Title: The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting, Author: Mark Morowczynski
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: Advanced Penetration Testing: Hacking the World's Most Secure Networks, Author: Wil Allsopp
Title: CHFI Computer Hacking Forensic Investigator Certification All-in-One Exam Guide, Author: Charles L. Brooks
Title: Intelligence-Driven Incident Response: Outwitting the Adversary, Author: Rebekah Brown
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Zero Trust Networks: Building Secure Systems in Untrusted Networks, Author: Razi Rais
Title: Cyber Threat Hunting, Author: Nadhem AlFardan
Title: Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-driven World, Author: Omar Santos
Title: Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware, Author: Cassie Crossley
Title: The Tangled Web: A Guide to Securing Modern Web Applications, Author: Michal Zalewski
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: Practical Purple Teaming: The Art of Collaborative Defense, Author: Alfie Champion
Title: A Practical Guide to Digital Forensics Investigations, Author: Darren Hayes
Title: Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions, Author: Clint Bodungen
Title: Defensive Security Handbook: Best Practices for Securing Infrastructure, Author: Lee Brotherston
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003), Author: Gregory B. White
Title: Drone and UAV Forensics: A Hands-On Approach, Author: Hudan Studiawan

Pagination Links