Title: Cyber Security Foundations: Fundamentals, Technology and Society, Author: Keith Martin
Title: Certificate of Cloud Security Knowledge (CCSK v5) Study Guide: In-Depth Guidance and Practice, Author: Graham Thompson
Title: Security Without Obscurity: A Guide to PKI Operations, Author: Jeff Stapleton
Title: Data-Driven Cybersecurity: Reducing risk with proven metrics, Author: Mariano Mattei
Title: Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture, Author: Gary Archer
Title: The Practice of Network Security Monitoring: Understanding Incident Detection and Response, Author: Richard Bejtlich
Title: Quantum Information Theory, Author: Mark M. Wilde
Title: Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence, Author: Nihad A. Hassan
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: Modern Cryptography: The Practical Guide, Author: Sandip Dholakia
Title: Grokking Web Application Security, Author: Malcolm McDonald
Title: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership, Author: Walt Powell
Title: Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls, Author: Dr. Jason Edwards
Title: Engineering Secure Devices: A Practical Guide for Embedded System Architects and Developers, Author: Dominik Merli
Title: Security Yearbook 2025: A History and Directory of the IT Security Industry, Author: Richard Stiennon
Title: Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets, Author: Ron Eddings
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: Hacking Connected Cars: Tactics, Techniques, and Procedures, Author: Alissa Knight
Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: Defensive Security Handbook: Best Practices for Securing Infrastructure, Author: Lee Brotherston

Pagination Links