Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing, Author: James Forshaw
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Introduction to Modern Cryptography: Revised Third Edition, Author: Jonathan Katz
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Alice and Bob Learn Application Security, Author: Tanya Janca
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware, Author: Marc Weber Tobias
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture, Author: Gary Archer
Title: ISC2 CCSP Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle, Author: Mike Chapple
Title: CompTIA Security+ Guide to Network Security Fundamentals, Author: Mark Ciampa
Title: Security Engineering: A Guide to Building Dependable Distributed Systems, Author: Ross Anderson
Title: Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls, Author: Dr. Jason Edwards
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: Locksport: A Hackers Guide to Lockpicking, Impressioning, and Safe Cracking, Author: Jos Weyers
Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim

Pagination Links