Title: Big Tech Tyrants: How Silicon Valley's Stealth Practices Addict Teens, Silence Speech, and Steal Your Privacy, Author: Floyd Brown
Title: The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer, Author: Perry Carpenter
Title: Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy, Author: Ronald J. Deibert
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, Author: Eric Cole
Title: Surveillance Valley: The Secret Military History of the Internet, Author: Yasha Levine
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: The Art of Deception: Controlling the Human Element of Security, Author: Kevin D. Mitnick
Title: Secrets and Lies: Digital Security in a Networked World, Author: Bruce Schneier
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: Security Engineering and Tobias on Locks Two-Book Set, Author: Ross Anderson
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke
Title: CISSP All-in-One Exam Guide, Seventh Edition, Author: Fernando Maymi
Title: Security Issues in Communication Devices, Networks and Computing Models: Volume 1, Author: Budati Anil Kumar
Title: Trusted Platform Modules: Why, when and how to use them, Author: Ariel Segall
Title: The Official (ISC)2 SSCP CBK Reference, Author: Mike Wills
Title: Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach, Author: Jennifer L. Bayuk
Title: Edge Intelligence and Analytics for Internet of Things, Author: Govind P. Gupta
Title: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, Author: Bruce Schneier

Pagination Links