Title: Dissecting the Dark Web: Reverse Engineering the Tools of the Underground Economy, Author: Lindsay Kaye Pre-Order Now
Title: The Cybersecurity Manager's Guide, Author: Todd Barnum
Title: Accelerating DevSecOps on AWS: Create secure CI/CD pipelines using Chaos and AIOps, Author: Nikit Swaraj
Title: Cybersecurity All-in-One For Dummies, Author: Joseph Steinberg
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Eleventh Hour CISSP®: Study Guide, Author: Joshua Feldman
Title: Practical Lock Picking: A Physical Penetration Tester's Training Guide, Author: Deviant Ollam
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Microsoft Intune Cookbook: Over 75 recipes for configuring, managing, and automating your identities, apps, and endpoint devices, Author: Andrew Taylor
Title: Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility, Author: Jai Singh Arun
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Exam Ref AZ-500 Microsoft Azure Security Technologies, Author: Yuri Diogenes
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Security Engineering: A Guide to Building Dependable Distributed Systems, Author: Ross Anderson
Title: Designing Secure Software: A Guide for Developers, Author: Loren Kohnfelder
Title: Mastering Information Security Compliance Management: A comprehensive handbook on ISO/IEC 27001:2022 compliance, Author: Adarsh Nair
Title: Real-World Cryptography, Author: David Wong
Title: Mike Meyers' CompTIA A+ Core 2 Certification Passport (Exam 220-1102), Author: Ron Gilster
Title: Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), Author: Mike Meyers

Pagination Links