Title: (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, Author: Ben Malisow
Title: 101 Labs - CompTIA CySA+, Author: Paul W Browning
Title: 802.11 Security: Securing Wireless Networks, Author: Bruce Potter
Title: A Beginner's Guide To Web Application Penetration Testing, Author: Ali Abdollahi
Title: A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program, Author: Debra Baker
Title: Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts, Author: Nitesh Dhanjani
Title: Advanced Malware Analysis and Intelligence: Investigating malicious code with static and dynamic analysis and threat intelligence (English Edition), Author: Mahadev Thukaram
Title: Adversarial AI Attacks, Mitigations, and Defense Strategies: A cybersecurity professional's guide to AI attacks, threat modeling, and securing AI with MLSecOps, Author: John Sotiropoulos
Title: Amazon Linux for Cloud Success: Step-by-Step Guide, Author: Casey D. Sara
Title: Apache Cookbook: Solutions and Examples for Apache Administration, Author: Rich Bowen
Title: API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation, Author: Confidence Staveley
Title: Applied Incident Response, Author: Steve Anson
Title: Artificial Intelligence in Cybersecurity: Use AI to Protect Your Organization, Author: Lisa Ventura Pre-Order Now
Title: Authenticity: Reading, Remembering, Performing, Author: Patrick Finney
Title: AWS Security Cookbook - Second Edition: Practical solutions for securing AWS cloud infrastructure with essential services and best practices, Author: Heartin Kanikathottu
Title: Bash Shell Scripting for Pentesters: Master the art of command-line exploitation and enhance your penetration testing workflows, Author: Steve Campbell
Title: Beautiful Security: Leading Security Experts Explain How They Think, Author: Andy Oram
Title: Beginning Information Cards and CardSpace: From Novice to Professional, Author: Marc Mercuri
Title: Blockchain: Blueprint for a New Economy, Author: Melanie Swan
Title: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities, Author: Vickie Li

Pagination Links