Title: (ISC)2 Certified Cloud Security Professional CCSP Realistic Practice Tests: 6 Realistic Practice Tests with 280+ Questions and detailed explanations to get you CCSP certified, Author: Certsquad Professional Trainers
Title: (ISC)2 Certified Information Systems Security Professional CISSP Realistic Practice Test: 5 Realistic Practice Tests with 500+ Questions and detailed explanations to get you CISSP certified, Author: Certsquad Professional Trainers
Title: 10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy, Author: Eric Rzeszut
Title: 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, Author: Kim Crawley
Title: 97 Things Every Information Security Professional Should Know: Collective Wisdom from the Experts, Author: Christina Morillo
Title: A Beginner's Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals, Author: Brij B. Gupta
Title: A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities, Author: Sagar Rahalkar
Title: A Cryptography Primer: Secrets and Promises, Author: Philip N. Klein
Title: Achieving and Sustaining Secured Business Operations: An Executive's Guide to Planning and Management, Author: Neelesh Ajmani
Title: Advanced API Security: OAuth 2.0 and Beyond, Author: Prabath Siriwardena
Title: Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques, Author: Robert J. Girod
Title: Advanced Penetration Testing: Red Team, Author: Richard Knowell
Title: Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps, Author: John Sotiropoulos
Title: Android Security Internals: An In-Depth Guide to Android's Security Architecture, Author: Nikolay Elenkov
Title: Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software, Author: Nir Yehoshua
Title: Application Security Program Handbook: A guide for software engineers and team leaders, Author: Derek Fisher
Title: Applied Cryptography using Python: Implement encryption, hashing, and cryptographic protocols securely with Python, Author: Ramesh Nagappan Pre-Order Now
Title: Artificial Intelligence in Cybersecurity: Use AI to Protect Your Organization, Author: Lisa Ventura Pre-Order Now
Title: Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations, Author: Morey J. Haber
Title: Así es como me dicen que acabará el mundo, Author: Nicole Perlroth

Pagination Links