Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: HACKING WITH KALI LINUX PENETRATION TESTING: Mastering Ethical Hacking Techniques with Kali Linux (2024 Guide for Beginners), Author: BARBARA HEATH
Title: Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level, Author: Paul Huijbregts
Title: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, Author: Michael Sikorski
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: Cybersecurity All-in-One For Dummies, Author: Joseph Steinberg
Title: Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security, Author: Richard Dorsel
Title: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Author: Kevin Mitnick
Title: Application Security Program Handbook, Author: Derek Fisher
Title: Managing Cybersecurity Risk: Cases Studies and Solutions, Author: Jonathan Reuvid
Title: Cryptography, Author: William J. Buchanan
Explore Series
Title: Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit, Author: Debasish Mandal
Title: Linux Firewalls: Attack Detection and Response, Author: Michael Rash
Title: Wi Fi User Guide, Author: Gel Gepsy
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence, Author: Nick Furneaux
Title: 97 Things Every Information Security Professional Should Know: Collective Wisdom from the Experts, Author: Christina Morillo
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Ultimate Splunk for Cybersecurity: Practical Strategies for SIEM Using Splunk's Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security (English Edition), Author: Jit Sinha

Pagination Links