Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: Threat Modeling, Author: Izar Tarandach
Title: Data Protection for the HR Manager, Author: Mandy Webster
Title: CEH Certified Ethical Hacker Cert Guide, Author: Michael Gregg
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Check Point NGX R65 Security Administration, Author: Ralph Bonnell
Title: Securing Enterprise Networks with Cisco Meraki, Author: Ryan Chaney
Title: CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide, Author: Joseph Muniz
Title: Practical Cloud Native Security with Falco: Risk and Threat Detection for Containers, Kubernetes, and Cloud, Author: Loris Degioanni
Title: Hackers and Hacking: A Reference Handbook, Author: Thomas J. Holt
Title: Securing E-Business Applications and Communications, Author: Jonathan S. Held
Title: Securing Citrix XenApp Server in the Enterprise, Author: Tariq Azad
Title: CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security, Author: Raj Samani
Title: Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, Author: Christopher C. Elisan
Title: VPNs Illustrated: Tunnels, VPNs, and IPsec, Author: Jon Snader
Title: Strategic Cyber Deterrence: The Active Cyber Defense Option, Author: Scott Jasper

Pagination Links