Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners SIMON JEFFERSON
CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
Guardians of the Digital Realm: Securing the Cyber Frontier: Strategies and Innovations in Protecting the Virtual World Ava Johnson
CompTIA Secrets: Unlock Your Security Success Today: "Achieve CompTIA success! Access captivating audio lessons crafted for peak exam results today!" Harris Penrose
Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily Sam Washington
Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques Allister Banks
Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities Aditya K. Sood
Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses Todd G. Shipley
Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb3.3
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms Dr. Andrew Blyth
Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner
Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR Guven Boyraz
RHCSA Red Hat Enterprise Linux 9: Comprehensive Mastery for Advanced System Administration and Certification Success Asghar Ghori
Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking John Anderson
Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow
Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******
Mastering Operating Systems: Comprehensive Guide to Overview, Administration, and Security Virversity Online Courses
Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
Network Security For Beginners: Strategies, Tactics, and Ethical Boundaries for Mastering Social Engineering Daniel Green
Networking and Cybersecurity For Beginners: Strategies, Tools, and Tips for the Digital Age Daniel Green
Networking Fundamentals for Beginners: Comprehensive Guide to Understanding the World of Networks Daniel Green