Title: Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security, Author: Richard Dorsel
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit, Author: Debasish Mandal
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: Bits and Bullets: Cyber Warfare in Military Operations - Framework for Military Planners to Envision Ways Cyberspace Can Impact the Battlefield, Hypothetical Conflict in Korea as Thought Experiment, Author: Progressive Management
Title: Montefeltro Conspiracy: A Renaissance Mystery Decoded, Author: Marcello Simonetta
Title: Cryptography: A Very Short Introduction, Author: Fred Piper
Title: SNMP Mastery, Author: Michael W. Lucas
#15 in Series
Title: Frauds, Phones & Fingerprints: Proving Your Identity in the Digital Age, Author: Almis Ledas
Title: 2600: The Hacker Digest - Volume 35, Author: 2600 Magazine
Title: The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden, Author: Progressive Management
Title: Cryptocurrency & Blockchain: 2 Manuscripts - Understanding Cryptocurrency & Understanding Blockchain, Author: Sean Bennett
Title: Python pour les hackers : Le guide des script kiddies : apprenez à créer vos propres outils de hacking, Author: Kevin Droz
Title: Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching, Author: Progressive Management
Title: Identity Theft in the Cyber Age, Author: Ronald J. Leach
Title: Military Cyber Attacks and America's Vulnerable Nuclear Weapons and Defenses: DoD Task Force Report on Resilient Military Systems and the Advanced Cyber Threat, Author: Progressive Management
Title: How To Protect Your Personal Computer: Your Step By Step Guide To Protecting Your Personal Computer, Author: HowExpert
Title: Air Force Doctrine Document 3-12, Cyberspace Operations: Malware, Network Defense, Definitions, Policy and Doctrine, U.S. National Cyberspace Policy, United States Strategic Command, Author: Progressive Management

Pagination Links