Title: Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Author: John Chirillo
Title: Drone and UAV Forensics: A Hands-On Approach, Author: Hudan Studiawan
Title: Wireshark Essentials: Simplifying Network Security and Troubleshooting, Author: Arun Soni
Title: Field Manual for Cyber Incident Handling and Response: Prevent. Respond. Recover. A Tactical Guide to Leading Through Cyber Incide, Author: Austin Weedor
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III, Author: Saed Alrabaee
Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Cracking: Red team Hacking: Kali Linux, Parrot OS, BackBox & BlackArch
Audiobook (Unabridged) $14.47
. Price is $14.47 . You save %.
OR

FREE with a B&N Audiobooks Subscription trial!

Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part II, Author: Saed Alrabaee
Title: Intelligent Continuous Security: AI-Enabled Transformation for Seamless Protection, Author: Marc Hornbeek
Title: Amazon Linux for Cloud Success: Step-by-Step Guide, Author: Casey D. Sara
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Created with Sketch.
Close
Created with Sketch.
Created with Sketch.

Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy
Audiobook (Unabridged) $26.99
. Price is $26.99 . You save %.
OR

FREE with a B&N Audiobooks Subscription trial!

Title: Cybersecurity with AWS: Fortifying Digital Frontiers, Author: Syed Rehan
Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: The Pragmatic CISO, Author: Frank A. Vesce
Title: Amazon Linux for Cloud Success: Step-by-Step Guide, Author: Casey D. Sara
Title: Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Author: John Chirillo
Title: Hacking For Dummies, Author: Kevin Beaver
Title: Defense in Depth: Modern Cybersecurity Strategies and Evolving Threats, Author: Hewa Majeed Zangana
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part IV, Author: Saed Alrabaee

Pagination Links