(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (English Edition)
OSINT Techniques: Resources for Uncovering Online Information
Google Hacking for Penetration Testers (English Edition)
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests (English Edition)
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests
The Pay Off: How Changing the Way We Pay Changes Everything (English Edition)
Black Hat Python: Python Programming for Hackers and Pentesters
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities (English Edition)
Hacking: The Art of Exploitation, 2nd Edition (English Edition)
Ethical Hacking: A Hands-on Introduction to Breaking In
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (English Edition)
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (English Edition)
Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (English Edition)
OSINT Techniques: Resources for Uncovering Online Information
Google Hacking for Penetration Testers (English Edition)
(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests (English Edition)
Learning Digital Identity: Design, Deploy, and Manage Identity Architectures
(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests
The Pay Off: How Changing the Way We Pay Changes Everything (English Edition)
Black Hat Python: Python Programming for Hackers and Pentesters
The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities (English Edition)
Hacking: The Art of Exploitation, 2nd Edition (English Edition)
Ethical Hacking: A Hands-on Introduction to Breaking In
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (English Edition)
iOS Forensics for Investigators: Take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide (English Edition)
Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices, 4th Edition
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict