Items

Go to All Bundles

Item nameItem Type
Applied Cryptography: Protocols, Algorithms and Source Code in Cgame
The Art of Attack: Attacker Mindset for Security Professionalsebook
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceiversebook
The Art of Memory Forensicsebook
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Cryptoebook
Cryptography Engineeringgame
Cybersecurity and Third-Party Risk: Third Party Threat Huntingebook
Cybersecurity Blue Team Toolkitebook
Hacking Multifactor Authenticationebook
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidenceebook
Kali Linux Penetration Testing Bibleebook
Liars and Outliers: Enabling the Trust that Society Needs to Thriveebook
Malware Analyst's Cookbook and DVDgame
The Pentester BluePrint: Starting a Career as an Ethical Hackerebook
Practical Reverse Engineeringgame
Secrets and Lies: Digital Security in a Networked Worldebook
Social Engineering: The Science of Human Hacking, 2nd Editionebook
The Art of Deception: Controlling the Human Element of Securityebook
The Web Application Hacker's Handbook: Finding and Exploiting Security Flawsgame
Threat Modeling: Designing for Securitygame
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviorsebook
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the Worldebook
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurityebook
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurityebook
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadershipebook
Unauthorised Access: Physical Penetration Testing For IT Security Teamsebook
Wireshark for Security Professionals: Using Wireshark and the Metasploit Frameworkebook