Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Securing Microsoft Azure OpenAI, Author: Karl Ots
Title: Post-Quantum Cryptography: 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8-10, 2025, Proceedings, Part I, Author: Ruben Niederhagen
Title: Open Source Intelligence (OSINT) - A practical Introduction: A Field Manual, Author: Varin Khera
Title: Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis, Author: Shivi Garg
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Cyber Security Foundations: Fundamentals, Technology and Society, Author: Keith Martin
Title: Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture, Author: Gary Archer
Title: Biosecurity in the Making: The Threats, the Aspects and the Challenge of Readiness, Author: Manousos E. Kambouris
Title: Advances in Cryptology - ASIACRYPT 2024: 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part VIII, Author: Kai-Min Chung