Attacking and Exploiting Modern Web Applications - Discover the mindset techniques and tools to perform modern web attacks and exploitation
Simone Onofri, Donato Onofri
Microsoft 365 Security Compliance and Identity Administration - Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
Peter Rising
Mastering Information Security Compliance Management - A comprehensive handbook on ISO IEC 27001:2022 compliance
Adarsh Nair, Greeshma M. R.
Reconnaissance for Ethical Hackers - Focus on the starting point of data breaches and explore essential steps for successful pentesting
Glen D. Singh
Keycloak - Identity and Access Management for Modern Applications - Harness the power of Keycloak OpenID Connect and OAuth 20 to secure applications
Stian Thorgersen, Pedro Igor Silva
Security Orchestration Automation and Response for Security Analysts - Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture
Benjamin Kovacevic
Building a Next-Gen SOC with IBM QRadar - Accelerate your security operations and detect cyber threats effectively
Ashish M Kothekar
Python for Security and Networking - Leverage Python modules and tools in securing your network and applications
José Manuel Ortega
Digital Forensics with Kali Linux - Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022x 3rd Edition
Shiva V. N. Parasram
Advanced Network Simulations Simplified - Practical guide for wired Wi-Fi (80211n ac ax) and LTE networks using ns-3
Dr Anil Kumar Rangisetti
Azure Security Cookbook - Practical recipes for securing Azure resources and operations
Steve Miles
Windows APT Warfare - Identify and prevent Windows APT attacks effectively
Federico Maggi, Sheng-Hao Ma, Ziv Chang
Executive's Cybersecurity Program Handbook - A comprehensive guide to building and operationalizing a complete cybersecurity program
Jason Brown
The Vulnerability Researcher's Handbook - A comprehensive guide to discovering reporting and publishing security vulnerabilities
Benjamin Strout
Combating Crime on the Dark Web - Learn how to access the dark web safely and not fall victim to cybercrime
Nearchos Nearchou
Cybersecurity Threats Malware Trends and Strategies - Discover risk mitigation strategies for modern threats to your organization
Tim Rains
An Ethical Guide to Cyber Anonymity - Concepts tools and techniques to protect your anonymity from criminals unethical hackers and governments
Kushantha Gunawardana
Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response
Gerard Johansen
Cybersecurity and Privacy Law Handbook - A beginner's guide to dealing with privacy and security while keeping hackers at bay
Walter Rocchi
Network Protocols for Security Professionals - Probe and identify network-based vulnerabilities and safeguard against network protocol breaches
Yoram Orzach, Deepanshu Khanna
Learn Computer Forensics – 2nd edition - Your one-stop guide to searching analyzing acquiring and securing digital evidence
William Oettinger
Hack the Cybersecurity Interview - A complete interview preparation guide for jumpstarting your cybersecurity career
Ken Underhill, Christophe Foulon, Tia Hopkins
Microsoft Defender for Cloud Cookbook - Protect multicloud and hybrid cloud environments manage compliance and strengthen security posture
Sasha Kranjac
Incident Response with Threat Intelligence - Practical insights into developing an incident response capability through intelligence-based threat hunting
Robert Martinez
The Foundations of Threat Hunting - Organize and design effective cyber threat hunts to meet business needs
Chad Maurice, Jeremy Thompson, William Copeland
Mobile App Reverse Engineering - Get started with discovering analyzing and exploring the internals of Android and iOS apps
Abhinav Mishra
iOS Forensics for Investigators - Take mobile forensics to the next level by analyzing extracting and reporting sensitive evidence
Gianluca Tiepolo
Cloud Security Handbook - Find out how to effectively secure cloud environments using AWS Azure and GCP
Eyal Estrin
Malicious URL Detection - Introduction
Dr. N. Jayakanthan
The Cybersecurity Playbook for Modern Enterprises - An end-to-end guide to preventing data breaches and cyber attacks
Jeremy Wittkop