Title: Data Engineering for Cybersecurity, Author: James Bonifield Pre-Order Now
Title: From Day Zero to Zero Day, Author: Eugene Lim Pre-Order Now
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan Pre-Order Now
Title: Securing the Digital Frontier: Cyber Security for Responsible Citizens and Strategic Thinkers, Author: Andrew Martin
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: The CISO & CTO Guide to The Self-Building AI Metropolis: Secure AI Transformation in Enterprise Software Development and the Coming Vulnerability Cascade, Author: Haroon Mansoori
Title: Securing Microsoft Azure OpenAI, Author: Karl Ots
Explore Series
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Microsoft Defender for Identity in Depth: An exhaustive guide to ITDR, breach prevention, and cyberattack response, Author: Pierre Thoor
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices, Author: Mariya Ouaissa
Title: Generative AI and Digital Forensics, Author: Ravindra Das
Title: Generative AI and Cyberbullying, Author: Ravindra Das
Title: Boardroom Cybersecurity: A Director's Guide to Mastering Cybersecurity Fundamentals, Author: Dan Weis
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Generative AI: Phishing and Cybersecurity Metrics, Author: Ravindra Das
Title: RMF Security Control Assessor NIST 800-53A Security Control Assessment Guide (NIST 800 Cybersecurity, #3), Author: Bruce Brown CISSP
Title: Exam Ref AZ-500 Microsoft Azure Security Technologies, Author: Yuri Diogenes
Title: Inside Cyber Warfare: Mapping the Cyber Underworld, Author: Jeffrey Caruso

Pagination Links