Title: IAPP CIPM Certified Information Privacy Manager Study Guide, Author: Mike Chapple
Title: Cybersecurity Blue Team Toolkit, Author: Nadean H. Tanner
Title: Python for Cybersecurity: Using Python for Cyber Offense and Defense, Author: Howard E. Poston III
Title: Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity, Author: Marcus J. Carey
Title: Hacking the Hacker: Learn From the Experts Who Take Down Hackers, Author: Roger A. Grimes
Title: If It's Smart, It's Vulnerable, Author: Mikko Hyppönen
Title: Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World, Author: Marcus J. Carey
Title: Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership, Author: Marcus J. Carey
Title: Blue Fox: Arm Assembly Internals and Reverse Engineering, Author: Maria Markstedter
Title: Designing Secure Software: A Guide for Developers, Author: Loren Kohnfelder
Title: Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity, Author: Marcus J. Carey
Title: The Art of Attack: Attacker Mindset for Security Professionals, Author: Maxie Reynolds
Title: Security Awareness For Dummies, Author: Ira Winkler
Title: Practical Linux Forensics: A Guide for Digital Investigators, Author: Bruce Nikkel
Title: Black Hat Python: Python Programming for Hackers and Pentesters, Author: Justin Seitz
Title: CompTIA CySA+ Practice Tests: Exam CS0-002, Author: Mike Chapple
Title: Implementing Cryptography Using Python, Author: Shannon W. Bray
Title: CompTIA PenTest+ Practice Tests: Exam PT0-001, Author: Crystal Panek
Title: Blockchain in Action, Author: Bina Ramamurthy
Title: Secure By Design, Author: Daniel Deogun

Pagination Links