[IMG] Author: Reuth Mirsky, Sarah Keren, Christopher Geib Full Title: Introduction To Symbolic Plan And Goal Recognition Publisher: Morgan &...
[IMG] Author: Ru Campbell, Viktor Hedberg Full Title: Mastering Microsoft 365 Defender: Implement Microsoft Defender for Endpoint, Identity,...
[IMG] Author: Donald A. Tevault Full Title: Mastering Linux Security And Hardening: A practical guide to protecting your Linux system from cyber...
[IMG] Author: Mark Dunkerley , Matt Tumbarello Full Title: Mastering Windows Security And Hardening, 2nd Edition Publisher: Packt Publishing; 2nd...
[IMG] Author: Christiaan Brinkhoff , Sandeep Patnaik , Morten Pedholt Full Title: Mastering Windows 365: The ultimate guide to designing,...
[IMG] Author: Nicholas Oles Full Title: How To Catch A Phish: A Practical Guide To Detecting Phishing Emails Publisher: Apress; 1st ed. edition...
[IMG] Author: Ryan Leirvik Full Title: Understand, Manage, And Measure Cyber Risk: Practical Solutions For Creating A Sustainable Cyber Program,...
[IMG] Author: Steve Miles Full Title: Azure Security Cookbook: Practical Recipes For Securing Azure Resources And Operations Publisher: Packt...
[IMG] Author: Paul A. Watters Full Title: Counterintelligence In A Cyber World Publisher: Springer; 1st ed. 2023 edition (June 27, 2023) Year:...
[IMG] Author: Parag Verma, Ankur Dumka, Anuj Bhardwaj, Navneet Kaur, Alaknanda Ashok, Anil Kumar Bisht, Raksh Pal Singh Gangwar Full Title:...
[IMG] Author: Vinit Jain Full Title: Wireshark Fundamentals: A Network Engineer's Handbook To Analyzing Network Traffic Publisher: Apress; 1st...
[IMG] Author: Brij B. Gupta, Mamta Full Title: Secure Searchable Encryption And Data Management Publisher: CRC Press; 1st edition (March 16,...
[IMG] Author: Allen Harper (Author), Ryan Linn (Author), Stephen Sims (Author), Michael Baucom (Author), Huascar Tejeda (Author), Daniel...
[IMG] Author: Erdal Ozkaya, Rafiqul Islam Full Title: Inside The Dark Web Publisher: CRC Press; 1st edition (June 19, 2019) Year: 2019 ISBN-13:...
[IMG] Author: Lisa Bock Full Title: Modern Cryptography For Cybersecurity Professionals: Learn how you can leverage encryption to better secure...
[IMG] Author: Richa Gupta Full Title: Hands-On Penetration Testing For Web Applications Publisher: BPB Publications (March 27, 2021) Year: 2021...
[IMG] Author: Jeffrey J. P. Tsai (Editor), Philip S. Yu (Editor) Full Title: Machine Learning In Cyber Trust: Security, Privacy, And Reliability...
[IMG] Author: James Seaman Full Title: Protective Security: Creating Military-Grade Defenses For Your Digital Business Publisher: Apress; 1st ed....
[IMG] Author: Abhijit Mohanta, Anoop Saldanha Full Title: Malware Analysis And Detection Engineering: A Comprehensive Approach To Detect And...
[IMG] Author: Sirisha Potluri (Editor), Katta Subba Rao (Editor), Sachi Nandan Mohanty (Editor) Full Title: Cloud Security: Techniques And...
[IMG] Author: Wale Soyinka Full Title: Linux Administration: A Beginner's Guide, 8th Edition Publisher: McGraw-Hill Education; 8th edition (April...
[IMG] Author: Crystal Panek Full Title: Networking Fundamentals Publisher: Wiley, Sybex; 1st edition (November 12, 2019) Year: 2020 ISBN-13:...
[IMG] Author: Preston Miller, Chapin Bryce Full Title: Learning Python For Forensics: Leverage The Power Of Python In Forensic Investigations,...
[IMG] Author: José Manuel Ortega Full Title: Mastering Python For Networking And Security: Leverage The Scripts And Libraries Of Python Version...
[IMG] Author: Nipun Jaswal Full Title: Hands-On Network Forensics: Investigate Network Attacks And Find Evidence Using Common Network Forensic...
[IMG] Author: Mustafa Toroman Full Title: Azure Networking Cookbook: Practical Recipes To Manage Network Traffic In Azure, Optimize Performance,...
[IMG] Author: Timothy Rooney, Michael Dooley Full Title: IP Address Management, 2nd Edition Publisher: Wiley-IEEE Press; 2nd edition (January 13,...
[IMG] Author: Aditya Mukherjee Full Title: Network Security Strategies: Protect Your Network And Enterprise Against Advanced Cybersecurity...
[IMG] Author: Ahmed Sheikh Full Title: CompTIA Security+ Certification Study Guide: Network Security Essentials Publisher: Apress; 1st ed....
[IMG] Author: Mohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales Full Title: Digital Watermarking: Techniques And Trends...
Separate names with a comma.