Title: Secure By Design, Author: Daniel Deogun
Title: The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Author: Joshua Holden
Title: Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk, Author: Andrew Gorecki
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: CompTIA PenTest+ Certification For Dummies, Author: Glen E. Clarke
Title: (ISC)2 Certified Information Systems Security Professional CISSP Realistic Practice Test: 5 Realistic Practice Tests with 500+ Questions and detailed explanations to get you CISSP certified, Author: Certsquad Professional Trainers
Title: GET LOST: Personal Privacy Strategies for Extremely Busy People, Author: Daniel Farber Huang
Title: Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations, Author: Robert J. Girod
Title: Sh*t I Always Forget, 6? x 9?: Password Log Book, Internet Login Keeper, Website Log Book Organizer, Simple and Minimalist with Matte Black Cover, Author: Future Proof Publishing
Title: Así es como me dicen que acabará el mundo, Author: Nicole Perlroth
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies, Author: Carey Parker
Title: Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), Author: Mike Meyers
Title: Conducting Biosocial Surveys: Collecting, Storing, Accessing, and Protecting Biospecimens and Biodata, Author: National Research Council
Title: Rise of the Machines: A Project Zero Trust Story, Author: George Finney
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: The Shellcoder's Handbook: Discovering and Exploiting Security Holes, Author: Chris Anley
Title: Data Engineering for Cybersecurity: Build Secure Data Pipelines with Free and Open-Source Tools, Author: James Bonifield
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: Big Breaches: Cybersecurity Lessons for Everyone, Author: Neil Daswani

Pagination Links