Index of /Library/Ebooks/Security/


../
2600/                                              16-Jul-2024 13:47       -
API Security for White Hat Hackers/                09-Jul-2024 19:03       -
Adversarial Tradecraft in Cybersecurity/           10-Apr-2022 17:53       -
Antivirus Bypass Techniques/                       25-May-2022 12:54       -
Application Security Program Handbook/             13-Mar-2023 17:56       -
Artificial Intelligence and Deep Learning for D..> 13-Jan-2023 18:27       -
Bug Bounty from Scratch/                           09-Jul-2024 19:03       -
CCSP/                                              31-Dec-2022 16:02       -
CISSP/                                             04-Sep-2024 19:16       -
CISSP (ISC)² Certification Practice Exams and ..> 01-Jan-2022 21:23       -
Cloud Penetration Testing for Red Teamers/         23-Jan-2024 20:56       -
Cloud Security Handbook/                           20-Apr-2022 18:30       -
Combating Crime on the Dark Web/                   11-Feb-2023 23:25       -
CompTIA CASP+ CAS-004 Certification Guide/         26-Mar-2022 00:13       -
CompTIA PenTest+ Study Guide Exam PT0-002/         01-Jan-2022 20:56       -
Compliance/                                        04-Mar-2024 13:16       -
Critical Infrastructure Security/                  20-Jun-2024 17:30       -
Cyber Security (1)/                                11-Feb-2022 01:03       -
Cyber Security 2nd Edition by David Sutton ebook/  24-Apr-2023 11:36       -
Cyber Security Issues and Current Trends/          27-Jan-2022 00:16       -
Cybersecurity Career Master Plan/                  01-Jan-2022 21:23       -
Cybersecurity Leadership Demystified/              15-Jan-2022 00:02       -
Cybersecurity Ops with bash/                       01-Feb-2023 00:05       -
Cybersecurity Threats, Malware Trends, and Stra..> 11-Feb-2023 23:25       -
Cybersecurity and Third-Party Risk/                02-Feb-2022 00:49       -
Cybersecurity – Attack and Defense Strategies/   04-Nov-2022 17:49       -
Defensive Security Handbook, 2nd Edition/          04-Oct-2024 14:14       -
Designing Secure Software - Loren Kohnfelder/      01-Jan-2022 18:23       -
Developing a Cybersecurity Immune System for In..> 11-Feb-2022 01:03       -
Digital Forensics and Incident Response 3e/        23-Feb-2024 20:02       -
Hack the Cybersecurity Interview_ A complete in..> 21-Aug-2022 00:13       -
Humble Book Bundle - CyberSecurity by Wiley/       22-Apr-2022 17:39       -
Infosec Strategies and Best Practices/             10-Apr-2022 18:40       -
Intelligence-Driven Incident Response/             04-Oct-2024 14:14       -
Julia Evans Zines/                                 09-Nov-2022 18:28       -
Kevin Daimi & Guillermo Francia Iii/               27-Jan-2022 00:16       -
Keycloak – Identity and Access Management for..> 25-May-2022 12:57       -
Learning Android Forensics/                        24-Jan-2022 20:34       -
Mastering Defensive Security/                      15-Jan-2022 00:02       -
Mastering Kali Linux for Advanced Penetration T..> 26-Mar-2022 00:13       -
Mastering Linux Security and Hardening, 3rd Ed/    21-Mar-2023 03:23       -
Mastering Malware Analysis 2nd Edition/            29-Dec-2022 20:33       -
Mastering Windows Security and Hardening/          27-Aug-2022 18:49       -
Network Security For Beginners_ Strategies, Tac..> 19-Mar-2024 19:49       -
Network Security Private Communications in a Pu..> 27-Aug-2022 18:49       -
O'Reilly_Media-The_Cybersecurity_Manager's_Guid..> 26-Mar-2022 00:13       -
OSINT/                                             02-Feb-2023 16:54       -
Offensive Security/                                18-Nov-2022 01:45       -
Penetration Testing Azure for Ethical Hackers/     01-Jan-2022 21:05       -
Pentesting Active Directory and Windows-Based I..> 05-Nov-2023 23:26       -
Pentesting Industrial Control Systems/             01-Jan-2022 20:56       -
Practical Cyber Security for Extremely Busy People 01-Jan-2022 21:00       -
Practical Cybersecurity Architecture A guide tt..> 26-Nov-2023 16:50       -
Practical Doomsday — Michal Zalewski/            01-Jan-2022 20:59       -
Practical Linux Forensics — Bruce Nikkel/        01-Jan-2022 18:21       -
Practical Memory Forensics/                        29-Mar-2022 00:00       -
Privilege Escalation Techniques/                   01-Jan-2022 21:04       -
Russian Cyber Operations_ Coding the Boundaries..> 24-Jan-2022 20:34       -
SANS FOR518/                                       30-Apr-2022 00:34       -
SANS FOR578 Cyber Threat Intelligence 2022 PDF/    27-May-2022 23:29       -
SSCP/                                              04-Sep-2022 15:08       -
Social Engineering_ The Art of Hum (14708)/        22-Jun-2022 12:41       -
Software Supply Chain Security_  Securing the E..> 16-Jul-2024 13:53       -
Spring Security, 4th Edition/                      09-Jul-2024 19:03       -
TOR Darknet - Lance Henderson/                     26-Mar-2022 00:06       -
TOR Darknet PDF - Lance Henderson/                 26-Mar-2022 00:06       -
Taylor_and_Francis-Countering_Cyber_Sabotage-2020/ 04-Apr-2022 20:23       -
The Cybersecurity Playbook for Modern Enterprises/ 26-Mar-2022 00:13       -
The Hacker Playbook/                               15-Apr-2022 12:57       -
The OSINT Handbook/                                20-Jun-2024 13:58       -
The Ultimate Kali Linux Book/                      26-Mar-2022 00:13       -
Threat Hunting with Elastic Stack/                 10-Apr-2022 18:14       -
Threat.Hunting.In.The.Cloud.Defending.AWS.Azure..> 21-Nov-2022 01:09       -
Understanding Cybersecurity Law and Digital Pri..> 27-Jan-2022 00:16       -
Unilateral Remedies to Cyber Operations/           27-Jan-2022 00:16       -
Wiley-8_Steps_to_Better_Security-2021/             06-Apr-2022 02:39       -
Wiley-Cloud_Native_Security-2021/                  04-Apr-2022 17:24       -
Wiley-Threat_Hunting_in_the_Cloud-2021/            26-Mar-2022 00:06       -
Windows and Linux Penetration Testing from Scratch 04-Sep-2022 14:55       -
cybersecurity-blue-team-strategies/                21-Mar-2023 03:18       -
machine-learning-techniques-cybersecurity/         07-Jun-2023 18:03       -
microsoft-defender-endpoint-depth/                 21-Mar-2023 03:23       -
regulating-cyber-technologies/                     06-May-2023 22:30       -
tactical-wireshark-intrusion-extraction/           24-Apr-2023 11:31       -
windows-ransomware-detection-protection/           24-Apr-2023 11:40       -
0385548095.epub                                    31-Dec-2022 15:33      2M
2017 Alan White-Blue Team Field Manual.azw3        10-Apr-2022 00:15    199K
2017 Alan White-Blue Team Field Manualcazw3.epub   10-Apr-2022 00:15    122K
A Practical Introduction to Enterprise Network ..> 16-Apr-2022 05:47     58M
A Practical Introduction to Security and Risk M..> 09-Jul-2024 19:04      2M
AWS Certified Security Specialty All-in-One Exa..> 05-Apr-2022 15:17     45M
Abhijit Mohanta, Anoop Saldanha - Malware Analy..> 28-Apr-2022 17:56     58M
Advanced Infrastructure Penetration Testing - D..> 05-Apr-2022 23:48     17M
Advanced Security Testing with - Daniel Dieterl..> 18-Apr-2022 19:57     73M
Adversarial Multimedia Forensics by Ehsan Nowro..> 19-Mar-2024 19:49     40M
Adversary Emulation With MITRE ATT&CK.epub         05-Oct-2024 13:53     10M
Agile Security Operations - Engineering for agi..> 05-Apr-2022 15:17      5M
Andrew Hoffman - Web Application Security-O'Rei..> 22-Jul-2024 03:11     13M
Android Malware Detection and Adversarial Metho..> 20-Jun-2024 17:30    662K
Android Malware Detection and Adversarial Metho..> 20-Jun-2024 17:30      6M
Artificial Intelligence For Security (Tuomo Sip..> 09-Jul-2024 19:07     19M
Assessing and Managing Security Risk in IT Syst..> 13-Mar-2023 17:56    630K
Automating Security Detection Engineering.epub     05-Aug-2024 15:29     16M
Becoming the Hacker by Adrian Pruteanu.epub        15-Apr-2022 12:57     28M
Black Hat Rust (2021) - Sylvain Kerkour.pdf        16-Apr-2022 19:16      4M
Black Hat Rust - Sylvain Kerkour.epub              01-Jul-2022 17:15      2M
Black Hat Rust - Sylvain Kerkour.pdf               01-Feb-2023 00:06      4M
Build Your Own Cybersecurity Testing Lab Ric Me..> 20-Apr-2022 13:12     24M
Building a Cyber Risk Management Program by Bri..> 23-Dec-2023 01:35      3M
Building in Security at Agile Speed (2021) - CR..> 11-Jun-2022 18:25     12M
CEH Certified Ethical Hacker All-in-One Exam Gu..> 01-Jan-2022 21:07     10M
CISSP All-in-One Exam Guide, 9th Ed - Fernando ..> 01-Jan-2022 21:07     87M
Charles J. Brooks, Philip A. Craig Jr. - Practi..> 09-Nov-2022 20:51    130M
Cloud Native Security (2021) - Wiley.epub          05-Apr-2022 23:48     10M
Cloud Native Security Cookbook_ Recipes for a S..> 08-May-2022 02:04      4M
Cloud_Security_For_Dummies_-_Ted_Coombs.epub       12-Feb-2022 05:35      7M
CompTIA Security+ All-in-One Exam Guide - Wm. A..> 05-Apr-2022 15:17      8M
CompTIA Security+ Certification Study Guide (Ex..> 05-Apr-2022 15:17     40M
CompTIA Security+ Certification Study Guide (Ex..> 26-Mar-2022 00:13     40M
Computer Security Fundamentals - Chuck Easttom...> 07-Jun-2023 15:52     29M
Confronting Cyber Risk.epub                        13-Mar-2023 17:56    688K
Cyber Deception_ Techniques, Strategies, and Hu..> 24-Apr-2023 11:31      6M
Cyber Forensics Up and Running A hands-on guide..> 21-Jan-2024 22:59     25M
Cyber Security and Business Analysis.epub          20-Jun-2024 13:58      6M
Cyber-Security for Smart Grid Control Vulnerabi..> 20-Jun-2024 17:30      6M
Cybercrime and Information Technology Alex Alex..> 05-Apr-2022 23:48     16M
Cybercrime and Information Technology_ Theory a..> 01-Jan-2022 21:21     71M
Cyberinsurance Policy.epub                         24-Apr-2023 11:43    423K
Cybersecurity (2021) - MIT.epub                    05-Apr-2022 15:17    391K
Cybersecurity (2021) - MIT.pdf                     05-Apr-2022 15:17      1M
Cybersecurity (The MIT Press Es - Duane C. Wils..> 01-Jan-2022 21:27    391K
Cybersecurity A Practical Engineering Approach ..> 28-Aug-2022 20:17     11M
Cybersecurity For Dummies - 2nd Edition (2022) ..> 05-Apr-2022 23:48      6M
Cybersecurity For Dummies 2nd Edition.epub         29-Mar-2022 00:02      6M
Cybersecurity Leadership Demystified - A compre..> 09-Apr-2022 15:35      6M
Cybersecurity Myths and Misconc - Eugene Spaffo..> 22-Jan-2023 22:36     19M
Cybersecurity for Space A Guide to Foundations ..> 22-Jul-2024 03:11      9M
Cybersecurity in Context - Chris Jay Hoofnagle...> 01-Oct-2024 18:50     95M
Dark Wire_ The Incredible True Story of th - Jo..> 11-Jun-2024 12:26     10M
Database and Application Security by R. Sarma D..> 02-Feb-2024 14:33     25M
Digital Forensics, Investigation, and Response,..> 01-Jan-2022 21:44     17M
Effective Python Penetration Te - Rejah Rehim.epub 01-Jan-2022 21:04      2M
Ethical Hacking and Network Analysis by Manish ..> 19-Mar-2024 19:49     26M
FAIK_A Practical Guide to Living in a World of ..> 23-Aug-2024 20:07     14M
Fancy_Bear_Goes_Phishing_-_Scott_J._Shapiro.epub   27-May-2023 05:39      6M
GCIH GIAC Certified Incident Handler All-in-One..> 05-Apr-2022 23:48     45M
GCIH GIAC Certified Incident Handler All-in-One..> 11-Feb-2022 01:04     45M
Game Theory and Machine Learning for Cyber Secu..> 28-Aug-2022 20:14     14M
Glen D. Singh - Ultimate Kali Linux Book, The.epub 06-Oct-2022 17:09     74M
Gray Hat Hacking - The Ethical Hacker's Handboo..> 16-Apr-2022 06:25     76M
Gray Hat Hacking.pdf                               26-Dec-2022 17:07     95M
Gus Khawaja - Kali Linux Penetration Testing Bi..> 06-Oct-2022 17:09     40M
Hacker Playbook 2_ Practical Guide To Penetrati..> 15-Apr-2022 12:57     53M
Hacking APIs - Breaking Web Application Program..> 11-Jun-2022 18:25     11M
Hacking APIs - Breaking Web Application Program..> 11-Jun-2022 18:25     19M
Hacking Exposed_ Industrial Con - Clint Bodunge..> 28-Aug-2022 19:47      7M
Hacking For Dummies, 7th Edition.epub              26-Mar-2022 00:06      9M
Hacking Kubernetes - Threat-Driven Analysis and..> 06-Oct-2022 17:09      9M
Hacking Through Time_ From Tinkerers to Enemies..> 24-Apr-2023 11:34      2M
Hacking Through Time_ From Tinkerers to Enemies..> 24-Apr-2023 11:34      2M
Handbook for CTFers - Nu1L[MAM].pdf                21-Aug-2022 00:18     46M
Handbook of Research on Cybersecurity Risk - Ad..> 07-Jun-2023 15:59     30M
How to Attack and Defend Your W - Dalziel, Max...> 06-Oct-2022 17:41      7M
How to Hack Like a GOD_ Master the Secrets of H..> 31-Dec-2022 15:53      2M
How to Hack Like a Legend by Sparc Flow.pdf        31-Dec-2022 16:14      6M
How to Investigate Like a Rockstar - Sparc FLOW..> 31-Dec-2022 15:53      2M
How to Start Your Own Cybersecurity Consulting ..> 24-Apr-2023 11:34      5M
Incident Response Techniques for Ransomware Att..> 21-Apr-2022 23:59     19M
Incident Response Techniques for Ransomware Att..> 22-Apr-2022 00:08     12M
Incident Response for Windows - Anatoly Tykushi..> 01-Sep-2024 20:43      2M
Intelligent Mobile Malware Detection - Tony Tho..> 31-Dec-2022 15:29      6M
Introduction to Kali Purple Harness the synergy..> 09-Jul-2024 19:07     17M
Jessica Barker, Adrian Davis, Bruce Hallas, Cia..> 25-May-2022 12:27      5M
Jim Seaman - Protective Security (Apress) (2021..> 09-Nov-2022 20:53     61M
Kofler, Michael_ Gebeshuber, Klaus_Kloep, Peter..> 23-Jan-2024 20:59     30M
Launching_Exploits.pdf                             11-Feb-2022 01:04     21M
Malware Development for Ethical Hackers -  Zhas..> 08-Jul-2024 17:54     50M
Mastering Defensive Security - Effective techni..> 09-Apr-2022 15:35     26M
Matt Potter - We Are All Targets.epub              13-Jan-2023 18:24      2M
Matthew K. Sharp, Kyriakos Lambros - The CISO E..> 09-Nov-2022 20:51      7M
Metasploit Revealed Secrets of the Expert Pente..> 01-Oct-2024 18:52     52M
Methods, Implementation, and Ap - Om Prakash, J..> 11-Feb-2023 23:25      6M
Mostafa Yahia - Effective Threat Investigation ..> 26-Feb-2024 14:51     26M
Net Zeros and Ones How Data Erasure Promotes Su..> 08-Dec-2023 05:18      6M
Network Forensics_ Privacy and Security - Anchi..> 01-Jan-2022 21:07      9M
Nik Alleyne - Hack & Detect.azw3                   02-Feb-2022 15:45      2M
OSCP Offensive Security Certified Professional_..> 19-Mar-2024 19:50      2M
Offensive Shellcode from Scratch - Get to grips..> 08-Oct-2023 20:42     15M
PTFM_ Purple Team Field Manual (2020, Independe..> 20-Apr-2022 12:54      3M
Packt - Mastering Cyber Intelligence (2022)[978..> 04-Nov-2022 17:44     18M
Paulino Calderon - Nmap Network Exploration and..> 10-Apr-2022 17:54      5M
Penetration Testing with Kali NetHunter.epub       20-Jun-2024 17:21      8M
Peter H. Gregory, Bobby E. Rogers, Dawn Dunkerl..> 30-Jun-2022 02:59      6M
Phillip L. Wylie & Kim Crawley - Pentester Blue..> 06-Oct-2022 17:09      6M
Practical Data Privacy_ Enhancing Privacy and S..> 05-Oct-2024 13:55      6M
Practical_Threat_Intelligence_by_Valentina_Pala..> 16-Apr-2022 06:14     30M
Python for Cybersecurity - Using Python for Cyb..> 05-Apr-2022 23:48     10M
Python for Cybersecurity_ Using Python for Cybe..> 11-Feb-2022 01:04     10M
RTFM - Red Team Field Manual v2.pdf                13-Mar-2023 17:56      1M
RTFM-Red Team Field Manual.pdf                     10-Apr-2022 00:20     10M
RTFM_ Red Team Field Manual v2 - Ben Clark & Ni..> 21-Aug-2022 00:16    247K
Rajesh Kumar Goutam - Cybersecurity Fundamental..> 26-May-2022 17:23      1M
Ransomware and Data Extortion by Ryan Golden.epub  30-Apr-2024 18:17      4M
Reversing Data Structures and Algorithms in Mal..> 24-Apr-2023 11:39      3M
Reversing Data Structures and Algorithms in Mal..> 24-Apr-2023 11:39      3M
Reynolds M. The Art of Attack. Attacker Mindset..> 01-Jan-2022 21:48      8M
Rishalin Pillay - Offensive Shellcode from Scra..> 20-Apr-2022 18:30     15M
Ross Anderson-3e Security Engineering.epub         05-Apr-2022 15:17     27M
SSH, the Secure Shell_ The Def - Daniel J. Barr..> 30-Jun-2022 02:59      3M
Security Awareness For Dummies.epub                09-Apr-2022 15:35      2M
Security Engineering_ A Guide to Building Depen..> 05-Apr-2022 13:06      8M
Security Patterns in Practice.epub                 01-Jan-2022 18:23      9M
Security Strategies in Windows Platforms 4E by ..> 19-Mar-2024 19:23     23M
Sherri Davidoff, Matt Durrin, Karen Sprenger - ..> 19-Nov-2022 19:20      3M
Software Transparency Chis Hughes.epub             09-Jun-2023 01:05     13M
Software Transparency Chis Hughes.pdf              09-Jun-2023 01:05      5M
Space Rogue How the Hackers Known as L0pht Chan..> 21-Mar-2023 03:23      2M
Sparc FLOW - How to Hack Like a PORNSTAR.epub      13-Jan-2022 00:54      1M
Tanner N.  CASP+ CompTIA Advanced Security...Te..> 01-Jan-2022 21:48      7M
The Art of Mac Malware_ The Guide to Analyzing ..> 26-Mar-2022 00:13     12M
The CISO Evolution - Business Knowledge for Cyb..> 11-Jun-2022 18:25      7M
The Cybersecurity Guide to Governance, Risk by ..> 19-Mar-2024 19:22      5M
The Cybersecurity Manager's Guide - The Art of ..> 09-Apr-2022 15:35      2M
The Cybersecurity Playbook for Modern Enterpris..> 19-Mar-2022 23:15      3M
The Hacker Playbook 2- Practical Guide To Penet..> 15-Apr-2022 12:57     23M
The Hardware Hacking Handbook_ Breaking Embedde..> 01-Jan-2022 20:28     46M
The Hardware Hacking Handbook_ Breaking Embedde..> 01-Jan-2022 20:28     36M
The Hidden Potential of DNS In Security Combati..> 17-Sep-2023 14:47      3M
The Next Era in Hardware Security - Nikhil Rang..> 01-Jan-2022 21:10     40M
The Next Era in Hardware Security - Nikhil Rang..> 01-Jan-2022 21:10     14M
The Smartest Person in the Room - Christian Esp..> 04-Nov-2022 17:53      3M
The.Hacker.Playbook 3.-.Peter.Kim.epub             15-Apr-2022 12:57      5M
Tribe of Hackers Blue Team.epub                    16-Apr-2022 21:57     75M
Tribe of Hackers Red Team - Marcus J Carey.epub    16-Apr-2022 21:57      2M
Tribe of Hackers_ Cybersecurity - Marcus J. Car..> 16-Apr-2022 21:57      5M
Tribe.Of.Hackers.Security.Leaders.2020.epub        16-Apr-2022 21:57      3M
Understand the Cyber Attacker Mindset.epub         19-Mar-2024 19:22      2M
Understanding Cybersecurity Law and Digital Pri..> 09-Apr-2022 15:35      7M
Verifying Cyber-Physical Systems - A Path to Sa..> 09-Apr-2022 15:19     14M
Web Hacking Arsenal_ A Practical Guide to Moder..> 22-Jul-2024 03:24     49M
Windows Forensics Analyst Field Guide by Muhiba..> 19-Mar-2024 19:23     41M
Wireshark Fundamentals (2022).epub                 19-Oct-2022 23:26     16M
XSS Cheat Sheet - 2019 Edition.pdf                 26-Nov-2022 18:24      2M
XSS Cheat Sheet by BruteLogic - 2021 Edition.pdf   26-Nov-2022 18:24    994K
Zero Trust Networks, 2nd Edition by Razi Rais.epub 04-Oct-2024 14:14      9M
[Don Murdoch]Blue Team Handbook.epub               16-Apr-2022 06:14      2M
art_of_memory_forensics_detecting_malware_and_t..> 02-Feb-2022 00:51     10M
bb-ceh.v11.certified.ethical.hack.epub             09-Apr-2022 15:35     56M
blue-team-handbook-condensed-operations.pdf        24-Apr-2023 11:34     38M
breaking-ransomware-explore-ways.epub              07-Jun-2023 15:50     23M
burp-suite-cookbook-web-application-security-ma..> 01-Oct-2024 18:52     66M
cloud-security-handbook-architects-practical.epub  07-Jun-2023 18:00      6M
cybersecurity-strategies-best-practices-techniq..> 20-Jun-2024 17:21      8M
data-exfiltration-threats-prevention.pdf           07-Jun-2023 17:39      7M
endpoint-detection-response-essentials.epub        20-Jun-2024 17:21     11M
executives-cybersecurity-program-handbook.epub     21-Mar-2023 03:23      9M
hands-ethical-hacking-tactics.epub                 20-Jun-2024 17:21     22M
implementing-enterprise-cyber-security-2.pdf       07-Jun-2023 15:59     20M
mobile_security_how_to_secure_privatize_and_rec..> 20-Apr-2022 13:04      4M
tribeofhackers_cybersecurityadvicefromthebestha..> 16-Apr-2022 21:57     28M
ultimate-kali-linux-book-3rd.epub                  20-Jun-2024 17:30    116M
ultimate-kali-linux-book-3rd.pdf                   20-Jun-2024 17:30    163M
warez.pdf                                          31-Jan-2022 01:03      6M
zero-trust-networks-secure-2nd.pdf                 04-Oct-2024 14:14      7M