Books
- Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
- Making Sense of Cybersecurity
- Computer Security: A Hands-on Approach
- Threat Modeling: A Practical Guide for Development Teams
- Security Engineering: A Guide to Building Dependable Distributed Systems 3rd Edition
- Container Security: Fundamental Technology Concepts that Protect Containerized Applications
- Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
- Web Application Security: Exploitation and Countermeasures for Modern Web Applications
- Practical Cloud Security: A Guide for Secure Design and Deployment
- You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches (Information Policy)
- Social Engineering: The Science of Human Hacking
- Preventing Ransomware: Understand, prevent, and remediate ransomware attacks
- Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
- Blue Team Field Manual (BTFM)
- Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
- Hacking and Pen Testing: Become an Expert in Computer Hacking and Security
- CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide, 7th Edition and Official ISC2 Practice Tests Kit
- Windows Forensics
- China's Espionage Dynasty: Economic Death by a Thousand Cuts
- CISSP Official (ISC)2 Practice Tests
- Linux Networking Cookbook
- Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
- THE HACKING BIBLE: The Dark secrets of the hacking world: How you can become a Hacking Monster, Undetected and in the best way
- Cracking the Coding Interview, 6th Edition: 189 Programming Questions and Solutions 6th Edition
- Hacking: Basic Security, Penetration Testing and How to Hack
First Previous 1 2 3 Next Last