Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams0
Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.0
Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield0
Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield0
Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners SIMON JEFFERSON0
CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks0
Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily Sam Washington0
Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques Allister Banks0
Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities Aditya K. Sood0
Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingeniería Social Quinn Kiser0
Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses Todd G. Shipley, Art Bowker0
Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb3.3
You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown, Ira Winkler, CISSP0
The Art of Deception: Controlling the Human Element of Security William L. Simon, Kevin D. Mitnick, Steve Wozniak4.1
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms Dr. Andrew Blyth0
Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner0
Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR Guven Boyraz0
RHCSA Red Hat Enterprise Linux 9: Comprehensive Mastery for Advanced System Administration and Certification Success Asghar Ghori0
Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking John Anderson, Josh VanDeraa, Christian Adell, Jason Edelman, Glenn Matthews, Ken Celenza, Brad Haas, Bryan Culver, Gary Snider0
Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow0
Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******, Shayne Kawalilak0
Mastering Operating Systems: Comprehensive Guide to Overview, Administration, and Security Virversity Online Courses0
Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses0
The Developer's Playbook for Large Language Model Security: Building Secure AI Applications Steve Wilson5