Identity Attack Vectors: Strategically Designing and Implementing Identity Security
- Length: 303 pages
- Publication Date: 2024-04-18
Bypassing Memory Encryption: A Simpler, Non-Technical General Reading for Knowledge Hackers (Ethical Hacking and Penetration Testing)
- Length: 211 pages
- Publication Date: 2024-03-14
Security-Driven Software Development: Learn to analyze and mitigate risks in your software projects
- Length: 262 pages
- Publication Date: 2024-03-15
Mastering Microsoft Intune, 2nd Edition: Deploy Windows 11, Windows 365 via Microsoft Intune, Copilot and Advance Management via Intune Suite
- Length: 822 pages
- Publication Date: 2024-03-13
The Cybersecurity Guide to Governance, Risk, and Compliance
- Length: 672 pages
- Publication Date: 2024-05-28
Mastering Cybersecurity Risk Management: Strategies for a Resilient Future
- Length: 410 pages
- Publication Date: 2024-01-03
Ethical Hacking and Network Analysis with Wireshark: Exploration of network packets for detecting exploits and malware (English Edition)
- Length: 402 pages
- Publication Date: 2024-01-15
Zero Trust Networks: Building Secure Systems in Untrusted Networks
- Length: 332 pages
- Publication Date: 2024-04-02
Cloud Forensics Demystified: Decoding cloud investigation complexities for digital forensic professionals
- Length: 384 pages
- Publication Date: 2024-02-22
Ethical Hacking: How to Protect Your Network from Cyberattacks
- Length: 112 pages
- Publication Date: 2024-02-20