| Views | Cover | Author | Title | Published | Format | Updated | Thank_to |
2128194 | 49 | ![](./upload/202407/Secure_Continuous_Delivery_on__7_27_2024_6_49_57_AM.jpeg) | Giovanni Galloro | Nathaniel Avery | David Dorbin |
| 2024 | epub | 7/27/2024 6:49:57 AM | eternal |
2128026 | 87 | ![](./upload/202407/Cybersecurity__Ethics__Legal___7_26_2024_5_18_19_AM.jpeg) | Ishaani Priyadarshini |
| 2022 | pdf | 7/26/2024 5:18:19 AM | eternal |
2127775 | 62 | ![](./upload/202407/Bug_Bounty_from_Scratch__A_com_7_25_2024_9_19_56_AM.jpg) | Francisco Javier Santiago Vazquez |
| 2024 | pdf | 7/25/2024 9:19:57 AM | rubybook |
2127538 | 45 | ![](./upload/202407/Secure_and_Smart_Cyber_Physica_7_22_2024_4_45_17_PM.jpg) | Uttam Ghosh |
| 2024 | pdf | 7/22/2024 4:45:52 PM | topron |
2127430 | 68 | ![](./upload/202407/Physical_Security_Assessment_H_7_21_2024_6_53_57_PM.jpg) | Michael Khairallah |
| 2024 | pdf | 7/22/2024 6:33:32 AM | alex21s |
2126850 | 69 | ![](./upload/202407/Cybersecurity_for_Space__Prote_7_18_2024_8_50_46_AM.jpeg) | Jacob G. Oakley |
| 2020 | pdf | 7/18/2024 8:50:56 AM | eternal |
2125816 | 62 | ![](./upload/202407/The_Hack_Is_Back__Techniques_t_7_11_2024_7_10_24_AM.jpg) | Jesse Varsalone, Christopher Haller |
| 2024 | pdf | 7/11/2024 7:10:24 AM | rubybook |
2125502 | 66 | ![](./upload/202407/Network_Security_Empowered_by__7_7_2024_5_10_49_PM.jpg) | Yingying Chen |
| 2024 | pdf | 7/7/2024 5:18:09 PM | alex21s |
2125268 | 53 | ![](./upload/202407/IT_Governance_and_Information__7_5_2024_3_26_22_AM.jpeg) | Yassine Maleh |
| 2021 | pdf | 7/5/2024 3:26:22 AM | eternal |
2125262 | 58 | ![](./upload/202407/Cybersecurity_Risk_Management__7_5_2024_2_55_22_AM.jpeg) | Brumfield, Cynthia Haugli, Brian , Brian Haugli |
| 2021 | pdf | 7/5/2024 2:55:22 AM | eternal |
|