Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: Hacking : Guide to Computer Hacking and Penetration Testing, Author: Alex Nordeen
Title: Cybersecurity for Beginners: Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams, Author: Michael Patel
Title: Hacked, Now What? Protect Your Business From Cybercriminals, Author: Nathalie Claes
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: CRISC Exam - Study Guide, Author: Hemang Doshi
Title: CISSP Exam Insights: Practice Questions & Explanations, Author: SUJAN
by SUJAN
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Worm: The First Digital World War, Author: Mark Bowden
Title: HACKING WITH KALI LINUX PENETRATION TESTING: Mastering Ethical Hacking Techniques with Kali Linux (2024 Guide for Beginners), Author: BARBARA HEATH
Title: Bullseye Breach, Author: Greg Scott
Title: Mastering Ethereum and Smart Contracts, Advanced Techniques, Author: Ed A Norex
Title: Gestión de servicios en el sistema informático. IFCT0509, Author: Ester Chicano Tejada
Title: Cyber Detox: A Beginner's Guide to Cyber Hygiene, Author: Michael Payams
Title: OWNED: Why hacking continues to be a problem, Author: Mister Reiner
Title: La seguridad informática es como el sexo seguro, Author: Richard G Lowe Jr
Title: 2600: The Hacker Digest - Volume 32, Author: 2600 Magazine
Title: Análise de malwares, Author: Sandro Melo
Explore Series
Title: U.S. Army Concept for Cyberspace and Electronic Warfare (EW) Operations 2025-2040 (TRADOC 525-8-6) - Electromagnetic Spectrum Management, Threats from Hackers, Bot Nets, Phishers, Foreign Intelligence, Author: Progressive Management
Title: FreeBSD Mastery: Jails, Author: Michael W. Lucas
#15 in Series

Pagination Links