Security Ebooks
Trending ebooks
The most talked-about and well-loved Security titles this month.
Hardware Hacking: Have Fun while Voiding your Warranty Rating: 4 out of 5 stars4/5Ruby Developers Guide Rating: 3 out of 5 stars3/5Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction Rating: 5 out of 5 stars5/5Building Robots With Lego Mindstorms Rating: 3 out of 5 stars3/5Reverse Engineering Code with IDA Pro Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 4 out of 5 stars4/5Designing A Wireless Network Rating: 5 out of 5 stars5/5Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5Introduction to Security Rating: 2 out of 5 stars2/5Digital Forensics with Open Source Tools Rating: 3 out of 5 stars3/5Cyber War: The Next Threat to National Security and What to Do About It Rating: 4 out of 5 stars4/5Inside the SPAM Cartel: By Spammer-X Rating: 2 out of 5 stars2/5Wireshark & Ethereal Network Protocol Analyzer Toolkit Rating: 0 out of 5 stars0 ratingsHack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network Rating: 0 out of 5 stars0 ratingsThe Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption Rating: 0 out of 5 stars0 ratingsNo Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Rating: 4 out of 5 stars4/5Stealing the Network: How to Own an Identity: How to Own an Identity Rating: 4 out of 5 stars4/5Web of Deception: Misinformation on the Internet Rating: 4 out of 5 stars4/5Privacy’s Blueprint: The Battle to Control the Design of New Technologies Rating: 5 out of 5 stars5/5Identity Management: A Primer Rating: 4 out of 5 stars4/5Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8 Rating: 4 out of 5 stars4/5Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Rating: 4 out of 5 stars4/5Stealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Perfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab Rating: 4 out of 5 stars4/5Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Rating: 4 out of 5 stars4/5
Others you might like
From classic favorites to brand new hits, it’s all here for you to discover.
There’s more to discover in Security
Escape into new ebooks and new adventures.
NIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests Rating: 5 out of 5 stars5/5In Depth Guide to IS-IS Routing: Learn Intermediate System to Intermediate System Routing from scratch Rating: 0 out of 5 stars0 ratingsSatoshi's Legacy: A Journey Through Bitcoin's White Paper: From Genesis to the Future of Digital Gold Rating: 0 out of 5 stars0 ratingsAzure Networking: Command Line Mastery From Beginner To Architect Rating: 0 out of 5 stars0 ratingsPenetration Testing Fundamentals -1: Penetration Testing Study Guide To Breaking Into Systems Rating: 0 out of 5 stars0 ratingsKali Linux, Ethical Hacking And Pen Testing For Beginners Rating: 0 out of 5 stars0 ratingsCyber Guardians: Empowering Board Members for Effective Cybersecurity Rating: 0 out of 5 stars0 ratingsCybersecurity and Ethical Hacking: Exploring the Dark Art of Ethical Hacking and Penetration Testing Rating: 0 out of 5 stars0 ratingsCCSP Certified Cloud Security Professional A Step by Step Study Guide to Ace the Exam Rating: 0 out of 5 stars0 ratingsCyber War: The Next Threat to National Security and What to Do About It Rating: 4 out of 5 stars4/5PCI DSS Version 4.0: A guide to the payment card industry data security standard Rating: 0 out of 5 stars0 ratingsInvesting in Binance Coin: The Future of Cryptocurrency Rating: 0 out of 5 stars0 ratingsHACKING WITH KALI LINUX WIRELESS PENETRATION Rating: 0 out of 5 stars0 ratingsLitecoin: The Dark Horse of Digital Currency Rating: 0 out of 5 stars0 ratingsThe 5% Profit Crypto Trading Strategy Rating: 0 out of 5 stars0 ratingsXRP: The Future of Crypto Currency Rating: 0 out of 5 stars0 ratingsAZURE AZ 500 STUDY GUIDE-1: Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500 Rating: 0 out of 5 stars0 ratingsThe Language of Deception: Weaponizing Next Generation AI Rating: 0 out of 5 stars0 ratingsDistributed Ledger Technology Rating: 0 out of 5 stars0 ratingsCryptocurrency Trading Guide : From Novice to Pro Trader: A Comprehensive Guide to Successful Cryptocurrency Trading Rating: 0 out of 5 stars0 ratingsThe Active Defender: Immersion in the Offensive Security Mindset Rating: 0 out of 5 stars0 ratingsBug Hunting 101: Novice To Virtuoso: Web Application Security For Ethical Hackers Rating: 0 out of 5 stars0 ratingsThe Dark Side of A.I: 7 Ways To Protect Yourself From A.I. Frauds Rating: 0 out of 5 stars0 ratingsHACKING WITH KALI LINUX PENETRATION TESTING: Mastering Ethical Hacking Techniques with Kali Linux (2024 Guide for Beginners) Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners 2024 Rating: 0 out of 5 stars0 ratingsNetwork And Security Fundamentals For Ethical Hackers: Advanced Network Protocols, Attacks, And Defenses Rating: 0 out of 5 stars0 ratingsComputer Networking: Beginners Guide to Network Security & Network Troubleshooting Fundamentals Rating: 0 out of 5 stars0 ratingsGRC Chronicles Rating: 0 out of 5 stars0 ratingsPython for Cybersecurity Cookbook: 80+ practical recipes for detecting, defending, and responding to Cyber threats (English Edition) Rating: 0 out of 5 stars0 ratingsSee Yourself in Cyber: Security Careers Beyond Hacking Rating: 0 out of 5 stars0 ratingsBecome An Ethical Hacker That Can Hack Computer Systems And Secure Them Like Security Experts Rating: 0 out of 5 stars0 ratingsThe GPT-4 Crypto Revolution: Pioneering Profit in a Digital Age Rating: 0 out of 5 stars0 ratingsBlueprints of DevSecOps: Foundations to Fortify Your Cloud Rating: 0 out of 5 stars0 ratingsPenetration Testing Fundamentals-2: Penetration Testing Study Guide To Breaking Into Systems Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratingsDeep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsSoftware Transparency: Supply Chain Security in an Era of a Software-Driven Society Rating: 0 out of 5 stars0 ratingsCCSP For Dummies: Book + 2 Practice Tests + 100 Flashcards Online Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals Explained Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Certification The Ultimate Study Guide to Practice Questions With Answers and Master the Cybersecurity Analyst Exam Rating: 0 out of 5 stars0 ratingsFighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Rating: 0 out of 5 stars0 ratingsMastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) Rating: 0 out of 5 stars0 ratingsCRISC Exam - Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Tests: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsITF+ CompTIA IT Fundamentals A Step by Step Study Guide to Practice Test Questions With Answers and Master the Exam Rating: 0 out of 5 stars0 ratingsThe Survival Guide to Maintaining Access and Evading Detection Post-Exploitation Rating: 0 out of 5 stars0 ratingsRed Team Operations: Black Box Hacking, Social Engineering & Web App Scanning Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-003 Rating: 1 out of 5 stars1/5Monero (XMR): The Unseen World of Cryptocurrency Rating: 0 out of 5 stars0 ratingsCybersecurity for Remote Workers Rating: 0 out of 5 stars0 ratingsManaging Modern Security Operations Center & Building Perfect Career as SOC Analyst Rating: 0 out of 5 stars0 ratingsUltimate Splunk for Cybersecurity Rating: 0 out of 5 stars0 ratingsUltimate Web Authentication Handbook Rating: 0 out of 5 stars0 ratingsCompTIA Linux+ Study Guide: Exam XK0-005 Rating: 0 out of 5 stars0 ratingsOSCP Offensive Security Certified Professional Practice Tests With Answers To Pass the OSCP Ethical Hacking Certification Exam Rating: 0 out of 5 stars0 ratingsThe DevSecOps Playbook: Deliver Continuous Security at Speed Rating: 0 out of 5 stars0 ratingsA Comprehensive Framework for Adapting National Intelligence for Domestic Law Enforcement Rating: 0 out of 5 stars0 ratingsCHFI Computer Hacking Forensic Investigator The Ultimate Study Guide to Ace the Exam Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity: A Project Management Approach Rating: 0 out of 5 stars0 ratingsCryptography And Computer Science: Design Manual For Algorithms, Codes And Ciphers Rating: 0 out of 5 stars0 ratingsCYBER SECURITY HANDBOOK Part-2: Lock, Stock, and Cyber: A Comprehensive Security Handbook Rating: 0 out of 5 stars0 ratingsAmerica the Vulnerable: How Our Government is Failing to Protect Us Against Terrorism Rating: 3 out of 5 stars3/5CyberSecure™: An Essential Guide to Protecting Your Digital World Rating: 0 out of 5 stars0 ratingsMastering Go Network Automation: Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsWeb of Deception Unraveling Cyber Espionage World Rating: 0 out of 5 stars0 ratingsThe Backlash: Right-Wing Radicals, High-Def Hucksters, and Paranoid Politics in the Age of Obama Rating: 0 out of 5 stars0 ratingsRaising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Rating: 0 out of 5 stars0 ratingsNavigating Networks: A Comprehensive Guide to IPv4 Addressing for Tech Enthusiasts, CCNA Candidates, and Networking Professionals Rating: 0 out of 5 stars0 ratingsCompTIA PenTest+ Certification The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam Rating: 0 out of 5 stars0 ratingsLEARN MPLS FROM SCRATCH PART-A: A Beginner's Guide to Next Level of Networking Rating: 0 out of 5 stars0 ratingsMCA Microsoft Certified Associate Azure Network Engineer Study Guide: Exam AZ-700 Rating: 0 out of 5 stars0 ratingsHack the Airwaves: Advanced BLE Exploitation Techniques Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsUnderstanding Blockchain Rating: 0 out of 5 stars0 ratingsMitigating Supply Chain Attacks in the Digital Age Rating: 0 out of 5 stars0 ratingsZero Trust Security: Building Cyber Resilience & Robust Security Postures Rating: 0 out of 5 stars0 ratingsBlue Team Operations: Operatonal Security, Incident Response & Digital Forensics Rating: 0 out of 5 stars0 ratingsThe Dark Web: The Unseen Side of the Internet Rating: 0 out of 5 stars0 ratingsSql : The Ultimate Beginner to Advanced Guide To Master SQL Quickly with Step-by-Step Practical Examples Rating: 0 out of 5 stars0 ratingsMulti-Cloud Administration Guide: Manage and optimize cloud resources across Azure, AWS, GCP, and Alibaba Cloud (English Edition) Rating: 0 out of 5 stars0 ratingsRetail Security: Strategies and Solutions for Safeguarding Your Business Rating: 0 out of 5 stars0 ratingsMaking Money with Email Marketing: Strategies for Success Rating: 0 out of 5 stars0 ratingsTrojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsThrough the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 0 out of 5 stars0 ratingsComputer Networking: Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker (CEH) Rating: 0 out of 5 stars0 ratingsCybersecurity For Beginners: Learn How To Defend Against Online Threats Rating: 0 out of 5 stars0 ratingsOperational Technology: The Beginner's Guide Rating: 0 out of 5 stars0 ratingsBEYOND CHECKBOXES Rating: 0 out of 5 stars0 ratingsThe NFT Handbook: How to Create, Sell and Buy Non-Fungible Tokens Rating: 4 out of 5 stars4/5The CISO Perspective: Understand the importance of the CISO in the cyber threat landscape Rating: 0 out of 5 stars0 ratingsGray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratingsCryptocurrency Trading Guide : Mastering the Cryptocurrency Market: Techniques and Tactics for Profitable Trading Rating: 0 out of 5 stars0 ratingsKALI LINUX: Mastering the Art of Ethical Hacking and Penetration Testing (2023 Guide) Rating: 0 out of 5 stars0 ratingsHidemyacc - How to Hide Your Online Accounts A Step-by-Step Guide to Protecting Your Digital Identity Rating: 0 out of 5 stars0 ratingsComprehensive Guide to Personal Cybersecurity: Personal Cybersecurity Practices for a Safer Digital Life Rating: 0 out of 5 stars0 ratingsHands-On Kubernetes, Service Mesh and Zero-Trust: Build and manage secure applications using Kubernetes and Istio (English Edition) Rating: 0 out of 5 stars0 ratingsLinux - a Secure Personal Computer for Beginners Rating: 0 out of 5 stars0 ratingsAPIs Unlocked Rating: 0 out of 5 stars0 ratingsDo No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States Rating: 0 out of 5 stars0 ratingsCISM Certified Information Security Manager Study Guide Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing with Kali Linux: Unlocking industry-oriented VAPT tactics (English Edition) Rating: 0 out of 5 stars0 ratingsMastering Applied Observability: Empowering Your Business with Continuous Insights Rating: 0 out of 5 stars0 ratingsOperational Technology: A Holistic View Rating: 0 out of 5 stars0 ratingsCybersecurity Jobs 3- in-1 Value Bundle: Resume, Career Paths, and Work From Home Rating: 0 out of 5 stars0 ratingsISO 27001/ISO 27002: A guide to information security management systems Rating: 0 out of 5 stars0 ratingsMC Microsoft Certified Azure Data Fundamentals Study Guide: Exam DP-900 Rating: 0 out of 5 stars0 ratingsPrivacy-Preserving Machine Learning Rating: 0 out of 5 stars0 ratingsCyber Attacks: Protecting National Infrastructure, STUDENT EDITION Rating: 3 out of 5 stars3/5Cybersecurity and Third-Party Risk: Third Party Threat Hunting Rating: 0 out of 5 stars0 ratingsThe Shellcoder's Handbook: Discovering and Exploiting Security Holes Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Study Guide: Exam CS0-003 Rating: 0 out of 5 stars0 ratingsDefending the Digital Perimeter: Network Security Audit Readiness Strategies Rating: 0 out of 5 stars0 ratingsThe Hidden History of Code-Breaking: The Secret World of Cyphers, Uncrackable Codes, and Elusive Encryptions Rating: 0 out of 5 stars0 ratingsC++ Networking 101: Unlocking Sockets, Protocols, VPNs, and Asynchronous I/O with 75+ sample programs Rating: 0 out of 5 stars0 ratingsC++ Networking 101 Rating: 0 out of 5 stars0 ratingsCryptology for Beginners #1 Guide for Security, Encryption, Crypto, Algorithms and Python Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsMobile Security Fundamentals: A Guide for CompTIA Security+ 601 Exam Rating: 0 out of 5 stars0 ratingsThreat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks Rating: 0 out of 5 stars0 ratingsThe Hacker's Zibaldone Rating: 0 out of 5 stars0 ratingsCloud Computing im Kleinbetrieb - Ein Leitfaden für KMU und Start Ups Rating: 0 out of 5 stars0 ratingsIntelligent Safety: How to Protect Your Connected Family from Big Cybercrime Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsRust for Network Programming and Automation Rating: 0 out of 5 stars0 ratingsThe Metrics Manifesto: Confronting Security with Data Rating: 0 out of 5 stars0 ratingsBuilding NFTs with Ethereum: Learn how to create, deploy, and sell NFTs on Ethereum (English Edition) Rating: 0 out of 5 stars0 ratingsData-Driven Security: Analysis, Visualization and Dashboards Rating: 0 out of 5 stars0 ratingsPayment Card Industry Professional: PCIP 3.0 Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide Rating: 5 out of 5 stars5/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsSecure Intelligent Machines: Protecting AI from Cyberattack Rating: 0 out of 5 stars0 ratingsDecrypting Money: A Comprehensive Introduction to Bitcoin Rating: 0 out of 5 stars0 ratingsThe Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Lawyers Rating: 0 out of 5 stars0 ratingsCISA Certified Information Systems Auditor Study Guide Rating: 5 out of 5 stars5/5Threats: What Every Engineer Should Learn From Star Wars Rating: 0 out of 5 stars0 ratingsMaster The Configuration Of Apache Tomcat On Linux Rating: 0 out of 5 stars0 ratingsThe Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory Rating: 4 out of 5 stars4/5Build Your Own Blockchain In JS Rating: 5 out of 5 stars5/5Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT Rating: 0 out of 5 stars0 ratingsCloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 0 out of 5 stars0 ratingsPython for Cybersecurity: Using Python for Cyber Offense and Defense Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsBlue Fox: Arm Assembly Internals and Reverse Engineering Rating: 0 out of 5 stars0 ratingsHardware Security: A Hands-on Learning Approach Rating: 0 out of 5 stars0 ratingsCEH v11 Certified Ethical Hacker Study Guide Rating: 0 out of 5 stars0 ratingsIAPP CIPM Certified Information Privacy Manager Study Guide Rating: 0 out of 5 stars0 ratingsProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 0 out of 5 stars0 ratingsThe Network Security Test Lab: A Step-by-Step Guide Rating: 0 out of 5 stars0 ratingsInternet Basics: Everything You Need to Know Rating: 0 out of 5 stars0 ratingsRansomware Protection Playbook Rating: 4 out of 5 stars4/5The Official (ISC)2 CCSP CBK Reference Rating: 0 out of 5 stars0 ratingsHow to Measure Anything in Cybersecurity Risk Rating: 4 out of 5 stars4/5AWS Certified Security Study Guide: Specialty (SCS-C01) Exam Rating: 0 out of 5 stars0 ratingsNet Zeros and Ones: How Data Erasure Promotes Sustainability, Privacy, and Security Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5DeFi and the Future of Finance Rating: 0 out of 5 stars0 ratingsCloud Native Security Rating: 0 out of 5 stars0 ratingsSet Up Your Own IPsec VPN, OpenVPN and WireGuard Server: Build Your Own VPN Rating: 5 out of 5 stars5/5CISSP Exam Study Guide: NIST Framework, Digital Forensics & Cybersecurity Governance Rating: 5 out of 5 stars5/5Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise Rating: 0 out of 5 stars0 ratingsThreat Modeling: Designing for Security Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsHow I Rob Banks: And Other Such Places Rating: 0 out of 5 stars0 ratingsMastering Go Network Automation Rating: 0 out of 5 stars0 ratingsCCSP Official (ISC)2 Practice Tests Rating: 3 out of 5 stars3/5Applied Cryptography: Protocols, Algorithms and Source Code in C Rating: 4 out of 5 stars4/5Web Commerce Security: Design and Development Rating: 0 out of 5 stars0 ratingsThe Web Application Hacker's Handbook: Finding and Exploiting Security Flaws Rating: 3 out of 5 stars3/5Microsoft Windows Security Essentials Rating: 5 out of 5 stars5/5Cyber Security Policy Guidebook Rating: 0 out of 5 stars0 ratingsCompTIA PenTest+ Certification For Dummies Rating: 0 out of 5 stars0 ratingsA Brief Guide of 12 Strategies to Minimize the Adverse Impact of Artificial Intelligence on Your Daily Life Rating: 0 out of 5 stars0 ratingsCASP+ CompTIA Advanced Security Practitioner Practice Tests: Exam CAS-004 Rating: 0 out of 5 stars0 ratings(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsUsing Social Media for Global Security Rating: 0 out of 5 stars0 ratingsThe Art of Attack: Attacker Mindset for Security Professionals Rating: 0 out of 5 stars0 ratingsInnocent Code: A Security Wake-Up Call for Web Programmers Rating: 4 out of 5 stars4/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5The Official (ISC)2 SSCP CBK Reference Rating: 0 out of 5 stars0 ratingsSecurity Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests Rating: 0 out of 5 stars0 ratingsPredicting Malicious Behavior: Tools and Techniques for Ensuring Global Security Rating: 0 out of 5 stars0 ratingsThe Browser Hacker's Handbook Rating: 0 out of 5 stars0 ratingsCybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide Rating: 0 out of 5 stars0 ratingsComputational Number Theory and Modern Cryptography Rating: 3 out of 5 stars3/5The Technology Doesn't Matter: Prioritizing the People in IT Business Alignment Rating: 0 out of 5 stars0 ratingsSecurity in a Web 2.0+ World: A Standards-Based Approach Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Study Guide: Exam CS0-001 Rating: 0 out of 5 stars0 ratingsHands-On Oracle Application Express Security: Building Secure Apex Applications Rating: 0 out of 5 stars0 ratingsPractical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation Rating: 0 out of 5 stars0 ratingsMCA Microsoft Certified Associate Azure Security Engineer Study Guide: Exam AZ-500 Rating: 0 out of 5 stars0 ratingsMastering Windows Network Forensics and Investigation Rating: 3 out of 5 stars3/5Hacking Wireless Networks For Dummies Rating: 3 out of 5 stars3/5Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography Rating: 0 out of 5 stars0 ratings(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests Rating: 0 out of 5 stars0 ratingsSecurity 2020: Reduce Security Risks This Decade Rating: 0 out of 5 stars0 ratingsComputer Security and Cryptography Rating: 5 out of 5 stars5/5Privacy, Regulations, and Cybersecurity: The Essential Business Guide Rating: 0 out of 5 stars0 ratingsSecurity Awareness For Dummies Rating: 0 out of 5 stars0 ratingsKali Linux Penetration Testing Bible Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CISSP:Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans Rating: 0 out of 5 stars0 ratingsThe CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 0 out of 5 stars0 ratingsNft for Beginners: Learn the Basics of Investing in Digital Crypto Art and Collectibles to Make a Profit (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsSecret Key Cryptography: Ciphers, from simple to unbreakable Rating: 0 out of 5 stars0 ratingsKubernetes Secrets Management Rating: 0 out of 5 stars0 ratingsCCNA Wireless Study Guide: IUWNE Exam 640-721 Rating: 5 out of 5 stars5/5The Protector's Handbook: A Comprehensive Guide to Close Protection Rating: 0 out of 5 stars0 ratingsWe Need To Talk: 52 Weeks To Better Cyber-Security Rating: 0 out of 5 stars0 ratingsNavigating the Cybersecurity Career Path Rating: 0 out of 5 stars0 ratingsRussian Information Warfare: Assault on Democracies in the Cyber Wild West Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests Rating: 0 out of 5 stars0 ratingsWhy Avoid Crypto? Crypto Trading Strategies & Mistakes To Avoid While Trading Crypto. Rating: 0 out of 5 stars0 ratingsCloud Security: A Comprehensive Guide to Secure Cloud Computing Rating: 0 out of 5 stars0 ratingsMetaverse for Beginners Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-001 Rating: 0 out of 5 stars0 ratingsRisk Management and ISO 31000: A pocket guide Rating: 0 out of 5 stars0 ratingsBasic Setup of FortiMail Mail Server Rating: 0 out of 5 stars0 ratingsSecrets and Lies: Digital Security in a Networked World Rating: 4 out of 5 stars4/5Unauthorised Access: Physical Penetration Testing For IT Security Teams Rating: 4 out of 5 stars4/5Getting an Information Security Job For Dummies Rating: 0 out of 5 stars0 ratingsPhishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5CEH v11: Certified Ethical Hacker Version 11 Practice Tests Rating: 0 out of 5 stars0 ratingsNavigating the Dark Waters of Cybersecurity Incident Response Rating: 0 out of 5 stars0 ratingsSecuring the Virtual Environment: How to Defend the Enterprise Against Attack Rating: 0 out of 5 stars0 ratingsComputer Forensics For Dummies Rating: 4 out of 5 stars4/5Space Rogue How The Hackers Known As L0pht Changed the World Rating: 0 out of 5 stars0 ratingsPhishing: Cutting the Identity Theft Line Rating: 5 out of 5 stars5/5The Art of Selling Cybersecurity Rating: 0 out of 5 stars0 ratingsInformation Security: Principles and Practice Rating: 0 out of 5 stars0 ratingsInternet Security: Cryptographic Principles, Algorithms and Protocols Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the SSCP CBK Rating: 0 out of 5 stars0 ratingsThe Human Fix to Human Risk: 5 Steps to Fostering a Culture of Cyber Security Awareness Rating: 0 out of 5 stars0 ratingsThe Art of Deception: Controlling the Human Element of Security Rating: 3 out of 5 stars3/5Cybersecurity Career Guide Rating: 0 out of 5 stars0 ratingsThe Antivirus Hacker's Handbook Rating: 0 out of 5 stars0 ratingsCyber Security: The complete guide to cyber threats and protection Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CISSP CBK Reference Rating: 0 out of 5 stars0 ratingsData Privacy: What Enterprises Need to Know? Rating: 0 out of 5 stars0 ratingsDestination CISSP Rating: 3 out of 5 stars3/5Cloud Security For Dummies Rating: 0 out of 5 stars0 ratingsThere's a War Going On But No One Can See It Rating: 0 out of 5 stars0 ratingsMaking Sense of Cybersecurity Rating: 0 out of 5 stars0 ratingsCompTIA Security+: Securing Networks Rating: 0 out of 5 stars0 ratingsNavigating the Digital Landscape: Fundamentals, Cybersecurity, Emerging Technologies, and Applications Rating: 0 out of 5 stars0 ratingsCybersecurity Enforcement and Monitoring Solutions: Enhanced Wireless, Mobile and Cloud Security Deployment Rating: 0 out of 5 stars0 ratingsStoring cripto currencies safely Rating: 0 out of 5 stars0 ratingsISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5A Convenient Guide to Starting You on Threat Modeling Rating: 0 out of 5 stars0 ratingsGeneral Orders for Security Personnel: A Guide to Maintaining Discipline and Professionalism Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsCybersecurity Design Principles: Building Secure Resilient Architecture Rating: 0 out of 5 stars0 ratingsPenetration Testing of Computer Networks Using BurpSuite and Various Penetration Testing Tools Rating: 0 out of 5 stars0 ratingsBasics of OAuth Securely Connecting Your Applications Rating: 0 out of 5 stars0 ratingsIan Talks Hacking A-Z Rating: 0 out of 5 stars0 ratingsAzure Cloud Computing Az-900 Exam Study Guide: 4 In 1 Microsoft Azure Cloud Deployment, Security, Privacy & Pricing Concepts Rating: 0 out of 5 stars0 ratingsCISSP Exam Study Guide For Security Professionals: NIST Cybersecurity Framework, Risk Management, Digital Forensics & Governance Rating: 0 out of 5 stars0 ratingsEncryption Demystified The Key to Securing Your Digital Life Rating: 0 out of 5 stars0 ratingsSocial Engineering - Zero to Hero in Social Engineering: Securing your insecurities by updating your mental firewall! Rating: 0 out of 5 stars0 ratingsCloud Computing Fundamentals: Introduction To Microsoft Azure Az-900 Exam Rating: 0 out of 5 stars0 ratingsApple Secure Enclave Processor Rating: 0 out of 5 stars0 ratingsWireless Hacking Basics for Beginners Rating: 0 out of 5 stars0 ratingsCyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsComputer Viruses For Dummies Rating: 0 out of 5 stars0 ratingsApplication Security Program Handbook Rating: 0 out of 5 stars0 ratingsThe Ultimate Guide To Understanding NFTs Rating: 0 out of 5 stars0 ratingsBuy Bitcoin, You'll Thank Yourself In The Future Rating: 0 out of 5 stars0 ratingsDon’t Ever Think About Passwords Again Rating: 0 out of 5 stars0 ratingsAWS Security Rating: 0 out of 5 stars0 ratings
Read what you want, how you want
Discover millions of ebooks, audiobooks, podcasts, and so much more with a free trial.
Only $11.99/month after trial. Cancel anytime.