Title: Dissecting the Dark Web: Reverse Engineering the Tools of the Underground Economy, Author: Lindsay Kaye Pre-Order Now
Title: Cryptography, Author: William J. Buchanan
Explore Series
Title: Cybersecurity For Dummies, Author: Joseph Steinberg
Title: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, Author: Bruce Schneier
Title: Codebreaking: A Practical Guide, Author: Elonka Dunin
Title: The Joy of Cryptography: An Undergraduate Course in Provable Security, Author: Mike Rosulek
Title: Mastering Microsoft 365 ENTRA ID - 100 Practical Guides For Secure Identity and Access Management, Author: Openshelves
Title: Hacking Cryptography: Write, break, and fix real-world implementations, Author: Kamran Khan
Title: Worm: The First Digital World War, Author: Mark Bowden
Title: Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers, Author: Eric O'Neill
Title: ISO 27001 Controls - A guide to implementing and auditing, Author: Bridget Kenyon
Title: Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats, Author: David Álvarez Pérez
Title: Managing Security with Snort & IDS Tools: Intrusion Detection with Open Source Tools, Author: Kerry J. Cox
Title: Exam Ref AZ-500 Microsoft Azure Security Technologies, Author: Yuri Diogenes
Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: Introduction to Modern Cryptography: Revised Third Edition, Author: Jonathan Katz
Title: Alice and Bob Learn Application Security, Author: Tanya Janca
Title: Montefeltro Conspiracy: A Renaissance Mystery Decoded, Author: Marcello Simonetta
Title: Cyber Risk Management: Prioritize Threats, Identify Vulnerabilities and Apply Controls, Author: Christopher J Hodson

Pagination Links