Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security, Author: Richard Dorsel
Title: Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit, Author: Debasish Mandal
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: Bits and Bullets: Cyber Warfare in Military Operations - Framework for Military Planners to Envision Ways Cyberspace Can Impact the Battlefield, Hypothetical Conflict in Korea as Thought Experiment, Author: Progressive Management
Title: Montefeltro Conspiracy: A Renaissance Mystery Decoded, Author: Marcello Simonetta
Title: Cryptography: A Very Short Introduction, Author: Fred Piper
Title: SNMP Mastery, Author: Michael W. Lucas
#15 in Series
Title: The Protector's Handbook: A Comprehensive Guide to Close Protection, Author: MELVYN C.C. VALENZUELA
Title: Cryptocurrency: A Guide to Navigating the World of Digital Assets, Author: Richard Skiba
Title: Information Assurance: Trends in Vulnerabilities, Threats, and Technologies - Electromagnetic Pulse Attack (EMP), Countermeasures, Warfighter Cyber Security, Network Centric Warfare, Author: Progressive Management
Title: Passive Regulation: General Systems Design Principles, Author: Gerald M. Weinberg
Title: Web Penetration Testing: Step-By-Step Guide, Author: Radhi Shatob
Title: Cybersecurity Jobs & Career Paths (Find Cybersecurity Jobs, #2), Author: bruce brown
Title: Data Independence: Reclaiming Privacy in an Era of Evolving Tech, Author: Wes Chaar
Title: S.O.A.R. to New Heights: Incident Response of the Future, Author: Jarrod Barto
Title: Cyberspace Policy Review, Author: National Security Council
Title: Frauds, Phones & Fingerprints: Proving Your Identity in the Digital Age, Author: Almis Ledas

Pagination Links