Machine Readable Me - The Hidden Ways Tech Shapes our Identities
Zara Rahman
The Hacker Crackdown - Law and Disorder on the Electronic Frontier
Bruce Sterling
Managing Cybersecurity Risk - Book 3
Jonathan Reuvid
Ultimate Cardano Smart Contracts - Unlock the Full Potential of the Cardano Blockchain by Developing Real-World Web 30 Projects Using Plutus Smart Contracts and App Development
Lawrence Arthur Ley
Digital Innovation Adoption: Architectural Recommendations and Security Solutions
Muhammad Ehsan Rana, Manoj Jayabalan
Cybersecurity - Protecting The Digital Frontier
Kevin Lore
Computer Skills - Understanding Computer Science and Cyber Security (2 in 1)
Jonathan Rigdon
Cyber Security - Beginners’ Guide to Hacking Phishing Social Engineering and Malware
Jonathan Rigdon
Digital Innovation Adoption: Architectural Recommendations and Security Solutions
Muhammad Ehsan Rana, Manoj Jayabalan
Cryptography - The Art of Secret Keeping in the Digital Age
John Smith
Bitcoin Development Philosophy
Kalle Rosenbaum, Linnéa Rosembaum
Ultimate Monorepo and Bazel for Building Apps at Scale - Level Up Your Large-Scale Application Development with Monorepo and Bazel for Enhanced Productivity Scalability and Integration
Javier Antoniucci
Hands-On Ethical Hacking Tactics - Strategies tools and techniques for effective cyber defense
Shane Hartman
Implementing Palo Alto Networks Prisma® Access - Learn real-world network protection
Tom Piens Aka 'Reaper'
Ultimate Pentesting for Web Applications - Unlock Advanced Web App Security Through Penetration Testing Using Burp Suite Zap Proxy Fiddler Charles Proxy and Python for Robust Defense
Dr. Rohit Gautam, Dr. Shifa Cyclewala
Basic Setup of FortiGate Firewall
Dr. Hidaia Mahmood Alassouli
Network Engineer's Bible - Mastering 100 Protocols For Communication Management And Security
Rob Botwright
Rust for Blockchain Application Development - Learn to build decentralized applications on popular blockchain technologies using Rust
Akhil Sharma
Mastering AWS Security - Strengthen your cloud environment using AWS security features coupled with proven strategies
Laurent Mathieu
Developing Blockchain Solutions in the Cloud - Design and develop blockchain-powered Web3 apps on AWS Azure and GCP
Stefano Tempesta, Michael John Peña
Dero Rising - The Crypto-Rebel's Guide to Financial Freedom
Craig McKay
Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap
Travis Deforge
ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills
Clint Bodungen
The OSINT Handbook - A practical guide to gathering and analyzing online information
Dale Meredith
Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture
Sasha Kranjac, Omar Kudović
Building Full Stack DeFi Applications - A practical guide to creating your own decentralized finance projects on blockchain
Samuel Zhou
Cybersecurity in the Age of Espionage - Protecting Your Digital Life
B. Vincent
Adventures in Crypto - The Dogecoin Diaries
Penelope I.
Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects
Aspen Olmsted
Akash Network - Decentralized Cloud Computing Redefined
Penelope I.