Description :
Tenders for Supply of CYBERSECURITY BOOKS, 59 The Fifth Domain Defending Our Country Our Companies and Ourselves in the Age of Cyber Threats , Ethical Hacking
and network analysis with wireshark , powershell essential
guide , 360 vulnerability assessment with nessuss and
wireshark , practical cyber threat intelligence , hands on
penetration testing for web applications , Ghost in the Wires
, Effective Monitoring and Alerting , Build Your Own
Cybersecurity Lab , Web Technologies HTML JAVASCRIPT
PHP JAVA JSP ASP dot NET XML and Ajax Black Book HTML
Javascript PHP Java Jsp XML and Ajax Black Book , The Art of
Deception Controlling the Human Element of Security , Red
Team Field Manual RTFM , Data and Goliath , The Art of
Invisibility , Blue Team Field Manual BTFM , Purple Team
Field manual , Web Security for Developers , The
Cybersecurity Playbook How Every Leader and Employee
Can Contribute to a Culture of Security , hacking the hacker
learn from the experts who take down hackers , Practical
Vulnerability Management , Gray Hat C Sharp , Zero Trust
and Third Party Risk Reduce the Blast Radius , You CAN
Stop Stupid Stopping Losses from Accidental and Malicious
Actions , Burp Suite Essentials , Social Engineering The
science of human hacking , Cybersecurity Blue Team Toolkit
, Black Hat Python , Black Hat Bash , Cybersecurity for Small
Networks , the Hacker Playbook 3 Practical Guide to
Penetration Testing , Applied Incident Response , Hands On
Hacking Become an Expert at Next Gen Penetration Testing
and Purple Teaming , Intrusion Detection Honeypots ,
Ethical Hacking A Hands on Introduction to Breaking In ,
Penetration Testing A Hands On Introduction to Hacking ,
Practical Binary Analysis , The Ghidra Book , Violent Python
A Cookbook for Hackers Forensic Analysts, Penetration
Tester and Security Engineers , The hardware hacking
handbook , the CISO Evolution Business Knowledge for
Cybersecurity Executives , The Web Application Hackers
Handbook Finding and Exploiting Security Flaws , Microsoft
Defender for Endpoint in Depth , Linux Firewalls Attack
Detection and Response with iptables psad and fwsnort ,
Hacking APIs Breaking Web Application Programming
Interfaces , Evading EDR The Definitive Guide to Defeating
Endpoint Detection Systems , Mastering Windows Security
and Hardening Second Edition , COMPTIA Security Plus
Study Guide , COMPTIA CySA Plus Study Guide Exam CS0
003 3rd Ed , 0Auth 2 in Action , Threat Modeling Designing
for Security , Network Security Bible , Effective Threat
Investigations for SOC Analysts , ISACA Certified in Risk and
Information Systems Control CRISC Exam Guide , Burp Suite
Cookbook Second Edition , Linux Plus Study Guide COMPTIA
, Programming Rust , Practical Threat Detection Engineering
, Developing Cybersecurity Programs and Policies , Cyber
Threat Intelligence