Title: Artificial Intelligence in Cybersecurity: Use AI to Protect Your Organization, Author: Lisa Ventura Pre-Order Now
Title: Practical Threat Intelligence and Data-Driven Threat Hunting: Elevate your cybersecurity efforts, enhance detection, and defend with ATT&CKT & open tools, Author: Valentina Costa-Gazcón Pre-Order Now
Title: Hacking For Dummies, Author: Kevin Beaver Pre-Order Now
Title: Palo Alto Networks from Policy to Code: Create robust firewall policies and automate deployment efficiently, Author: Nikolay Matveev Pre-Order Now
Title: Data Engineering for Cybersecurity, Author: James Bonifield Pre-Order Now
Title: PostgreSQL Mistakes and How to Avoid Them, Author: Jimmy Angelakos Pre-Order Now
Title: Redefining Information Security: How to Build a Security-Driven Organization, Author: Brian Wagner Pre-Order Now
Title: Negotiating In The Dark: How Millions Are Lost Every Day To Cyber Criminals And Their Networks - A Top Negotiator Testifies, Author: Geert Baudewijns
Title: (ISC)2 Certified Information Systems Security Professional CISSP Realistic Practice Test: 5 Realistic Practice Tests with 500+ Questions and detailed explanations to get you CISSP certified, Author: Certsquad Professional Trainers
Title: (ISC)2 Certified Cloud Security Professional CCSP Realistic Practice Tests: 6 Realistic Practice Tests with 280+ Questions and detailed explanations to get you CCSP certified, Author: Certsquad Professional Trainers
Title: The Age of Paranoia: Cybersecurity, National Security and You:, Author: Lorien Larkvale
Title: Cybersecurity For Dummies, Author: Joseph Steinberg
Title: The CISO & CTO Guide to The Self-Building AI Metropolis, Author: Haroon Mansoori
Title: You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches, Author: Josephine Wolff
Title: Vulnerability Assessment and Penetration Testing (VAPT): Detailed guide with highlighted threats, risk exposure, and remediations (English Edition), Author: Rishabh Bhardwaj
Title: Ghidra Software Reverse-Engineering for Beginners - Second Edition: Master the art of debugging, from understanding code to mitigating threats, Author: David ïlvarez Pïrez
Title: Advanced Malware Analysis and Intelligence: Investigating malicious code with static and dynamic analysis and threat intelligence (English Edition), Author: Mahadev Thukaram
Title: Real CIPP/E Prep: An American's Guide to European Data Protection Law And the General Data Protection Regulation (GDPR), Author: Gordon Yu
Title: Microsoft Defender for Identity in Depth: An exhaustive guide to ITDR, breach prevention, and cyberattack response, Author: Pierre Thoor
Title: Offensive and Defensive Cyber Security Strategies: Fundamentals, Theory and Practices, Author: Mariya Ouaissa

Pagination Links