Title: ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, Author: Mike Chapple
Title: Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption, Author: Jean-Philippe Aumasson
Title: Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing, Author: James Forshaw
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Alice and Bob Learn Application Security, Author: Tanya Janca
Title: Practical Linux Forensics: A Guide for Digital Investigators, Author: Bruce Nikkel
Title: Red Team Engineering: The Art of Building Offensive Tools and Infrastructure, Author: Casey Erdmann Pre-Order Now
Title: Dissecting the Dark Web: Reverse Engineering the Tools of the Underground Economy, Author: Lindsay Kaye Pre-Order Now
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture, Author: Gary Archer
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: ISC2 CCSP Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle, Author: Mike Chapple
Title: Multi-Cloud Administration Guide: Manage and Optimize Cloud Resources Across Azure, AWS, GCP, and Alibaba Cloud, Author: Jeroen Mulder
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand
Title: Locksport: A Hackers Guide to Lockpicking, Impressioning, and Safe Cracking, Author: Jos Weyers
Title: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, Author: Michael Sikorski
Title: Malware Data Science: Attack Detection and Attribution, Author: Joshua Saxe
Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim

Pagination Links