Supply Of Reference Books , Supply Of Following Course Material Text Books , Practical Malware Analysis The Hands- On Guide To Dissecting Malicious Software , Cybersecurity Attacks — Red Team Strategies: A Practical Guide To Building A Penetration Testing Program Having Homefield Advantage , Hands-On Artificial Intelligence For Cybersecurity: Implement Smart Al Systems For Preventing Cyber-Attacks And Detecting Threats And Network Anomalies , Mastering Windows Security And Hardening: Secure And Protectyour Windows Environment From Intruders, Malware Attacks, And Other Cyber Threats , Artificial Intelligence: A Modern Approach , Machine Learning & Security , Android Internals: Power Users View , Android Internals::Deveiopers View , Hands-On Cryptography With Python , Security Vulnerabilities In Mobile Operating Systems A Complete Guide , Application Security For The Android Platform: Processes, Permissions, And Other Safeguards , Web Application Security: Exploitation And Countermeasures For Modern Web Applications , Container Security: Fundamental Technology Concepts That Protect Containerized Applications , Software Architecture:The Hard Parts , Designingdata-Intensive Applications: The Big Ideas Behind Reliable, Scalable, And Maintainablesystems , Bug Bounty Bootcamp: The Guide To Finding And Reportingweb Vulnerabilities , Black Hat Python, Python Programming For Hackers And Pen Testers , The Hacker Playbook 3: Practical Guide To Penetration Testing , Hacking Apis: Breaking Web Application Programming Interfaces , Social Engineering: The Science Of Human Hacking , The Art Of Cyberwarfare: An Investigators Guide To Espionage, Ransomware, And Organized Cybercrime , Designingsecure Software: A Guide For Developers , Open Source Intelligence Techniques : Resources For Searching And Analysing Online Information , Practical Packet Analysis, , Practical Threat Intelligence And Data-Driven Threat Hunting: A Hands-On Guide To Threat Hunting With The Att&Ck”*Framework And Open Source Tools , Privilege Escalation Techniques:Learn The Art Of Exploiting Windows And Linux Systems , Research Methodology: Methods And Techniques (Multi Colour Edition) , Practical Binaryanalysis: Build Your Own Linux Tools For Binary Instrumentation, Analysis, And Disassembly , Rootkits And Boot Kits: Reversing Modern Malware And Next Generationthreats , Malware Analysis And Detection Engineering: A Comprehensiveapproach To Detect And Analyze Modern Malware , Antivirus Bypass Techniques:Learn Practical Techniques And Tactics To Combat, Bypass, And Evade Antivirus Software , Learning Malware Analysis: Explore The Concepts, Tools, And Techniques To Analyze And Investigatewindows Malware , Malware Data Science , Attacking Network Protocols , Hands-On Cybersecuritywith Block Chain: Implement Ddos Protection, Pki-Based Identity, 2Fa, And Dns Security Using Block Chain , Mastering Block Chain: A Deep Dive Into Distributed Ledgers, Consensusprotocols, Smart Contracts, Dapps, Cryptocurrencies, Ethereum, And More , Bpf Performance Tools , The Book Of Satoshi: The Collected Writings Of Bitcoin Creator Satoshi Nakamoto , Mastering Api Architecture:Design, Operate And Evolve Api-Based Systems (Grayscale Indian Edition) , NAstering Block Chain: Unlocking The Power Of Cryptocurrencies, Smart Contracts, And Decentralizedapplications , Hands-On Smart Contract Development With Hyper Ledger Fabric V2: Building Enterprise Block Chainapplications , Block Chainwith Hyper Ledger Fabric: Build Decentralizedapplicationsusing Hyper Ledger Fabric 2