Title: Cybersecurity in Context: Technology, Policy, and Law, Author: Chris Jay Hoofnagle
Title: Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide, Author: David Basin
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: The Shellcoder's Handbook: Discovering and Exploiting Security Holes, Author: Chris Anley
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Principles of AI Governance and Model Risk Management: Master the Techniques for Ethical and Transparent AI Systems, Author: James Sayles
Title: CompTIA Security+ Certification Study Guide: Network Security Essentials, Author: Ahmed F. Sheikh
Title: Active Directory Administration Cookbook: Actionable, proven solutions to identity management and authentication on servers and in the cloud, Author: Sander Berkouwer
Title: Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition, Author: Yi Xian Yang
Title: Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware, Author: Marc Weber Tobias
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence, Author: Nick Furneaux
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Security Without Obscurity: A Guide to PKI Operations, Author: Jeff Stapleton
Title: IAPP CIPM Certified Information Privacy Manager Study Guide, Author: Mike Chapple
Title: Exam Ref AZ-500 Microsoft Azure Security Technologies, Author: Yuri Diogenes
Title: CompTIA Security+ Guide to Network Security Fundamentals, Author: Mark Ciampa
Title: The Practice of Network Security Monitoring: Understanding Incident Detection and Response, Author: Richard Bejtlich

Pagination Links