(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (English Edition)
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests (English Edition)
Advanced Security Testing with Kali Linux (English Edition)
Computer Hacking: 2 Books in 1: Hacking Tools for Computers with Linux Mint, Linux for Beginners and Kali Linux Tools and Hacking with Kali Linux with Basic Security Testing (English Edition)
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (English Edition)
Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)
Social Engineering: The Science of Human Hacking (English Edition)
The Art of Invisibility: The World' s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (English Edition)
Likewar: The Weaponization of Social Media
CISSP For Dummies
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems. (English Edition)
Metadata (The MIT Press Essential Knowledge series)
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide)
Probabilistic Machine Learning: An Introduction (Adaptive Computation and Machine Learning series)
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (English Edition)
Routledge Companion to Global Cyber-Security Strategy
Kerberos: The Definitive Guide (Definitive Guides)
AWS for Solutions Architects: The definitive guide to AWS Solutions Architecture for migrating to, building, scaling, and succeeding in the cloud, 2nd Edition
How To Think Like A Manager for the CISSP Exam (English Edition)
CISSP... Study Guide (Syngress)
Automotive Cyber Security: Introduction, Challenges, and Standardization
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program (IEEE Press)
Social, Legal, and Ethical Implications of Iot, Cloud, and Edge Computing Technologies
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems. (English Edition)
Automotive Cybersecurity Engineering Handbook: The automotive engineer' s roadmap to cyber-resilient vehicles
Secure Broadcast Communication
Use of Voltage Stability Assessment and Transient Stability Assessment Tools in Grid Operations (Power Electronics and Power Systems)
Advanced Introduction to Cybersecurity Law (Elgar Advanced Introductions)
The Minimum Description Length Principle (Adaptive Computation and Machine Learning series)
Software Transparency: Supply Chain Security in an Era of a Software-Driven Society (English Edition)
Basic Security Testing with Kali Linux, Fourth Edition
Privacy is Power: Why and How You Should Take Back Control of Your Data
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
DevSecOps: A complete implementation guide (Cyber Security)
Pegasus: The Secret Technology that Threatens the End of Privacy and Democracy
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
Foundations of Computer Vision (Adaptive Computation and Machine Learning series)
The Android Malware Handbook: Detection and Analysis by Human and Machine
CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam
Evasive Malware: Understanding Deceptive and Self-Defending Threats
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cyber skills (English Edition)
CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701
Defensive Security Handbook: Best Practices for Securing Infrastructure
Job (Job, 3)
Cyber Security: Threats and Responses for Government and Business (Praeger Security International)
Gdpr for Startups and Scaleups: A Practical Guide (Elgar Practical Guides)
Laravel: Up & Running; A Framework for Building Modern PHP Apps
The Perfect Weapon: war, sabotage, and fear in the cyber age
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (English Edition)
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
CEH Certified Ethical Hacker Practice Exams, Fourth Edition (English Edition)
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
How to Measure Anything in Cybersecurity Risk
Black Hat GraphQL: Attacking Next Generation APIs
Comptia Security+ Certification All-in-One Exam Guide: Exam SY0-601
Mastering Linux Device Driver Development: Write custom device drivers to support computer peripherals in Linux operating systems (English Edition)
Metasploit: The Penetration Tester' s Guide
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817 (English Edition)
The Little Typer (Mit Press)
Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities
CCSP Cloud Guardians: A bulleted look at the critical topics for the (ISC)2 Certified Cloud Security Professional exam
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Hacking APIs: Breaking Web Application Programming Interfaces
AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam
Network Security Assessment: Know Your Network
The Car Hacker' s Handbook: A Guide for the Penetration Tester
97 Things About Ethics Everyone in Data Science Should Know: Collective Wisdom from the Experts
PAM Mastery
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (English Edition)
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests (English Edition)
Advanced Security Testing with Kali Linux (English Edition)
Computer Hacking: 2 Books in 1: Hacking Tools for Computers with Linux Mint, Linux for Beginners and Kali Linux Tools and Hacking with Kali Linux with Basic Security Testing (English Edition)
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (English Edition)
Data Mining: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)
Social Engineering: The Science of Human Hacking (English Edition)
The Art of Invisibility: The World' s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (English Edition)
Likewar: The Weaponization of Social Media
CISSP For Dummies
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems. (English Edition)
Metadata (The MIT Press Essential Knowledge series)
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide)
Probabilistic Machine Learning: An Introduction (Adaptive Computation and Machine Learning series)
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests (English Edition)
Routledge Companion to Global Cyber-Security Strategy
Kerberos: The Definitive Guide (Definitive Guides)
AWS for Solutions Architects: The definitive guide to AWS Solutions Architecture for migrating to, building, scaling, and succeeding in the cloud, 2nd Edition
How To Think Like A Manager for the CISSP Exam (English Edition)
CISSP... Study Guide (Syngress)
Automotive Cyber Security: Introduction, Challenges, and Standardization
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle
Corporate Cybersecurity: Identifying Risks and the Bug Bounty Program (IEEE Press)
Social, Legal, and Ethical Implications of Iot, Cloud, and Edge Computing Technologies
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems. (English Edition)
Automotive Cybersecurity Engineering Handbook: The automotive engineer' s roadmap to cyber-resilient vehicles
Secure Broadcast Communication
Use of Voltage Stability Assessment and Transient Stability Assessment Tools in Grid Operations (Power Electronics and Power Systems)
Advanced Introduction to Cybersecurity Law (Elgar Advanced Introductions)
The Minimum Description Length Principle (Adaptive Computation and Machine Learning series)
Software Transparency: Supply Chain Security in an Era of a Software-Driven Society (English Edition)
Basic Security Testing with Kali Linux, Fourth Edition
Privacy is Power: Why and How You Should Take Back Control of Your Data
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
DevSecOps: A complete implementation guide (Cyber Security)
Pegasus: The Secret Technology that Threatens the End of Privacy and Democracy
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
Foundations of Computer Vision (Adaptive Computation and Machine Learning series)
The Android Malware Handbook: Detection and Analysis by Human and Machine
CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam
Evasive Malware: Understanding Deceptive and Self-Defending Threats
ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cyber skills (English Edition)
CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701
Defensive Security Handbook: Best Practices for Securing Infrastructure
Job (Job, 3)
Cyber Security: Threats and Responses for Government and Business (Praeger Security International)
Gdpr for Startups and Scaleups: A Practical Guide (Elgar Practical Guides)
Laravel: Up & Running; A Framework for Building Modern PHP Apps
The Perfect Weapon: war, sabotage, and fear in the cyber age
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali (English Edition)
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
CEH Certified Ethical Hacker Practice Exams, Fourth Edition (English Edition)
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
How to Measure Anything in Cybersecurity Risk
Black Hat GraphQL: Attacking Next Generation APIs
Comptia Security+ Certification All-in-One Exam Guide: Exam SY0-601
Mastering Linux Device Driver Development: Write custom device drivers to support computer peripherals in Linux operating systems (English Edition)
Metasploit: The Penetration Tester' s Guide
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817 (English Edition)
The Little Typer (Mit Press)
Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities
CCSP Cloud Guardians: A bulleted look at the critical topics for the (ISC)2 Certified Cloud Security Professional exam
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
Financial Cybersecurity Risk Management: Leadership Perspectives and Guidance for Systems and Institutions
Hacking APIs: Breaking Web Application Programming Interfaces
AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam
Network Security Assessment: Know Your Network
The Car Hacker' s Handbook: A Guide for the Penetration Tester
97 Things About Ethics Everyone in Data Science Should Know: Collective Wisdom from the Experts
PAM Mastery