Title: The Psychology of Cybersecurity: Hacking and the Human Mind, Author: Tarnveer Singh
Title: The CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms, Author: Raj Badhwar
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: Hacking: The Art of Exploitation, 2nd Edition, Author: Jon Erickson
Title: The Art of Deception: Controlling the Human Element of Security, Author: Kevin D. Mitnick
Title: Developing Cybersecurity Programs and Policies, Author: Omar Santos
Explore Series
Title: The Code of Honor: Embracing Ethics in Cybersecurity, Author: Paul J. Maurer
Title: How to Check your Android Phone for Spyware!, Author: Joe Seanor
Title: DNSSEC Mastery, Author: Michael W. Lucas
Title: Ultimate GDPR Practitioner Guide (2nd Edition): Demystifying Privacy & Data Protection, Author: Stephen R Massey
Title: The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime, Author: Scott Augenbaum
Title: How Cybersecurity Really Works: A Hands-On Guide for Total Beginners, Author: Sam Grubb
Title: PTFM, Author: Tim Bryant
Title: Social Engineering: The Science of Human Hacking, Author: Christopher Hadnagy
Title: Set Up Your Own IPsec VPN, OpenVPN and WireGuard Server, Author: Lin Song
Explore Series
Title: The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting, Author: Mark Morowczynski
Title: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities, Author: Vickie Li
Title: Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs, Author: Carlos A. Lozano
Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: Certified Ethical Hacker: Reconnaissance, Vulnerability Analysis & Social Engineering, Author: Rob Botwright

Pagination Links