Index of /Library/Ebooks/Security/
../
2600/ 16-Jul-2024 13:47 -
API Security for White Hat Hackers/ 09-Jul-2024 19:03 -
Adversarial Tradecraft in Cybersecurity/ 10-Apr-2022 17:53 -
Antivirus Bypass Techniques/ 25-May-2022 12:54 -
Application Security Program Handbook/ 13-Mar-2023 17:56 -
Artificial Intelligence and Deep Learning for D..> 13-Jan-2023 18:27 -
Bug Bounty from Scratch/ 09-Jul-2024 19:03 -
CCSP/ 31-Dec-2022 16:02 -
CISSP/ 04-Sep-2024 19:16 -
CISSP (ISC)² Certification Practice Exams and ..> 01-Jan-2022 21:23 -
Cloud Penetration Testing for Red Teamers/ 23-Jan-2024 20:56 -
Cloud Security Handbook/ 20-Apr-2022 18:30 -
Combating Crime on the Dark Web/ 11-Feb-2023 23:25 -
CompTIA CASP+ CAS-004 Certification Guide/ 26-Mar-2022 00:13 -
CompTIA PenTest+ Study Guide Exam PT0-002/ 01-Jan-2022 20:56 -
Compliance/ 04-Mar-2024 13:16 -
Critical Infrastructure Security/ 20-Jun-2024 17:30 -
Cyber Security (1)/ 11-Feb-2022 01:03 -
Cyber Security 2nd Edition by David Sutton ebook/ 24-Apr-2023 11:36 -
Cyber Security Issues and Current Trends/ 27-Jan-2022 00:16 -
Cybersecurity Career Master Plan/ 01-Jan-2022 21:23 -
Cybersecurity Leadership Demystified/ 15-Jan-2022 00:02 -
Cybersecurity Ops with bash/ 01-Feb-2023 00:05 -
Cybersecurity Threats, Malware Trends, and Stra..> 11-Feb-2023 23:25 -
Cybersecurity and Third-Party Risk/ 02-Feb-2022 00:49 -
Cybersecurity – Attack and Defense Strategies/ 04-Nov-2022 17:49 -
Defensive Security Handbook, 2nd Edition/ 04-Oct-2024 14:14 -
Designing Secure Software - Loren Kohnfelder/ 01-Jan-2022 18:23 -
Developing a Cybersecurity Immune System for In..> 11-Feb-2022 01:03 -
Digital Forensics and Incident Response 3e/ 23-Feb-2024 20:02 -
Hack the Cybersecurity Interview_ A complete in..> 21-Aug-2022 00:13 -
Hackers- Crackers- Pirates and Phreaks - Georg..> 20-Oct-2024 00:16 -
Humble Book Bundle - CyberSecurity by Wiley/ 22-Apr-2022 17:39 -
Infosec Strategies and Best Practices/ 10-Apr-2022 18:40 -
Intelligence-Driven Incident Response/ 04-Oct-2024 14:14 -
Julia Evans Zines/ 09-Nov-2022 18:28 -
Kevin Daimi & Guillermo Francia Iii/ 27-Jan-2022 00:16 -
Keycloak – Identity and Access Management for..> 25-May-2022 12:57 -
Learning Android Forensics/ 24-Jan-2022 20:34 -
Mastering Defensive Security/ 15-Jan-2022 00:02 -
Mastering Kali Linux for Advanced Penetration T..> 26-Mar-2022 00:13 -
Mastering Linux Security and Hardening, 3rd Ed/ 21-Mar-2023 03:23 -
Mastering Malware Analysis 2nd Edition/ 29-Dec-2022 20:33 -
Mastering Windows Security and Hardening/ 27-Aug-2022 18:49 -
Network Security For Beginners_ Strategies, Tac..> 19-Mar-2024 19:49 -
Network Security Private Communications in a Pu..> 27-Aug-2022 18:49 -
O'Reilly_Media-The_Cybersecurity_Manager's_Guid..> 26-Mar-2022 00:13 -
OSINT/ 02-Nov-2024 14:12 -
Offensive Security/ 18-Nov-2022 01:45 -
Penetration Testing Azure for Ethical Hackers/ 01-Jan-2022 21:05 -
Pentesting Active Directory and Windows-Based I..> 05-Nov-2023 23:26 -
Pentesting Active Directory and Windows-Based I..> 13-Nov-2024 16:18 -
Pentesting Industrial Control Systems/ 01-Jan-2022 20:56 -
Practical Cyber Security for Extremely Busy People 01-Jan-2022 21:00 -
Practical Cybersecurity Architecture A guide tt..> 26-Nov-2023 16:50 -
Practical Doomsday — Michal Zalewski/ 01-Jan-2022 20:59 -
Practical Linux Forensics — Bruce Nikkel/ 01-Jan-2022 18:21 -
Practical Memory Forensics/ 29-Mar-2022 00:00 -
Privilege Escalation Techniques/ 01-Jan-2022 21:04 -
Russian Cyber Operations_ Coding the Boundaries..> 24-Jan-2022 20:34 -
SANS FOR518/ 30-Apr-2022 00:34 -
SANS FOR578 Cyber Threat Intelligence 2022 PDF/ 27-May-2022 23:29 -
SSCP/ 04-Sep-2022 15:08 -
Social Engineering_ The Art of Hum (14708)/ 22-Jun-2022 12:41 -
Software Supply Chain Security_ Securing the E..> 16-Jul-2024 13:53 -
Spring Security, 4th Edition/ 09-Jul-2024 19:03 -
TOR Darknet - Lance Henderson/ 26-Mar-2022 00:06 -
TOR Darknet PDF - Lance Henderson/ 26-Mar-2022 00:06 -
Taylor_and_Francis-Countering_Cyber_Sabotage-2020/ 04-Apr-2022 20:23 -
The Cybersecurity Playbook for Modern Enterprises/ 26-Mar-2022 00:13 -
The Hacker Playbook/ 15-Apr-2022 12:57 -
The OSINT Handbook/ 20-Jun-2024 13:58 -
The Ultimate Kali Linux Book/ 26-Mar-2022 00:13 -
Threat Hunting with Elastic Stack/ 10-Apr-2022 18:14 -
Threat.Hunting.In.The.Cloud.Defending.AWS.Azure..> 21-Nov-2022 01:09 -
Understanding Cybersecurity Law and Digital Pri..> 27-Jan-2022 00:16 -
Unilateral Remedies to Cyber Operations/ 27-Jan-2022 00:16 -
Wiley-8_Steps_to_Better_Security-2021/ 06-Apr-2022 02:39 -
Wiley-Cloud_Native_Security-2021/ 04-Apr-2022 17:24 -
Wiley-Threat_Hunting_in_the_Cloud-2021/ 26-Mar-2022 00:06 -
Windows and Linux Penetration Testing from Scratch 04-Sep-2022 14:55 -
cybersecurity-blue-team-strategies/ 21-Mar-2023 03:18 -
machine-learning-techniques-cybersecurity/ 07-Jun-2023 18:03 -
microsoft-defender-endpoint-depth/ 21-Mar-2023 03:23 -
regulating-cyber-technologies/ 06-May-2023 22:30 -
tactical-wireshark-intrusion-extraction/ 24-Apr-2023 11:31 -
windows-ransomware-detection-protection/ 24-Apr-2023 11:40 -
0385548095.epub 31-Dec-2022 15:33 2M
2017 Alan White-Blue Team Field Manual.azw3 10-Apr-2022 00:15 199K
2017 Alan White-Blue Team Field Manualcazw3.epub 10-Apr-2022 00:15 122K
A Practical Introduction to Enterprise Network ..> 16-Apr-2022 05:47 58M
A Practical Introduction to Security and Risk M..> 09-Jul-2024 19:04 2M
AWS Certified Security Specialty All-in-One Exa..> 05-Apr-2022 15:17 45M
Abhijit Mohanta, Anoop Saldanha - Malware Analy..> 28-Apr-2022 17:56 58M
Advanced Infrastructure Penetration Testing - D..> 05-Apr-2022 23:48 17M
Advanced Security Testing with - Daniel Dieterl..> 18-Apr-2022 19:57 73M
Adversarial Multimedia Forensics by Ehsan Nowro..> 19-Mar-2024 19:49 40M
Adversary Emulation With MITRE ATT&CK.epub 05-Oct-2024 13:53 10M
Agile Security Operations - Engineering for agi..> 05-Apr-2022 15:17 5M
Andrew Hoffman - Web Application Security-O'Rei..> 22-Jul-2024 03:11 13M
Android Malware Detection and Adversarial Metho..> 20-Jun-2024 17:30 662K
Android Malware Detection and Adversarial Metho..> 20-Jun-2024 17:30 6M
Artificial Intelligence For Security (Tuomo Sip..> 09-Jul-2024 19:07 19M
Assessing and Managing Security Risk in IT Syst..> 13-Mar-2023 17:56 630K
Automating Security Detection Engineering.epub 05-Aug-2024 15:29 16M
Becoming the Hacker by Adrian Pruteanu.epub 15-Apr-2022 12:57 28M
Black Hat Rust (2021) - Sylvain Kerkour.pdf 16-Apr-2022 19:16 4M
Black Hat Rust - Sylvain Kerkour.epub 01-Jul-2022 17:15 2M
Black Hat Rust - Sylvain Kerkour.pdf 01-Feb-2023 00:06 4M
Build Your Own Cybersecurity Testing Lab Ric Me..> 20-Apr-2022 13:12 24M
Building a Cyber Risk Management Program by Bri..> 23-Dec-2023 01:35 3M
Building in Security at Agile Speed (2021) - CR..> 11-Jun-2022 18:25 12M
CEH Certified Ethical Hacker All-in-One Exam Gu..> 01-Jan-2022 21:07 10M
CISSP All-in-One Exam Guide, 9th Ed - Fernando ..> 01-Jan-2022 21:07 87M
Charles J. Brooks, Philip A. Craig Jr. - Practi..> 09-Nov-2022 20:51 130M
Cloud Native Security (2021) - Wiley.epub 05-Apr-2022 23:48 10M
Cloud Native Security Cookbook_ Recipes for a S..> 08-May-2022 02:04 4M
Cloud_Security_For_Dummies_-_Ted_Coombs.epub 12-Feb-2022 05:35 7M
CompTIA Security+ All-in-One Exam Guide - Wm. A..> 05-Apr-2022 15:17 8M
CompTIA Security+ Certification Study Guide (Ex..> 05-Apr-2022 15:17 40M
CompTIA Security+ Certification Study Guide (Ex..> 26-Mar-2022 00:13 40M
Computer Security Fundamentals - Chuck Easttom...> 07-Jun-2023 15:52 29M
Confronting Cyber Risk.epub 13-Mar-2023 17:56 688K
Cyber Deception_ Techniques, Strategies, and Hu..> 24-Apr-2023 11:31 6M
Cyber Forensics Up and Running A hands-on guide..> 21-Jan-2024 22:59 25M
Cyber Security Social Engineering - Hacking Hum..> 13-Nov-2024 16:18 221K
Cyber Security and Business Analysis.epub 20-Jun-2024 13:58 6M
Cyber-Security for Smart Grid Control Vulnerabi..> 20-Jun-2024 17:30 6M
Cybercrime and Information Technology Alex Alex..> 05-Apr-2022 23:48 16M
Cybercrime and Information Technology_ Theory a..> 01-Jan-2022 21:21 71M
Cyberinsurance Policy.epub 24-Apr-2023 11:43 423K
Cybersecurity (2021) - MIT.epub 05-Apr-2022 15:17 391K
Cybersecurity (2021) - MIT.pdf 05-Apr-2022 15:17 1M
Cybersecurity (The MIT Press Es - Duane C. Wils..> 01-Jan-2022 21:27 391K
Cybersecurity A Practical Engineering Approach ..> 28-Aug-2022 20:17 11M
Cybersecurity For Dummies - 2nd Edition (2022) ..> 05-Apr-2022 23:48 6M
Cybersecurity For Dummies 2nd Edition.epub 29-Mar-2022 00:02 6M
Cybersecurity Leadership Demystified - A compre..> 09-Apr-2022 15:35 6M
Cybersecurity Myths and Misconc - Eugene Spaffo..> 22-Jan-2023 22:36 19M
Cybersecurity for Space A Guide to Foundations ..> 22-Jul-2024 03:11 9M
Cybersecurity in Context - Chris Jay Hoofnagle...> 01-Oct-2024 18:50 95M
Dark Wire_ The Incredible True Story of th - Jo..> 11-Jun-2024 12:26 10M
Database and Application Security by R. Sarma D..> 02-Feb-2024 14:33 25M
Digital Forensics, Investigation, and Response,..> 01-Jan-2022 21:44 17M
Effective Python Penetration Te - Rejah Rehim.epub 01-Jan-2022 21:04 2M
Ethical Hacking and Network Analysis by Manish ..> 19-Mar-2024 19:49 26M
FAIK_A Practical Guide to Living in a World of ..> 23-Aug-2024 20:07 14M
Fancy_Bear_Goes_Phishing_-_Scott_J._Shapiro.epub 27-May-2023 05:39 6M
GCIH GIAC Certified Incident Handler All-in-One..> 05-Apr-2022 23:48 45M
GCIH GIAC Certified Incident Handler All-in-One..> 11-Feb-2022 01:04 45M
Game Theory and Machine Learning for Cyber Secu..> 28-Aug-2022 20:14 14M
Glen D. Singh - Ultimate Kali Linux Book, The.epub 06-Oct-2022 17:09 74M
Governing AI Cybersecurity and Risk Management ..> 13-Nov-2024 16:18 3M
Gray Hat Hacking - The Ethical Hacker's Handboo..> 16-Apr-2022 06:25 76M
Gray Hat Hacking.pdf 26-Dec-2022 17:07 95M
Gus Khawaja - Kali Linux Penetration Testing Bi..> 06-Oct-2022 17:09 40M
Hacker Playbook 2_ Practical Guide To Penetrati..> 15-Apr-2022 12:57 53M
Hacking APIs - Breaking Web Application Program..> 11-Jun-2022 18:25 11M
Hacking APIs - Breaking Web Application Program..> 11-Jun-2022 18:25 19M
Hacking Exposed_ Industrial Con - Clint Bodunge..> 28-Aug-2022 19:47 7M
Hacking For Dummies, 7th Edition.epub 26-Mar-2022 00:06 9M
Hacking Kubernetes - Threat-Driven Analysis and..> 06-Oct-2022 17:09 9M
Hacking Through Time_ From Tinkerers to Enemies..> 24-Apr-2023 11:34 2M
Hacking Through Time_ From Tinkerers to Enemies..> 24-Apr-2023 11:34 2M
Handbook for CTFers - Nu1L[MAM].pdf 21-Aug-2022 00:18 46M
Handbook of Research on Cybersecurity Risk - Ad..> 07-Jun-2023 15:59 30M
How to Attack and Defend Your W - Dalziel, Max...> 06-Oct-2022 17:41 7M
How to Hack Like a GOD_ Master the Secrets of H..> 31-Dec-2022 15:53 2M
How to Hack Like a Legend by Sparc Flow.pdf 31-Dec-2022 16:14 6M
How to Investigate Like a Rockstar - Sparc FLOW..> 31-Dec-2022 15:53 2M
How to Start Your Own Cybersecurity Consulting ..> 24-Apr-2023 11:34 5M
Incident Response Techniques for Ransomware Att..> 21-Apr-2022 23:59 19M
Incident Response Techniques for Ransomware Att..> 22-Apr-2022 00:08 12M
Incident Response for Windows - Anatoly Tykushi..> 01-Sep-2024 20:43 2M
Intelligent Mobile Malware Detection - Tony Tho..> 31-Dec-2022 15:29 6M
Introduction to Kali Purple Harness the synergy..> 09-Jul-2024 19:07 17M
Jessica Barker, Adrian Davis, Bruce Hallas, Cia..> 25-May-2022 12:27 5M
Jim Seaman - Protective Security (Apress) (2021..> 09-Nov-2022 20:53 61M
Kofler, Michael_ Gebeshuber, Klaus_Kloep, Peter..> 23-Jan-2024 20:59 30M
Launching_Exploits.pdf 11-Feb-2022 01:04 21M
Malware Development for Ethical Hackers - Zhas..> 08-Jul-2024 17:54 50M
Mastering Defensive Security - Effective techni..> 09-Apr-2022 15:35 26M
Matt Potter - We Are All Targets.epub 13-Jan-2023 18:24 2M
Matthew K. Sharp, Kyriakos Lambros - The CISO E..> 09-Nov-2022 20:51 7M
Metasploit Revealed Secrets of the Expert Pente..> 01-Oct-2024 18:52 52M
Methods, Implementation, and Ap - Om Prakash, J..> 11-Feb-2023 23:25 6M
Mostafa Yahia - Effective Threat Investigation ..> 26-Feb-2024 14:51 26M
Net Zeros and Ones How Data Erasure Promotes Su..> 08-Dec-2023 05:18 6M
Network Forensics_ Privacy and Security - Anchi..> 01-Jan-2022 21:07 9M
Nik Alleyne - Hack & Detect.azw3 02-Feb-2022 15:45 2M
OSCP Offensive Security Certified Professional_..> 19-Mar-2024 19:50 2M
Offensive Shellcode from Scratch - Get to grips..> 08-Oct-2023 20:42 15M
PTFM_ Purple Team Field Manual (2020, Independe..> 20-Apr-2022 12:54 3M
Packt - Mastering Cyber Intelligence (2022)[978..> 04-Nov-2022 17:44 18M
Paulino Calderon - Nmap Network Exploration and..> 10-Apr-2022 17:54 5M
Penetration Testing with Kali NetHunter.epub 20-Jun-2024 17:21 8M
Peter H. Gregory, Bobby E. Rogers, Dawn Dunkerl..> 30-Jun-2022 02:59 6M
Phillip L. Wylie & Kim Crawley - Pentester Blue..> 06-Oct-2022 17:09 6M
Practical Data Privacy_ Enhancing Privacy and S..> 05-Oct-2024 13:55 6M
Practical_Threat_Intelligence_by_Valentina_Pala..> 16-Apr-2022 06:14 30M
Python for Cybersecurity - Using Python for Cyb..> 05-Apr-2022 23:48 10M
Python for Cybersecurity_ Using Python for Cybe..> 11-Feb-2022 01:04 10M
RTFM - Red Team Field Manual v2.pdf 13-Mar-2023 17:56 1M
RTFM-Red Team Field Manual.pdf 10-Apr-2022 00:20 10M
RTFM_ Red Team Field Manual v2 - Ben Clark & Ni..> 21-Aug-2022 00:16 247K
Rajesh Kumar Goutam - Cybersecurity Fundamental..> 26-May-2022 17:23 1M
Ransomware and Data Extortion by Ryan Golden.epub 30-Apr-2024 18:17 4M
Reversing Data Structures and Algorithms in Mal..> 24-Apr-2023 11:39 3M
Reversing Data Structures and Algorithms in Mal..> 24-Apr-2023 11:39 3M
Reynolds M. The Art of Attack. Attacker Mindset..> 01-Jan-2022 21:48 8M
Rishalin Pillay - Offensive Shellcode from Scra..> 20-Apr-2022 18:30 15M
Ross Anderson-3e Security Engineering.epub 05-Apr-2022 15:17 27M
SSH, the Secure Shell_ The Def - Daniel J. Barr..> 30-Jun-2022 02:59 3M
Security Awareness For Dummies.epub 09-Apr-2022 15:35 2M
Security Engineering_ A Guide to Building Depen..> 05-Apr-2022 13:06 8M
Security Patterns in Practice.epub 01-Jan-2022 18:23 9M
Security Strategies in Windows Platforms 4E by ..> 19-Mar-2024 19:23 23M
Sherri Davidoff, Matt Durrin, Karen Sprenger - ..> 19-Nov-2022 19:20 3M
Software Transparency Chis Hughes.epub 09-Jun-2023 01:05 13M
Software Transparency Chis Hughes.pdf 09-Jun-2023 01:05 5M
Space Rogue How the Hackers Known as L0pht Chan..> 21-Mar-2023 03:23 2M
Sparc FLOW - How to Hack Like a PORNSTAR.epub 13-Jan-2022 00:54 1M
Tanner N. CASP+ CompTIA Advanced Security...Te..> 01-Jan-2022 21:48 7M
The Art of Mac Malware_ The Guide to Analyzing ..> 26-Mar-2022 00:13 12M
The CISO Evolution - Business Knowledge for Cyb..> 11-Jun-2022 18:25 7M
The Cybersecurity Guide to Governance, Risk by ..> 19-Mar-2024 19:22 5M
The Cybersecurity Manager's Guide - The Art of ..> 09-Apr-2022 15:35 2M
The Cybersecurity Playbook for Modern Enterpris..> 19-Mar-2022 23:15 3M
The Hacker Playbook 2- Practical Guide To Penet..> 15-Apr-2022 12:57 23M
The Hardware Hacking Handbook_ Breaking Embedde..> 01-Jan-2022 20:28 46M
The Hardware Hacking Handbook_ Breaking Embedde..> 01-Jan-2022 20:28 36M
The Hidden Potential of DNS In Security Combati..> 17-Sep-2023 14:47 3M
The Next Era in Hardware Security - Nikhil Rang..> 01-Jan-2022 21:10 40M
The Next Era in Hardware Security - Nikhil Rang..> 01-Jan-2022 21:10 14M
The Smartest Person in the Room - Christian Esp..> 04-Nov-2022 17:53 3M
The.Hacker.Playbook 3.-.Peter.Kim.epub 15-Apr-2022 12:57 5M
Tribe of Hackers Blue Team.epub 16-Apr-2022 21:57 75M
Tribe of Hackers Red Team - Marcus J Carey.epub 16-Apr-2022 21:57 2M
Tribe of Hackers_ Cybersecurity - Marcus J. Car..> 16-Apr-2022 21:57 5M
Tribe.Of.Hackers.Security.Leaders.2020.epub 16-Apr-2022 21:57 3M
Understand the Cyber Attacker Mindset.epub 19-Mar-2024 19:22 2M
Understanding Cybersecurity Law and Digital Pri..> 09-Apr-2022 15:35 7M
Verifying Cyber-Physical Systems - A Path to Sa..> 09-Apr-2022 15:19 14M
Web Hacking Arsenal_ A Practical Guide to Moder..> 22-Jul-2024 03:24 49M
Windows Forensics Analyst Field Guide by Muhiba..> 19-Mar-2024 19:23 41M
Wireshark Fundamentals (2022).epub 19-Oct-2022 23:26 16M
XSS Cheat Sheet - 2019 Edition.pdf 26-Nov-2022 18:24 2M
XSS Cheat Sheet by BruteLogic - 2021 Edition.pdf 26-Nov-2022 18:24 994K
Zero Trust Networks, 2nd Edition by Razi Rais.epub 04-Oct-2024 14:14 9M
[Don Murdoch]Blue Team Handbook.epub 16-Apr-2022 06:14 2M
art_of_memory_forensics_detecting_malware_and_t..> 02-Feb-2022 00:51 10M
bb-ceh.v11.certified.ethical.hack.epub 09-Apr-2022 15:35 56M
blue-team-handbook-condensed-operations.pdf 24-Apr-2023 11:34 38M
breaking-ransomware-explore-ways.epub 07-Jun-2023 15:50 23M
burp-suite-cookbook-web-application-security-ma..> 01-Oct-2024 18:52 66M
cloud-security-handbook-architects-practical.epub 07-Jun-2023 18:00 6M
cybersecurity-strategies-best-practices-techniq..> 20-Jun-2024 17:21 8M
data-exfiltration-threats-prevention.pdf 07-Jun-2023 17:39 7M
endpoint-detection-response-essentials.epub 20-Jun-2024 17:21 11M
executives-cybersecurity-program-handbook.epub 21-Mar-2023 03:23 9M
hands-ethical-hacking-tactics.epub 20-Jun-2024 17:21 22M
implementing-enterprise-cyber-security-2.pdf 07-Jun-2023 15:59 20M
mobile_security_how_to_secure_privatize_and_rec..> 20-Apr-2022 13:04 4M
tribeofhackers_cybersecurityadvicefromthebestha..> 16-Apr-2022 21:57 28M
ultimate-kali-linux-book-3rd.epub 20-Jun-2024 17:30 116M
ultimate-kali-linux-book-3rd.pdf 20-Jun-2024 17:30 163M
warez.pdf 31-Jan-2022 01:03 6M
zero-trust-networks-secure-2nd.pdf 04-Oct-2024 14:14 7M