Title: Practical Cloud Security: A Guide for Secure Design and Deployment, Author: Chris Dotson
Title: ISC2 CCSP Certified Cloud Security Professional Official Study Guide, Author: Mike Chapple
Title: Practical Purple Teaming: The Art of Collaborative Defense, Author: Alfie Champion
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition), Author: Dr. Erdal Ozkaya
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems, Author: Chris Sanders
Title: The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting, Author: Mark Morowczynski
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Data Engineering for Cybersecurity: Build Secure Data Pipelines with Free and Open-Source Tools, Author: James Bonifield
Title: Zero Trust Networks: Building Secure Systems in Untrusted Networks, Author: Razi Rais
Title: Obfuscation: A User's Guide for Privacy and Protest, Author: Finn Brunton
Title: Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware, Author: Cassie Crossley
Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim
Title: CompTIA® Network+ Terminology: a QuickStudy Laminated Reference Guide, Author: George Antoniou PhD
Title: Kerberos: The Definitive Guide: The Definitive Guide, Author: Jason Garman
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground, Author: Kevin Poulsen
Title: Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions, Author: David Cowen
Title: The Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity, Author: Amanda Welsh Ph.D.

Pagination Links