Main centres: | 1-3 business days |
Regional areas: | 3-4 business days |
Remote areas: | 3-5 business days |
· Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition
· CEH v9: Certified Ethical Hacker Version 9 Study Guide
· Cryptography Engineering: Design Principles and Practical Applications
· Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
· Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
· Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition
· Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition
· Social Engineering: The Art of Human Hacking
· The Art of Deception: Controlling the Human Element of Security
· The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
· The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition
· The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition
· Threat Modelling: Designing for Security
· Unauthorised Access: Physical Penetration Testing for IT Security Teams
Will be sold as a bundle, if you’re interested in specific books, please contact me for prices.
The link for the Ebooks will be emailed within 48 hours of receiving payment.