Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing, Author: James Forshaw
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Alice and Bob Learn Application Security, Author: Tanya Janca
Title: The Ghidra Book, 2nd Edition: The Definitive Guide, Author: Kara Nance Pre-Order Now
Title: Practical Linux Forensics: A Guide for Digital Investigators, Author: Bruce Nikkel
Title: Red Team Engineering: The Art of Building Offensive Tools and Infrastructure, Author: Casey Erdmann Pre-Order Now
Title: Dissecting the Dark Web: Reverse Engineering the Tools of the Underground Economy, Author: Lindsay Kaye Pre-Order Now
Title: Locksport: A Hackers Guide to Lockpicking, Impressioning, and Safe Cracking, Author: Jos Weyers
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, Author: Michael Sikorski
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: ISC2 CCSP Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle, Author: Mike Chapple
Title: Malware Data Science: Attack Detection and Attribution, Author: Joshua Saxe
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci

Pagination Links