Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs, Author: Ryan Soper
Title: You: For Sale: Protecting Your Personal Data and Privacy Online, Author: Stuart Sumner
Title: Writing Secure Code, Author: David LeBlanc
Title: Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework, Author: Jessey Bullock
Title: Wireshark 2 Quick Start Guide: Secure your network through protocol analysis, Author: Charit Mishra
Title: Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing, Author: James Forshaw
Title: Windows Ransomware Detection and Protection: Securing Windows endpoints, the cloud, and infrastructure using Microsoft Intune, Sentinel, and Defender, Author: Marius Sandbu
Title: Windows Forensics Cookbook: Maximize the power of Windows Forensics to perform highly effective forensic investigations, Author: Oleg Skulkin
Title: What Is Computer Science?: An Information Security Perspective, Author: Daniel Page
Title: Web Commerce Security: Design and Development, Author: Hadi Nahari
Title: Web Application Defender's Cookbook: Battling Hackers and Protecting Users, Author: Ryan C. Barnett
Title: Waging Cyber War: Technical Challenges and Operational Constraints, Author: Jacob G. Oakley
Title: VMware View Security Essentials, Author: Daniel Langenhan
Title: VMware NSX Cookbook: Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere, Author: Bayu Wibowo
Title: USING SCIENCE IN CYBERSECURITY, Author: Leigh Barnes Metcalf
Title: Unified Communications Forensics: Anatomy of Common UC Attacks, Author: Nicholas Mr. Grant
Title: Understanding Network Hacks: Attack and Defense with Python, Author: Bastian Ballmann
Title: Understand, Manage, and Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program, Author: Ryan Leirvik
Title: Unauthorised Access: Physical Penetration Testing For IT Security Teams, Author: Wil Allsopp

Pagination Links