Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Cybersecurity All-in-One For Dummies, Author: Joseph Steinberg
Title: Security Engineering: A Guide to Building Dependable Distributed Systems, Author: Ross Anderson
Title: Real-World Bug Hunting: A Field Guide to Web Hacking, Author: Peter Yaworski
Title: Designing Secure Software: A Guide for Developers, Author: Loren Kohnfelder
Title: Mastering Information Security Compliance Management: A comprehensive handbook on ISO/IEC 27001:2022 compliance, Author: Adarsh Nair
Title: Real-World Cryptography, Author: David Wong
Title: Ultimate GDPR Practitioner Guide (2nd Edition): Demystifying Privacy & Data Protection, Author: Stephen R Massey
Title: Mike Meyers' CompTIA A+ Core 2 Certification Passport (Exam 220-1102), Author: Ron Gilster
Title: Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), Author: Mike Meyers
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity, Author: Zhassulan Zhussupov
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: x86 Software Reverse-Engineering, Cracking, and Counter-Measures, Author: Stephanie Domas
Title: Building Ethereum Dapps: Decentralized applications on the Ethereum blockchain, Author: Roberto Infante
Title: Kali Linux 2018: Windows Penetration Testing: Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018, 2nd Edition, Author: Wolf Halton
Title: Practical Linux Forensics: A Guide for Digital Investigators, Author: Bruce Nikkel
Title: Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing, Author: Rithik Chatterjee
Title: Sicherheitskonzepte in der mobilen Kommunikation: Drahtlose Kommunikation - Protokolle und Gefahren, Author: Wolfgang W. Osterhage

Pagination Links