The Definitive Guide to KQL : Using Kusto Query Language for operations, defending, and threat hunting
Mark Morowczynski
Download Now
Format: eBook (PDF)
Cybercrime : Die Bedrohung durch Phishing, Hackerangriffe und Datenlecks
Frankfurter Allgemeine Archiv + Rights Management
Download Now
Format: eBook (PDF)
Understanding Victimology : An Active-Learning Approach
Shelly Clevenger
Download Now
Format: eBook (PDF)
Understanding Victimology : An Active-Learning Approach
Shelly Clevenger
Download Now
Format: eBook (EPUB)
Mastering AWS Security : Strengthen your cloud environment using AWS security features coupled with proven strategies
Laurent Mathieu
Download Now
Format: eBook (EPUB)
Implementing Palo Alto Networks Prisma® Access : Learn real-world network protection
Tom Piens Aka 'Reaper'
Download Now
Format: eBook (EPUB)
A CISO Guide to Cyber Resilience : A how-to guide for every CISO to build a resilient security program
Debra Baker
Download Now
Format: eBook (EPUB)
Critical Infrastructure Security : Cybersecurity lessons learned from real-world breaches
Soledad Antelada Toledano
Download Now
Format: eBook (EPUB)
The Zero Trust Framework and Privileged Access Management (PAM)
Ravindra Das
Download Now
Format: eBook (PDF)
The Zero Trust Framework and Privileged Access Management (PAM)
Ravindra Das
Download Now
Format: eBook (EPUB)