Libri consigliati The Web Application Hackers Handbook Bug Bounty Playbook Web Application Security For Dummies Web Security for Developers Malware Reverse Engineering Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems The Art of Mac Malware Leaning Malware Analysis Pentesting Azure Applications The Car Hacker's Handbook: A Guide for the Penetration Tester Forensic Team Field Manual (FTFM) Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides Web Security Web Hacking 101 OReilly - Web Application Security NGINX Web Scraping with Python Security for Web Developers The IDA Pro Windows Internal 7 - Part 1 Malware Analyst’s Cookbook Mastering Reverse Engineering Mastering Modern Web Penetration Testing Python Web Penetration Testing Cookbook Real-World Bug Hunting Web Hacking Arsenal: A Practical Guide to Modern Web Pentesting Kali Linux Web Penetration Testing Cookbook Hacking Web Apps Reverse Engineering / Malware Analysis Mastering Reverse Engineering Rootkits and Bootkits Mastering Malware Analysis Practical Malware Analysis Designing BSD Rootkits Malware Analysis Using Artificial Intelligence and Deep Learning Reversing: secrets of reverse engineering Evasive Malware: Understanding Deceptive and Self-Defending Threats Windows Internal 7 - Part 2 Mastering Malware Analysis Malware Data Science Antivirus Bypass Techniques Assembly Language for x86 Processors Practical Reverse Engineering Rootkits for Dummies Windows Security Internals Malware Analysis and Detection Engineering The Android Malware Handbook Defense Evasion Techniques Gray Hat Python Penetration Testing / Red Teaming Ethical Hacking Metasploit for Beginners The Hacker Playbook Penetration Testing for Dummies Machine Learning for Penetration Testing The OSINT Handbook Social Engineering: The art of human Hacking iOS Penetration Testing Metasploit Hands-on Red Team Tactics Penetration Testing Azure for Ethical Hackers Kali Linux 2: Windows Penetration Testing The Hardware Hacking Handbook Advanced Persistent Threat Hacking The Hacker Playbook 3 Red Team Field Manual Professional Penetration Testing Mastering Kali Linux for Advanced Penetration Testing Hacking: the art of exploitation Practical Social Engineering: A Primer for the Ethical Hacker Red Team: Development and operations Learning Kali Linux Penetration Testing Social Engineering Penetration Testing Industrial Cybersecurity Attacking Network Protocols Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things Forensics / Incident Response Teaming The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and MAC Memory Intelligence-Driven Incident Response: Outwitting the Adversary Digital forensics Learn Computer Forensics: Your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, 2nd Edition Cybercrime and Digital Forensics: An Introduction Intelligence-Driven Incident Response: Outwitting the Adversary Practical Mobile Forensics - Fourth Edition Forensics For Dummies, 2nd Edition Windows Forensics: Understand Analysis Techniques for Your Windows Incident Response & Computer Forensics, Third Edition Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response, 3rd Edition Crittografia Manuale di crittografia: Teoria, algoritmi e protocolli Serious Cryptography, 2nd Edition: A Practical Introduction to Modern Encryption Cryptography Engineering: Design Principles and Practical Applications Codes and Ciphers - A History of Cryptography Incident Response Techniques for Ransomware Attacks: Understand modern ransomware attacks and build an incident response strategy to work through them Digital Forensics and Incident Response: Incident Response tools and techniques for effective cyber threat response Crittografia The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption Understanding Cryptography: A Textbook for Students and Practitioners The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography Digital Forensics and Incident Response: Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents Elementi di crittografia Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-quantum Algorithms Cryptography: A Very Short Introduction Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting OS X Incident Response: Scripting and Analysis Il manuale della crittografia. Applicazioni pratiche dei protocolli crittografici Serious Cryptography: A Practical Introduction to Modern Encryption Introduction to Modern Cryptography: Third Edition Linguaggi di programmazione / networking / CTI / governance