Title: Linux Shell Scripting for Hackers: Automate and scale your hacking process with bash scripting, Author: Valentine (Traw) Nachi Pre-Order Now
Title: Incident Management for Industrial Control Systems: Safeguard industrial control systems by mastering critical infrastructure cybersecurity, Author: Durgesh Kalya Pre-Order Now
Title: Así se somete a una sociedad / This Is How a Society Is Subdued, Author: Mar España Pre-Order Now
Title: Defense Evasion Techniques: A comprehensive guide to defense evasion tactics for Red Teams and Penetration Testers, Author: Joas A Santos Pre-Order Now
Title: Identity Security for Software Development: Building with Identity, Secrets, and Credentials, Author: John Walsh Pre-Order Now
Title: Social Media: How to Engage, Share, and Connect, Author: Regina Luttrell Pre-Order Now
Title: Esclavos del algoritmo. Manual de resistencia en la era de la inteligencia artificial / Slaves of the Algorithm, Author: Laura G. De Rivera
Title: Guardians of Data: A Comprehensive Guide to Digital Data Protection, Author: Nik Zulkarnaen Khidzir
Title: Extremely Online: The Untold Story of Fame, Influence, and Power on the Internet, Author: Taylor Lorenz
Title: Taming the Hacking Storm: A Framework for Defeating Hackers and Malware, Author: Roger A. Grimes
Title: Battle for the Bird: Jack Dorsey, Elon Musk, and the $44 Billion Fight for Twitter's Soul, Author: Kurt Wagner
Title: Salesforce Security: An Admin's Guide, Author: Gnana Silaparasetti
Title: Entiende la tecnología: Desde la caída de Megaupload hasta los secretos de la In teligencia Artificial / The Digital Revolution, Author: Nate Gentile
Title: Der OPNsense-Praktiker: Enterprise-Firewalls mit Open Source, Author: Markus Stubbig
Title: 30-Minute Groups: Online Safety: Spotting Red Flags, Protecting Privacy, and Being a Positive Voice, Author: Raychelle Cassada Lohmann
Title: Personal Threat Management: The practitioner's guide to keeping clients safer, Author: Philip Grindell
Title: Understanding the Technology Behind Online Offending: A Guide for Professionals in the Criminal Justice System, Author: Christopher Wise
Title: Ransomware, Viruses, Social Engineering and Other Threats: Protecting Your Digital Assets, Author: Kelly Bourne
Title: Security Automation with Python: Practical Python solutions for automating and scaling security operations, Author: Corey Charles Sr.
Title: Cyber-Conscious Leadership: A Practical Guide to Protecting Your Organization Against Cybercrime, Author: Mark Sangster

Pagination Links