Title: Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking, Author: Yassine Maleh
Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh
Title: Wireshark Essentials: Simplifying Network Security and Troubleshooting, Author: Arun Soni
Title: Amazon Linux for Cloud Success: Step-by-Step Guide, Author: Casey D. Sara
Title: Home Security Cheats, Hacks, Hints, Tips, Tricks Guide, Author: Trevor Clinger
Title: Drone and UAV Forensics: A Hands-On Approach, Author: Hudan Studiawan
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part I, Author: Saed Alrabaee
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part II, Author: Saed Alrabaee
Title: Cyber Defense: Best Practices for Digital Safety, Author: Jason Edwards
Title: Programa o serás programado (edición 15 aniversario): Once mandamientos para la era digital, Author: Douglas Rushkoff
Title: Defense in Depth: Modern Cybersecurity Strategies and Evolving Threats, Author: Hewa Majeed Zangana
Title: Field Manual for Cyber Incident Handling and Response: Prevent. Respond. Recover. A Tactical Guide to Leading Through Cyber Incide, Author: Austin Weedor
Title: The Pragmatic CISO, Author: Frank A. Vesce
Title: The Cyber Shield, Author: Siddhi Singh
Title: Mentalidad inhackeable: Técnicas para evitar la manipulación psicológica en la era digital, Author: María Aperador
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part IV, Author: Saed Alrabaee
Title: Hacking For Dummies, Author: Kevin Beaver
Title: Security and Privacy in Communication Networks: 20th EAI International Conference, SecureComm 2024, Dubai, United Arab Emirates, October 28-30, 2024, Proceedings, Part III, Author: Saed Alrabaee
Title: Intelligent Continuous Security: AI-Enabled Transformation for Seamless Protection, Author: Marc Hornbeek
Title: Cyber Security Kill Chain - Tactics and Strategies: Breaking down the cyberattack process and responding to threats, Author: Gourav Nagar

Pagination Links