Title: Pentesting 101: Cracking Gadgets And Hacking Software, Author: Rob Botwright
Title: Trolls Inc.: Il volto autoritario della Rete, tra libertà d'insulto, pubblicità e privacy, Author: Duccio Facchini
Explore Series
Title: Splunk Punk: Taming Logs, Alerts, and the Chaos of SIEM, Author: Scott Markham
Title: 2600: The Hacker Digest - Volume 26, Author: 2600 Magazine
Title: Hacking Secret Cipherswith Python Hacking - Computer Virus, Cracking, Malware, IT Security, Author: Al Sweigart
Title: SNMP Mastery, Author: Michael W. Lucas
#15 in Series
Title: Federal Cybersecurity Research and Development Strategic Plan: Artificial Intelligence, Quantum Information Science, Privacy, Secure Hardware and Software, Education and Workforce Development, Author: Progressive Management
Title: Cyber Weapons of Mass Psychological Destruction: And the People Who Use Them, Author: Vikram Sethi
Title: 2600: The Hacker Digest - Volume 37, Author: 2600 Magazine
Title: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground, Author: Kevin Poulsen
Title: Blockchains in National Defense: Trustworthy Systems in a Trustless World - The Evolving Cyber Threat, Air Force Should Research and Develop Blockchain Technology to Reduce Probability of Compromise, Author: Progressive Management
Title: Certified Ethical Hacker: Session Hijacking, SQL Injections, Cloud Computing, And Cryptography, Author: Rob Botwright
Title: Digitale Sicherheit: Die praktische Toolbox zum Schutz von E-Mails, Smartphone, PC & Co., Author: Georg Stadler
Title: Make Passwords Great Again: Password Log Book, Internet Login Keeper, Website Organizer, Simple & Minimalist, Matte Black Stealth Cover, Author: Future Proof Publishing
Title: Electric Grid Security, Author: Committee on Energy and Natural Resources United States Senate
Title: Anatomy of Cyber Attacks: Exploitation of the Weakest Link, Author: Dr. Jamaine Mungo CISSP CEH
Title: How to speed up and protect Windows DIY, Author: Min Wang
Title: Exploring The Intersection Of Artificial Intelligence And Cyber Defense, Author: Stephen Nnamdi
Title: How to Protect Yourself from Your Computer, Author: Marc-Anthony C Arena
Title: The Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices, Author: Emily Foster

Pagination Links