Title: Dark Territory: The Secret History of Cyber War, Author: Fred Kaplan
Title: Malware Data Science: Attack Detection and Attribution, Author: Joshua Saxe
Title: Practical Linux Forensics: A Guide for Digital Investigators, Author: Bruce Nikkel
Title: The Art of Attack: Attacker Mindset for Security Professionals, Author: Maxie Reynolds
Title: Real-World Bug Hunting: A Field Guide to Web Hacking, Author: Peter Yaworski
Title: Python for Cybersecurity: Using Python for Cyber Offense and Defense, Author: Howard E. Poston III
Title: The Wires of War: Technology and the Global Struggle for Power, Author: Jacob Helberg
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, Author: Bruce Schneier
Title: Implementing Cryptography Using Python, Author: Shannon W. Bray
Title: Cryptography for Everyone, Author: Matthew D. Green Pre-Order Now
Title: Red Team Engineering: The Art of Building Offensive Tools and Infrastructure, Author: Casey Erdmann Pre-Order Now
Title: Dissecting the Dark Web: Reverse Engineering the Tools of the Underground Economy, Author: Lindsay Kaye Pre-Order Now
Title: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, Author: Bruce Schneier
Title: Cybersecurity For Dummies, Author: Joseph Steinberg
Title: IAPP CIPP / US Certified Information Privacy Professional Study Guide, Author: Mike Chapple
Title: Practical Lock Picking: A Physical Penetration Tester's Training Guide, Author: Deviant Ollam
Title: CISM Certified Information Security Manager Study Guide, Author: Mike Chapple
Title: Hacking Success: how owners and officers should cultivate policy for cybersecurity and use of artificial intelligence, Author: Phillip Miller
Title: Cryptography, Author: Panos Louridas

Pagination Links