Title: Zaschita dannyh. Ot avtorizatsii do audita, Author: Jason Andress
Title: You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches, Author: Josephine Wolff
Title: You Can Hack: The Art of Exploitation, Author: Pankaj Patidar
Title: Worm: The First Digital World War, Author: Mark Bowden
Title: Wireshark e Metasploit: Dall'analisi di rete alle tecniche di attacco e di difesa, Author: Jessey Bullock
Title: Wicked Cool Ruby Scripts: Useful Scripts that Solve Difficult Problems, Author: Steve Pugh
Title: What Is Cybersecurity For?, Author: Tim Stevens
Explore Series
Title: Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely, Author: Lori Mac Vittie
Title: Was vernetzt ist, ist angreifbar: Wie Geheimdienste und Kriminelle uns im Netz infiltrieren, Author: Mikko Hyppönen
Title: Vulnerability Assessment and Penetration Testing (VAPT): Detailed guide with highlighted threats, risk exposure, and remediations, Author: Rishabh Bhardwaj
Title: Vorsicht, Freund liest mit!: Wie wir alle seit Jahren ausspioniert werden und wie wir uns wehren können, Author: Götz Schartner
Title: Versteckte Botschaften (TELEPOLIS): Die faszinierende Geschichte der Steganografie, Author: Klaus Schmeh
Explore Series
Title: Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies, Author: Craig P. Bauer
Title: Unmasking the Social Engineer: The Human Element of Security, Author: Christopher Hadnagy
Title: Ultimate Splunk for Cybersecurity: Practical Strategies for SIEM Using Splunk's Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security (English Edition), Author: Jit Sinha
Title: Ultimate Splunk for Cybersecurity: Practical Strategies for SIEM Using Splunk's Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security (English Edition), Author: Jit Sinha
Title: Two-Factor Authentication, Author: Mark Stanislav
#4 in Series
Title: Tutela dei dati e sicurezza informatica, Author: Alessia Del Pizzo
Title: Trügerische Sicherheit: Wie die Terrorangst uns in den Ausnahmezustand treibt, Author: Peter Schaar
Title: Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World, Author: Marcus J. Carey

Pagination Links