Title: Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy, Author: Ronald J. Deibert
Title: PoC or GTFO, Volume 3, Author: Manul Laphroaig
Title: If It's Smart, It's Vulnerable, Author: Mikko Hyppönen
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity, Author: Phil Quade
Title: How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life, Author: J. J. Luna
Title: Data Independence: Reclaiming Privacy in an Era of Evolving Tech, Author: Wes Chaar
Title: The Cybernetic Society: How Humans and Machines Will Shape the Future Together, Author: Amir Husain Pre-Order Now
Title: Microcontroller Exploits, Author: Travis Goodspeed
Title: A Vulnerable System: The History of Information Security in the Computer Age, Author: Andrew J. Stewart
Title: The CISO Evolution: Business Knowledge for Cybersecurity Executives, Author: Matthew K. Sharp
Title: The Wires of War: Technology and the Global Struggle for Power, Author: Jacob Helberg
Title: The Metrics Manifesto: Confronting Security with Data, Author: Richard Seiersen
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Trust in Computer Systems and the Cloud, Author: Mike Bursell
Title: Privacy's Blueprint: The Battle to Control the Design of New Technologies, Author: Woodrow Hartzog
Title: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, Author: Bruce Schneier
Title: Fight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders, Author: Renee Tarun
Title: The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity, Author: Christian Espinosa

Pagination Links