E-book
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD
diJohnny LongE-book
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD
diJohnny LongE-book
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
diCraig P. BauerE-book
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
diKevin D. MitnickE-book
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
diJames C FosterE-book
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
diJohnny LongE-book
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
diTJ O'ConnorE-book
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
diJoshua HoldenE-book
Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool
diGabriele GiuseppiniE-book
True Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem
diJ. A. HitchcockE-book
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
diDmitry KorzunE-book
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
diPrabath SiriwardenaE-book
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
diTimo SteffensE-book
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
diBernard Peter RobichauE-book
Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS
diJames StevensonE-book
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk
diAndrew GoreckiE-book
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
diJessey BullockE-book
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817
diScott SelikoffE-book
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
diVinny TroiaE-book
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
diPerry CarpenterE-book
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
diMarcus J. CareyE-book
Cybersecurity Program Development for Business: The Essential Planning Guide
diChris MoschovitisE-book
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
diNick FurneauxE-book
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
diMatthew HickeyE-book
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
diMarcus J. CareyE-book
The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
diPhil QuadeE-book
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
diAbhijit MohantaE-book
Developing Applications with Azure Active Directory: Principles of Authentication and Authorization for Architects and Developers
diManas MayankE-book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
diEric C. ThompsonE-book
Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0
diYvonne WilsonE-book
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
diMorey J. HaberE-book
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
diAbhishek ChopraE-book
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
diJon WestfallE-book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
diCarey ParkerE-book
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data
diVasantha LakshmiE-book
Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
diMarius Iulian MihailescuE-book
Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events
diEric C. ThompsonE-book
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
diNihad A. HassanE-book
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
diAaron Roberts