Title: Red Team Engineering: The Art of Building Offensive Tools and Infrastructure, Author: Casey Erdmann Pre-Order Now
Title: Penetration Testing: A Hands-On Introduction to Hacking, Author: Georgia Weidman
Title: Steal This Computer Book 4.0: What They Won't Tell You About the Internet, Author: Wallace Wang
Title: Cryptography: The Key to Digital Security, How It Works, and Why It Matters, Author: Keith Martin
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: Cyberjutsu: Cybersecurity for the Modern Ninja, Author: Ben McCarty
Title: Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats, Author: Alex Matrosov
Title: Dissecting the Dark Web: Reverse Engineering the Tools of the Underground Economy, Author: Lindsay Kaye Pre-Order Now
Title: The Book of PF, 4th Edition: A No-Nonsense Guide to the OpenBSD Firewall, Author: Peter N.M. Hansteen Pre-Order Now
Title: Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, Author: Eric Cole
Title: Cybersecurity For Dummies, Author: Joseph Steinberg
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing, Author: Roger A. Grimes
Title: Certified CMMC Assessor Handbook: Developed by CyberDI, Author: J. Gregory Mcverry
Title: Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time, Author: O. Sami Saydjari
Title: Surveillance Valley: The Secret Military History of the Internet, Author: Yasha Levine
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, Author: Bruce Schneier
Title: The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting, Author: Mark Morowczynski

Pagination Links