Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
2nd Edition
Applied Cryptography: Protocols, Algorithms and Source Code in C
twentieth Anniversary Edition
Threat Modeling: Designing for Security
Cybersecurity Blue Team Toolkit
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
Tribe of Hackers Blue Team: Tribal Knowledge from the Best in Defensive Cybersecurity
Kali Linux Penetration Testing Bible
Cybersecurity and Third-Party Risk: Third Party Threat Hunting
Hacking Multifactor Authentication
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Cryptography Engineering: Design Principles and Practical Applications
Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Digital DVD Included
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today’s Crypto
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Secrets and Lies: Digital Security in a Networked World
fifteenth Anniversary Edition
The Art of Attack: Attacker Mindset for Security Professionals
Social Engineering: The Science of Human Hacking
2nd Edition
The Art of Deception: Controlling the Human Element of Security
Tribe of Hackers: Cybersecurity Advice from the Best Hackers within the World
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Previous Item
https://www.humblebundle.com/book…bookbundle