Title: Microsoft Defender for Identity in Depth: An exhaustive guide to ITDR, breach prevention, and cyberattack response, Author: Pierre Thoor
Title: The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice, Author: Jason Andress
Title: Network Security and Cryptography, Author: Sarhan M. Musa
Title: DYNAMIC NETWORKS AND CYBER-SECURITY, Author: Niall M Adams
Title: Kali Linux Web Penetration Testing Cookbook, Author: Gilberto Najera-Gutierrez
Title: Binary Analysis Cookbook: Actionable recipes for disassembling and analyzing binaries for security risks, Author: Michael Born
Title: Mastering Veeam Backup & Replication: Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy, Author: Chris Childerhose
Title: Netzwerkprotokolle hacken: Sicherheitslücken verstehen, analysieren und schützen, Author: James Forshaw
Title: Hacking: The Next Generation: The Next Generation, Author: Nitesh Dhanjani
Title: Designing and Building Security Operations Center, Author: David Nathans
Title: Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches, Author: Soledad Antelada Toledano
Title: Enterprise Software Security: A Confluence of Disciplines, Author: Kenneth van Wyk
Title: Check Point Firewall Administration R81.10+: A practical guide to Check Point firewall deployment and administration, Author: Vladimir Yakovlev
Title: Learning Penetration Testing with Python, Author: Christopher Duffy
Title: Reconnaissance for Ethical Hackers: Focus on the starting point of data breaches and explore essential steps for successful pentesting, Author: Glen D. Singh
Title: Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7, Author: Sairam Jetty
Title: SpamAssassin: A practical guide to integration and configuration, Author: Alistair McDonald
Title: Unauthorised Access: Physical Penetration Testing For IT Security Teams, Author: Wil Allsopp
Title: Nmap 6: Network Exploration and Security Auditing Cookbook, Author: Paulino Calderon Pale
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo

Pagination Links