Justin's Library
  • Advanced Search
    • Guest

Uploading...

Please do not refresh the page.
  • Browse
  • Books
  • Shelves

Discover (Random Books)

Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly

Practical Binary Analysis: Build Your Own Linux Tools for Binary ...

Dennis Andriesse

Learn Computer Forensics

Learn Computer Forensics

William Oettinger

The Secret Life of Programs: Understand Computers — Craft Better Code

The Secret Life of Programs: Understand Computers — Craft Better ...

Jonathan E. Steinhart

The Vulnerability Researcher’s Handbook

The Vulnerability Researcher’s Handbook

Benjamin Strout

Publisher: Packt Publishing Pvt Ltd

Aligning Security Operations with the MITRE ATT&CK Framework

Aligning Security Operations with the MITRE ATT&CK Framework

Rebecca Blair

Automating Security Detection Engineering

Automating Security Detection Engineering

Dennis Chow

ChatGPT for Cybersecurity Cookbook

ChatGPT for Cybersecurity Cookbook

Clint Bodungen

Cybersecurity Attacks – Red Team Strategies

Cybersecurity Attacks – Red Team Strategies

Johann Rehberger

Digital Forensics and
Incident Response

Digital Forensics and Incident Response

Gerard Johansen

Ghidra Software Reverse Engineering for Beginners

Ghidra Software Reverse Engineering for Beginners

A. P. David

Incident Response with Threat Intelligence

Incident Response with Threat Intelligence

Roberto Martínez

Industrial Cybersecurity

Industrial Cybersecurity

Pascal Ackerman

Learn Computer Forensics

Learn Computer Forensics

William Oettinger

Machine Learning Security Principles

Machine Learning Security Principles

John Paul Mueller

Mastering Cloud Security Posture Management (CSPM)

Mastering Cloud Security Posture Management (CSPM)

Qamar Nomani

Mastering Cyber Intelligence

Mastering Cyber Intelligence

Jean Nestor M. Dahj

Mastering Malware Analysis

Mastering Malware Analysis

Amr Thabet Alexey Kleymenov

Mastering Python for Networking and Security

Mastering Python for Networking and Security

José Manuel Ortega

Mastering Windows Security and Hardening

Mastering Windows Security and Hardening

Mark Dunkerley and Matt Tumbarello

Operationalizing Threat Intelligence

Operationalizing Threat Intelligence

Kyle Wilhoit Joseph Opacki

PowerShell Automation and Scripting for Cybersecurity

PowerShell Automation and Scripting for Cybersecurity

Miriam C. Wiesner

Practical Threat Intelligence and Data-Driven Threat Hunting

Practical Threat Intelligence and Data-Driven Threat Hunting

Valentina Palacín

Practical Threat Intelligence and Data-Driven Threat Hunting

Practical Threat Intelligence and Data-Driven Threat Hunting

Valentina Palacín

Threat Hunting with Elastic Stack

Threat Hunting with Elastic Stack

Andrew Pease

The Vulnerability Researcher’s Handbook

The Vulnerability Researcher’s Handbook

Benjamin Strout

Book Details

...