Linux Hacking: A Beginner's Guide to Mastering CyberSecurity and Ethical Hacking with Linux Tools and Techniques
Ultimate Cyberwarfare for Evasive Cyber Tactics: Unravel the Techniques of Cyberwarfare, Hacktivism and Asymmetric Conflicts for Tactical Excellence with Real-world Use Cases and Strategic Insights
Cybersecurity Mastery: Defeat Cyber Threats, Enhance Your Defense, and Overcome Vulnerability with Expert Strategies to Navigate with Confidence.
Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware
Ultimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap
Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs: Proceedings of the 15th International Conference on Global Security, Safety and Sustainability, London, October 2023
Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
SIE Exam 2025/2026 For Dummies (Securities Industry Essentials Exam Prep + Practice Tests & Flashcards Online)