Title: Black Hat Bash: Creative Scripting for Hackers and Pentesters, Author: Nick Aleks
Title: Metasploit, 2nd Edition, Author: David Kennedy
Title: The Art of Mac Malware, Volume 2: Detecting Malicious Software, Author: Patrick Wardle
Title: Cybersecurity Tabletop Exercises: From Planning to Execution, Author: Robert Lelewski
Title: Red Team Engineering: The Art of Building Offensive Tools and Infrastructure, Author: Casey Erdmann Pre-Order Now
Title: Dissecting the Dark Web: Reverse Engineering the Tools of the Underground Economy, Author: Lindsay Kaye Pre-Order Now
Title: Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats, Author: Kyle Cucci
Title: The Book of PF, 4th Edition: A No-Nonsense Guide to the OpenBSD Firewall, Author: Peter N.M. Hansteen Pre-Order Now
Title: From Day Zero to Zero Day: A Hands-On Guide to Vulnerability Research, Author: Eugene Lim
Title: The Definitive Guide to KQL: Using Kusto Query Language for operations, defending, and threat hunting, Author: Mark Morowczynski
Title: Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware, Author: Cassie Crossley
Title: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, Author: Dafydd Stuttard
Title: The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory, Author: Michael Hale Ligh
Title: ISC2 CCSP Certified Cloud Security Professional Official Study Guide, Author: Mike Chapple
Title: CompTIA Security+ SY0-701 Cert Guide, Author: Lewis Heuermann
Title: CASP+ CompTIA Advanced Security Practitioner Certification Kit: Exam CAS-004, Author: Jeff T. Parker
Title: Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain, Author: Kathleen M. Moriarty
Title: Practical Purple Teaming: The Art of Collaborative Defense, Author: Alfie Champion
Title: Advanced Penetration Testing: Hacking the World's Most Secure Networks, Author: Wil Allsopp
Title: Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems., Author: Matt Hand

Pagination Links