Items
Go to All Bundles
Item name
Item Type
Applied Cryptography: Protocols, Algorithms and Source Code in C
game
The Art of Attack: Attacker Mindset for Security Professionals
ebook
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
ebook
The Art of Memory Forensics
ebook
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto
ebook
Cryptography Engineering
game
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
ebook
Cybersecurity Blue Team Toolkit
ebook
Hacking Multifactor Authentication
ebook
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
ebook
Kali Linux Penetration Testing Bible
ebook
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
ebook
Malware Analyst's Cookbook and DVD
game
The Pentester BluePrint: Starting a Career as an Ethical Hacker
ebook
Practical Reverse Engineering
game
Secrets and Lies: Digital Security in a Networked World
ebook
Social Engineering: The Science of Human Hacking, 2nd Edition
ebook
The Art of Deception: Controlling the Human Element of Security
ebook
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
game
Threat Modeling: Designing for Security
game
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
ebook
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
ebook
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
ebook
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
ebook
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
ebook
Unauthorised Access: Physical Penetration Testing For IT Security Teams
ebook
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
ebook