Computer Science
Hunting Cyber Criminals: A Hacker’s Guide to Online Intelligence Gathering Tools and Techniques
Computer Science
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk
Computer Science
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
Computer Science
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
Computer Science
The CISO Evolution: Business Knowledge for Cybersecurity Executives
Computer Science
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Computer Science
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today’s Crypto