Title: CCNA Cyber Ops SECOPS - Certification Guide 210-255: Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate, Author: Andrew Chu
Title: Lightweight Cryptography for Security and Privacy: Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers, Author: Thomas Eisenbarth
Title: Big Breaches: Cybersecurity Lessons for Everyone, Author: Neil Daswani
Title: Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers, Author: Philip Alexander
Title: Securing DevOps: Security in the Cloud, Author: Julien Vehent
Title: Google Earth Forensics: Using Google Earth Geo-Location in Digital Forensic Investigations, Author: Michael Harrington
Title: The Four Rs of Cybersecurity Resist. Restrict. Recover. Report.: The simplest step-by-step guide for CEOs, Board Directors & other non-geeks, Author: Scott Goldman
Title: Trustworthy Global Computing: 10th International Symposium, TGC 2015 Madrid, Spain, August 31 - September 1, 2015 Revised Selected Papers, Author: Pierre Ganty
Title: Cybersecurity 2021, Author: Carl L. Freeman
Title: Generative AI: Phishing and Cybersecurity Metrics, Author: Ravindra Das
Title: iOS Application Security: The Definitive Guide for Hackers and Developers, Author: David Thiel
Title: Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success, Author: Tyler Wall
Title: Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations, Author: Morey J. Haber
Title: BEYOND CHECKBOXES, Author: Tolulope Michael
Title: How to Catch a Phish: A Practical Guide to Detecting Phishing Emails, Author: Nicholas Oles
Title: Microsoft Defender for Identity in Depth: An exhaustive guide to ITDR, breach prevention, and cyberattack response, Author: Pierre Thoor
Title: Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions, Author: Thomas J. Mowbray
Title: Forensic Discovery (Addison-Wesley Professional Computing Series) / Edition 1, Author: Dan Farmer
Title: RETRACTED BOOK: Defending Cyber Systems through Reverse Engineering of Criminal Malware, Author: Marwan Omar
Title: Identity and Data Security for Web Development: Best Practices, Author: Jonathan LeBlanc

Pagination Links