Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Worm: The First Digital World War, Author: Mark Bowden
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Differential Privacy, Author: Simson L. Garfinkel
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race, Author: Nicole Perlroth
Title: Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud, Author: Sander Berkouwer
Title: The Art of Attack: Attacker Mindset for Security Professionals, Author: Maxie Reynolds
Title: Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers, Author: Eric O'Neill
Title: Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices, Author: Andrew Taylor
Title: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility, Author: Jai Singh Arun
Title: Cracking Codes with Python: An Introduction to Building and Breaking Ciphers, Author: Al Sweigart
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers, Author: Kevin D. Mitnick
Title: Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, Author: Marc Goodman
Title: Exam Ref AZ-500 Microsoft Azure Security Technologies, Author: Yuri Diogenes
Title: Cybersecurity Jobs & Career Paths (Find Cybersecurity Jobs, #2), Author: bruce brown
Title: Navigating the Cybersecurity Career Path, Author: Helen E. Patton
Title: Ultimate Splunk for Cybersecurity: Practical Strategies for SIEM Using Splunk's Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security (English Edition), Author: Jit Sinha

Pagination Links