Identity Attack Vectors
Morey J. Haber & Darran Rolls
Waging Cyber War
Jacob G. Oakley
Practical Cryptography in Python
Seth James Nielson & Christopher K. Monson
Solving Identity Management in Modern Applications
Yvonne Wilson & Abhishek Hingnikar
Open Source Intelligence Methods and Tools
Nihad A. Hassan & Rami Hijazi
Cybersecurity Incident Response
Eric C. Thompson
PCI DSS
Jim Seaman
Privileged Attack Vectors
Morey J. Haber & Brad Hibbert
Firewalls Don't Stop Dragons
Carey Parker
Personal Cybersecurity
Marvin Waschke
Practical Cyber Forensics
Niranjan Reddy
Pro Azure Governance and Security
Samuel Erskine & Peter De Tender & David Rendon
Enterprise Cybersecurity Study Guide
Scott E. Donaldson & Stanley G. Siegel & Chris K. Williams & Abdul Aslam
Cyber Security on Azure
Marshall Copeland
Cybersecurity for Space
Beginning Security with Microsoft Technologies
Vasantha Lakshmi
Applied Cryptography in .NET and Azure Key Vault
Stephen Haunts
Advanced API Security
Prabath Siriwardena
Professional Red Teaming
Securing Office 365
Matthew Katzer