Title: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities, Author: Vickie Li
Title: Penetration Testing: A Hands-On Introduction to Hacking, Author: Georgia Weidman
Title: Ransomware Protection Playbook, Author: Roger A. Grimes
Title: Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk, Author: Andrew Magnusson
Title: Big Tech Tyrants: How Silicon Valley's Stealth Practices Addict Teens, Silence Speech, and Steal Your Privacy, Author: Floyd Brown
Title: Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, Author: Perry Carpenter
Title: Steal This Computer Book 4.0: What They Won't Tell You About the Internet, Author: Wallace Wang
Title: Cyberjutsu: Cybersecurity for the Modern Ninja, Author: Ben McCarty
Title: The Pentester BluePrint: Starting a Career as an Ethical Hacker, Author: Phillip L. Wylie
Title: Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats, Author: Alex Matrosov
Title: Linux Basics for Hackers, 2nd Edition: Getting Started with Networking, Scripting, and Security in Kali, Author: OccupyTheWeb Pre-Order Now
Title: Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing, Author: Roger A. Grimes
Title: Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems, Author: Chris Sanders
Title: Cybersecurity Essentials, Author: Charles J. Brooks
Title: (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, Author: Mike Chapple
Title: Kali Linux Penetration Testing Bible, Author: Gus Khawaja
Title: Surveillance Valley: The Secret Military History of the Internet, Author: Yasha Levine
Title: Cisco Certified Support Technician (CCST) Cybersecurity 100-160 Official Cert Guide, Author: Shane Sexton
Title: Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue, Author: Larry Clinton
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard

Pagination Links