Title: Open Source Intelligence (OSINT) - A practical Introduction: A Field Manual, Author: Varin Khera
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: Advances in Cryptology - ASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part VIII, Author: Kai-Min Chung
Title: Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis, Author: Shivi Garg
Title: Real CIPP/E Prep: An American's Guide to European Data Protection Law And the General Data Protection Regulation (GDPR), Author: Gordon Yu
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: CyberBulleys: A CISO's Guide to Doing Cybersecurity:, Author: Jody Blanchard
Title: Ghidra Software Reverse-Engineering for Beginners - Second Edition: Master the art of debugging, from understanding code to mitigating threats, Author: David ïlvarez Pïrez
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches, Author: Josephine Wolff
Title: Digital Minimalism: Simple Living in a Hyperconnected World: A Practical Guide to Digital Detox, Reducing Screen Time, and Breaking Cell Phone Addiction for a More Mindful Life, Author: Bendis A I Saage - English
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: The CISO & CTO Guide to The Self-Building AI Metropolis, Author: Haroon Mansoori
Title: Post-Quantum Cryptography: 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8-10, 2025, Proceedings, Part I, Author: Ruben Niederhagen
Title: Cyber Security Foundations: Fundamentals, Technology and Society, Author: Keith Martin
Title: Differential Privacy, Author: Simson L. Garfinkel
Title: Securing Microsoft Azure OpenAI, Author: Karl Ots
Title: Cybersecurity For Dummies, Author: Joseph Steinberg
Title: Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture, Author: Gary Archer
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan

Pagination Links