Gamified Tabletop Exercises for Effective Disaster Recovery Testing: Preparing for Disasters with Dice, Author: John Svazic
Title: Gamified Tabletop Exercises for Effective Disaster Recovery Testing: Preparing for Disasters with Dice, Author: John Svazic
Title: The CISO & CTO Guide to The Self-Building AI Metropolis: Secure AI Transformation in Enterprise Software Development and the Coming Vulnerability Cascade, Author: Haroon Mansoori
Title: (ISC)2 Certified Information Systems Security Professional CISSP Realistic Practice Test: 5 Realistic Practice Tests with 500+ Questions and detailed explanations to get you CISSP certified, Author: Certsquad Professional Trainers
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Securing Microsoft Azure OpenAI, Author: Karl Ots
Explore Series
Title: The Comprehensive Guide to Cybersecurity's Most Infamous Hacks: 70 Case Studies of Cyberattacks, Author: Jason Edwards
Title: Datensicherheit: Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität, Author: Thomas H. Lenhard
Title: The Comprehensive Guide to Cybersecurity's Most Infamous Hacks: 70 Case Studies of Cyberattacks, Author: Jason Edwards PhD

Pagination Links