Decentralized Identity Explained: Embrace decentralization for a more secure and empowering digital experience
- Length: 392 pages
- Publication Date: 2024-07-19
Secure Edge Computing for IoT: Master Security Protocols, Device Management, Data Encryption, and Privacy Strategies to Innovate Solutions for Edge Computing in IoT
- Length: 354 pages
- Publication Date: 2024-07-05
Real-World Edge Computing: Scale, secure, and succeed in the realm of edge computing with Open Horizon
- Length: 296 pages
- Publication Date: 2024-06-28
Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
- Length: 252 pages
- Publication Date: 2024-06-28
Introduction to Kali Purple: Harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux
- Length: 376 pages
- Publication Date: 2024-06-28
The Aspiring CIO and CISO: A career guide to developing leadership skills, knowledge, experience, and behavior
- Length: 256 pages
- Publication Date: 2024-06-28
Mastering Cybersecurity: Strategies, Technologies, and Best Practices
- Length: 801 pages
- Publication Date: 2024-07-15
Evasive Malware: Understanding Deceptive and Self-Defending Threats
- Length: 500 pages
- Publication Date: 2024-09-10
Defensive Security Handbook, 2nd Edition: Best Practices for Securing Infrastructure
- Length: 362 pages
- Publication Date: 2024-07-30
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation
- Length: 418 pages
- Publication Date: 2024-06-28
Ultimate Microsoft Cybersecurity Architect SC-100 Exam Guide: Master the SC-100 Exam with Practical Examples and Case Studies to Secure the Digital … Cybersecurity Expertise
- Length: 347 pages
- Publication Date: 2024-05-24