|
| 1 | Meta sploit The Penetration Testers Guide Second Edition | Meta sploit The Penetration Testers Guide Second Edition |
| 2 | Applied Cryptography Protocols, Algorithms and Source Code in C, Second Edition | Applied Cryptography Protocols, Algorithms and Source Code in C, Second Edition |
| 3 | Tribe of Hackers Blue Team Tribal Knowledge from the Best in Defensive Cybersecurity | Tribe of Hackers Blue Team Tribal Knowledge from the Best in Defensive Cybersecurity |
| 4 | Countdown to Zero Day | Countdown to Zero Day |
| 5 | Future Crimes | Future Crimes |
| 6 | The Art of Deception | The Art of Deception |
| 7 | The Art of Invisibility | The Art of Invisibility |
| 8 | Social Engineering The Art of Human Hacking | Social Engineering The Art of Human Hacking |
| 9 | Practical Malware Analysis | Practical Malware Analysis |
| 10 | Industrial Control System and Operational Technology Security | Industrial Control System and Operational Technology Security |
| 11 | Gray Hat Hacking | Gray Hat Hacking |
| 12 | Hacking Exposed Wireless | Hacking Exposed Wireless |
| 13 | Wireshark Network Analysis | Wireshark Network Analysis |
| 14 | Malware Analysts Cookbook | Malware Analysts Cookbook |
| 15 | Hands on Large Language Models Language Understanding and Generation | Hands on Large Language Models Language Understanding and Generation |
| 16 | Cyber Risk Management Lessons Challenges And Solutions | Cyber Risk Management Lessons Challenges And Solutions |
| 17 | Advanced Malware Analysis and Intelligence Investigating malicious code with static and dynamic analysis and threat intelligence | Advanced Malware Analysis and Intelligence Investigating malicious code with static and dynamic analysis and threat intelligence |
| 18 | Hacking Tricks, Methods and Offensive Strategies Digital reconnaissance, network enumeration and system exploitation strategies | Hacking Tricks, Methods and Offensive Strategies Digital reconnaissance, network enumeration and system exploitation strategies |
| 19 | Zero Trust Networks Building Secure Systems in Untrusted Networks, Second Edition | Zero Trust Networks Building Secure Systems in Untrusted Networks, Second Edition |
| 20 | Ukraine, Gaza, Taiwan A world at war | Ukraine, Gaza, Taiwan A world at war |
| 21 | The Russia Ukraine war | The Russia Ukraine war |
| 22 | India battlefields from Kurukshetra to Balakot incl OP Sindoor | India battlefields from Kurukshetra to Balakot incl OP Sindoor |
| 23 | Hands On Red Team Tactics A Practical Guide to Mastering Red Team Operations | Hands On Red Team Tactics A Practical Guide to Mastering Red Team Operations |
| 24 | Hands On Generative Adversarial Networks with PyTorch | Hands On Generative Adversarial Networks with PyTorch |
| 25 | Large Language Models in Cybersecurity Threats, Exposure and Mitigation 2024 | Large Language Models in Cybersecurity Threats, Exposure and Mitigation 2024 |
| 26 | Hands On Machine Learning for Cybersecurity 2018 | Hands On Machine Learning for Cybersecurity 2018 |
| 27 | Adversarial AI Attacks, Mitigations, and Defense Strategies 2024 | Adversarial AI Attacks, Mitigations, and Defense Strategies 2024 |
| 28 | Building Agentic AI Systems 2024 | Building Agentic AI Systems 2024 |
| 29 | Machine Learning and Security | Machine Learning and Security |
| 30 | Malware development for Ethical hackers | Malware development for Ethical hackers |
| 31 | The Shellcoders Handbook | The Shellcoders Handbook |
| 32 | Ready, Relevant and Resurgent A Blue print for transformation of Indias Military | Ready, Relevant and Resurgent A Blue print for transformation of Indias Military |
| 33 | Adversarial Machine Learning | Adversarial Machine Learning |
| 34 | GANs in Action Deep learning with Generative Adversarial Networks 2019 | GANs in Action Deep learning with Generative Adversarial Networks 2019 |
| 35 | Hands On Go Programming | Hands On Go Programming |
| 36 | Nexus Yuval Noah Harari | Nexus Yuval Noah Harari |
| 37 | e-Books | e-Books |
| 38 | Online Source of Info Cyber Security Concepts | Online Source of Info Cyber Security Research |
| 39 | Online Source of Info Cyber Security Research | Online Source of Info Adv Cyber Tech Methodologies |
| 40 | Online Source of Info Adv Cyber Tech Methodologies | Open Source for You |
| 41 | Open Source for You | Open Source for You |
| 42 | PC Quest | PC Quest |
| 43 | Data Quest | Data Quest |
| 44 | Voice and Data | Voice and Data |
| 45 | Journal on Digital Forensics and Cyber Security | Journal on Digital Forensics and Cyber Security |
| 46 | Digit | Digit |
| 47 | National Journal of Cyber Security Law | National Journal of Cyber Security Law |
| 48 | Electronics for you | Electronics for you |
| 49 | Magzter e-Subscription | Magzter e-Subscription |
| 50 | Journal of Artificial Intelligence Research and Advance | Journal of Artificial Intelligence Research and Advance |
| 51 | Journal of Cyber Security | Journal of Cyber Security |
| 52 | International Journal of Information Security Engineering | International Journal of Information Security Engineering |
| 53 | International Journal of Wireless Security and Networks | International Journal of Wireless Security and Networks |