Title: HACKING WITH KALI LINUX PENETRATION TESTING: Mastering Ethical Hacking Techniques with Kali Linux (2024 Guide for Beginners), Author: BARBARA HEATH
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit, Author: Debasish Mandal
Title: Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security, Author: Richard Dorsel
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Cybersecurity: Safeguarding Our Digital World, Author: Justin K. Kojok
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: Cryptography: A Very Short Introduction, Author: Sean Murphy
Title: Bits and Bullets: Cyber Warfare in Military Operations - Framework for Military Planners to Envision Ways Cyberspace Can Impact the Battlefield, Hypothetical Conflict in Korea as Thought Experiment, Author: Progressive Management
Title: Montefeltro Conspiracy: A Renaissance Mystery Decoded, Author: Marcello Simonetta
Title: Pentest+ Exam Pass: Penetration Testing And Vulnerability Management For Cybersecurity Professionals, Author: Rob Botwright
Title: Cybersecurity Dictionary for Everyone: 1250 Terms Explained in Simple English, Author: Tolga Tavlas
Title: Cryptography: A Very Short Introduction, Author: Fred Piper
Title: History of Hacking, Author: Brandon Jones
Title: Cryptography and Network Security: Demystifying the ideas of Network Security, Cryptographic Algorithms, Wireless Security, IP Security, System Security, and Email Security, Author: Bhushan Trivedi
Title: Zero Days, One Obligation: Cyberspace Computer Software Vulnerability Disclosure Policy by the U.S. Government, Cyberethics and the Roles of Morality, Utilitarianism, Strategic and National Interests, Author: Progressive Management
Title: Cybersecurity Simplified for Small Business: A Plain-English Guide, Author: Timothy Lord
Title: 2600: The Hacker Digest - Volume 26, Author: 2600 Magazine
Title: Malware Reverse Engineering: Cracking The Code, Author: Rob Botwright

Pagination Links