Title: Cyberpunk: Outlaws and Hackers on the Computer Frontier, Author: Katie Hafner
Title: Cyber Wars: Hacks that Shocked the Business World, Author: Charles  Arthur
Title: Security Architect: Careers in information security, Author: Jon Collins
Title: Seven Deadliest Wireless Technologies Attacks, Author: Brad Haines
Title: Seven Deadliest Social Network Attacks, Author: Carl Timm
Title: Ultimate GDPR Practitioner Guide (2nd Edition): Demystifying Privacy & Data Protection, Author: Stephen R Massey
Title: Behavioral Cybersecurity: Fundamental Principles and Applications of Personality Psychology, Author: Wayne Patterson
Title: Hacking the Hacker: Learn From the Experts Who Take Down Hackers, Author: Roger A. Grimes
Title: Perfect Password: Selection, Protection, Authentication, Author: Mark Burnett
Title: Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication, Author: Robert W. Gehl
Title: Cyberspace and Security: A Fundamentally New Approach, Author: Victor Sheymov
Title: Project Zero Trust: A Story about a Strategy for Aligning Security and the Business, Author: George Finney
Title: GET LOST: Personal Privacy Strategies for Extremely Busy People, Author: Daniel Farber Huang
Title: A Beginner's Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals, Author: Brij B. Gupta
Title: The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online, Author: Denny Cherry
Title: Detecting and Combating Malicious Email, Author: Julie JCH Ryan
Title: Eleventh Hour CISSP®: Study Guide / Edition 3, Author: Joshua Feldman
Title: Mobile Data Loss: Threats and Countermeasures, Author: Michael T. Raggo
Title: PCI DSS 3.1: The Standard That Killed SSL, Author: Branden R. Williams
Title: Cracking Codes with Python: An Introduction to Building and Breaking Ciphers, Author: Al Sweigart

Pagination Links