Title: Internet Password Keeper, Author: Eric Butow
Title: Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers, Author: Eric O'Neill
Title: FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, Author: Perry Carpenter
Title: The Cybernetic Society: How Humans and Machines Will Shape the Future Together, Author: Amir Husain
Title: Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy, Author: Ronald J. Deibert
Title: PoC or GTFO, Volume 3, Author: Manul Laphroaig
Title: If It's Smart, It's Vulnerable, Author: Mikko Hyppönen
Title: How I Rob Banks: And Other Such Places, Author: FC Barker
Title: Dark Screens: Hackers and Heroes in the Shadowy World of Ransomware, Author: Anja Shortland Pre-Order Now
Title: How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life, Author: J. J. Luna
Title: Modeling and Analyzing Security Protocols with Tamarin: A Comprehensive Guide, Author: David Basin
Title: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race, Author: Nicole Perlroth
Title: A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice, Author: Jason Edwards
Title: Security Engineering: A Guide to Building Dependable Distributed Systems, Author: Ross Anderson
Title: Cybersecurity in Context: Technology, Policy, and Law, Author: Chris Jay Hoofnagle
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity, Author: Phil Quade
Title: Ransom War: How Cyber Crime Became a Threat to National Security, Author: Max Smeets
Title: Microcontroller Exploits, Author: Travis Goodspeed
Title: Tobias on Locks and Insecurity Engineering: Understanding and Preventing Design Vulnerabilities in Locks, Safes, and Security Hardware, Author: Marc Weber Tobias

Pagination Links