1 - 20 of 2524 results
Title: Hacking: The Art of Exploitation / Edition 2, Author: Jon Erickson Excerpt Read an excerpt of this book!
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh Excerpt Read an excerpt of this book!
Title: Shellcoder's Handbook: Discovering and Exploiting Security Holes, Author: Chris Anley Excerpt Read an excerpt of this book!
Title: Hacking For Dummies, Author: Kevin Beaver Excerpt Read an excerpt of this book!
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter Excerpt Read an excerpt of this book!
Title: CASP CompTIA Advanced Security Practitioner Study Guide: Exam CAS-002 / Edition 2, Author: Michael Gregg Excerpt Read an excerpt of this book!
Title: Eleventh Hour CISSP: Study Guide / Edition 3, Author: Eric Conrad
Title: Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies, Author: Craig P. Bauer
Title: Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick Excerpt Read an excerpt of this book!
Title: Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation, Author: Bruce Dang Excerpt Read an excerpt of this book!
Title: Metasploit: The Penetration Tester's Guide, Author: David Kennedy Excerpt Read an excerpt of this book!
Title: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, Author: Bruce Schneier
Title: Guide to Computer Forensics and Investigations (with DVD) / Edition 5, Author: Bill Nelson
Title: Cybersecurity and Cyberwar: What Everyone Needs to Know, Author: Peter W. Singer Excerpt Read an excerpt of this book!
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick Excerpt Read an excerpt of this book!
Title: The InfoSec Handbook: An Introduction to Information Security, Author: Umesha Nayak Excerpt Read an excerpt of this book!
Title: Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response, Author: Leighton Johnson Excerpt Read an excerpt of this book!
Title: The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption, Author: Joshua Holden
Title: The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws, Author: Dafydd Stuttard Excerpt Read an excerpt of this book!
Title: Break the Code: Cryptography for Beginners, Author: Bud Johnson

Pagination Links