Title: The Pentester BluePrint: Starting a Career as an Ethical Hacker, Author: Phillip L. Wylie
Title: The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer, Author: Perry Carpenter
Title: Steal This Computer Book 4.0: What They Won't Tell You About the Internet, Author: Wallace Wang
Title: Cyberjutsu: Cybersecurity for the Modern Ninja, Author: Ben McCarty
Title: Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats, Author: Alex Matrosov
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: Red Team Engineering: The Art of Building Offensive Tools and Infrastructure, Author: Casey Erdmann Pre-Order Now
Title: Dissecting the Dark Web: Reverse Engineering the Tools of the Underground Economy, Author: Lindsay Kaye Pre-Order Now
Title: The Book of PF, 4th Edition: A No-Nonsense Guide to the OpenBSD Firewall, Author: Peter N.M. Hansteen Pre-Order Now
Title: Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, Author: Eric Cole
Title: Surveillance Valley: The Secret Military History of the Internet, Author: Yasha Levine
Title: Cybersecurity For Dummies, Author: Joseph Steinberg
Title: Field Manual FM 6-02 Signal Support to Operations January 2014, Author: United States Government US Army
Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground, Author: Kevin Poulsen
Title: Kali Linux Penetration Testing Bible, Author: Gus Khawaja
Title: Stuff I Can't Remember: Password Log Book, Internet Login Keeper, Website Organizer, Simple & Minimalist, Matte Black Stealth Cover, Author: Future Proof Publishing
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh

Pagination Links