Title: PostgreSQL Mistakes and How to Avoid Them, Author: Jimmy Angelakos
Title: Privileged Access Management: Strategies for Zero Trust in the Enterprise, Author: Gregory C. Rasner
Title: Information Systems Security and Privacy: 9th International Conference, ICISSP 2023, Lisbon, Portugal, 22-24 February, 2023, and 10th International Conference, ICISSP 2024, Rome, Italy, February 26-28, 2024, Revised Selected Papers, Author: Gabriele Lenzini
Title: Microsoft Security Copilot: Master strategies for AI-driven cyber defense, Author: Bi Yue Xu
Title: Cyber Security for Next-Generation Computing Technologies, Author: Inam Ullah Khan
Title: Advances in Emerging Financial Technology and Digital Money, Author: Yassine Maleh
Title: The CISO 3.0: A Guide to Next-Generation Cybersecurity Leadership, Author: Walt Powell
Title: The Computer Security Workbook: A Course Companion Resource, Author: Juan Tapiador
Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim
Title: Data Engineering for Cybersecurity: Build Secure Data Pipelines with Free and Open-Source Tools, Author: James Bonifield
Title: Palo Alto Networks from Policy to Code: Automate PAN-OS security policies with Python precision, Author: Nikolay Matveev
Title: Data-Driven Cybersecurity: Reducing risk with proven metrics, Author: Mariano Mattei
Title: Philosophy.exe: The Techno-Philosophical Toolkit for Modern Minds, Author: Matthias Muhlert
Title: TOP SECRET CONFIDENTIAL - Password Keeper Book with Alphabetical Tabs Simple Modern Black: Small Pocket Size Internet Logbook for Seniors - Remember Website Address Account Details - Secure Digital Notebook, Author: Luxe Stationery
Title: TOP SECRET CONFIDENTIAL - Password Keeper Book with Alphabetical Tabs Simple Modern Black: Medium Size Internet Logbook for Seniors - How to Remember Website Address Account Details - Secure Digital Notebook, Author: Luxe Stationery
Title: Certificate of Cloud Security Knowledge (CCSK v5) Study Guide: In-Depth Guidance and Practice, Author: Graham Thompson
Title: Behavioral Insights in Cybersecurity: A Guide to Digital Human Factors, Author: Dustin S. Sachs
Title: Everyday Cryptography 3e: Fundamental Principles and Applications, Author: Keith Martin
Title: Certified Ethical Hacker (CEH) Study Guide: In-Depth Guidance and Practice, Author: Matt Walker
Title: Amazon Linux for Cloud Success: Step-by-Step Guide, Author: Casey D. Sara

Pagination Links