Title: Data Engineering for Cybersecurity, Author: James Bonifield Pre-Order Now
Title: From Day Zero to Zero Day, Author: Eugene Lim Pre-Order Now
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan Pre-Order Now
Title: Datensicherheit: Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität, Author: Thomas H. Lenhard Pre-Order Now
Title: Elliptic Curve Cryptography for Developers, Author: Michael Rosing
Title: The CISO & CTO Guide to The Self-Building AI Metropolis: Secure AI Transformation in Enterprise Software Development and the Coming Vulnerability Cascade, Author: Haroon Mansoori
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Exam Ref AZ-500 Microsoft Azure Security Technologies, Author: Yuri Diogenes
Title: Inside Cyber Warfare: Mapping the Cyber Underworld, Author: Jeffrey Caruso
Title: Microcontroller Exploits, Author: Travis Goodspeed
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers, Author: Dominik Merli
Title: Grokking Web Application Security, Author: Malcolm McDonald
Title: Jump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success, Author: Tyler Wall
Title: Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing, Author: James Forshaw
Title: Locksport: A Hackers Guide to Lockpicking, Impressioning, and Safe Cracking, Author: Jos Weyers
Title: Azure Security, Author: Bojan Magusic

Pagination Links