Title: Black Hat Bash: Creative Scripting for Hackers and Pentesters, Author: Nick Aleks
Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap, Author: Travis DeForge
Title: Network Security with OpenSSL: Cryptography for Secure Communications, Author: John Viega
Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: Hacking: The Art of Exploitation, 2nd Edition, Author: Jon Erickson
Title: The Art of Deception: Controlling the Human Element of Security, Author: Kevin D. Mitnick
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: The Code of Honor: Embracing Ethics in Cybersecurity, Author: Paul J. Maurer
Title: How to Check your Android Phone for Spyware!, Author: Joe Seanor
Title: DNSSEC Mastery, Author: Michael W. Lucas
Title: Ultimate GDPR Practitioner Guide (2nd Edition): Demystifying Privacy & Data Protection, Author: Stephen R Massey
Title: The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime, Author: Scott Augenbaum
Title: How Cybersecurity Really Works: A Hands-On Guide for Total Beginners, Author: Sam Grubb
Title: PTFM, Author: Tim Bryant
Title: Social Engineering: The Science of Human Hacking, Author: Christopher Hadnagy
Title: Set Up Your Own IPsec VPN, OpenVPN and WireGuard Server, Author: Lin Song
Explore Series
Title: The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting, Author: Mark Morowczynski

Pagination Links