Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: HACKING WITH KALI LINUX PENETRATION TESTING: Mastering Ethical Hacking Techniques with Kali Linux (2024 Guide for Beginners), Author: BARBARA HEATH
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security, Author: Richard Dorsel
Title: Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit, Author: Debasish Mandal
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: Cryptography: A Very Short Introduction, Author: Sean Murphy
Title: Bits and Bullets: Cyber Warfare in Military Operations - Framework for Military Planners to Envision Ways Cyberspace Can Impact the Battlefield, Hypothetical Conflict in Korea as Thought Experiment, Author: Progressive Management
Title: Montefeltro Conspiracy: A Renaissance Mystery Decoded, Author: Marcello Simonetta
Title: Cryptography: A Very Short Introduction, Author: Fred Piper
Title: Iranian Cyber Threat to the U.S. Homeland, Author: Committee on Homeland Security House of Representatives
Title: Chinese Cyber Economic Espionage: Motivations and Responses - U.S. Response During Obama Administration, Inability of America to Stem Chinese Theft of Intellectual Property from Businesses, Author: Progressive Management
Title: Entre a Fraude e o Planejamento Tributário com os Criptoativos: como dar segurança jurídica ao mercado, Author: Ricardo Menezes Cordeiro
Title: National Guard Forces in the Cyber Domain: Integrating the Guard into National Cyber Forces and Defenses, Cybersecurity Protecting Critical Infrastructure from Hactivists and Terrorist Groups, Author: Progressive Management
Title: Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities, Author: Progressive Management
Title: Cyberspace Policy Review, Author: National Security Council
Title: CYBERSECURITY FOR BEGINNERS: A Step-by-Step Guide to Protecting Your Digital World (2024 Crash Course), Author: CALDWELL YATWES
Title: Nothing New Under the Sun: Benefiting from the Great Lessons of History to Develop a Coherent Cyberspace Deterrence Strategy - Cyber War, WMD, Nuclear and Space Deterrence, Iraq, Cuban Missile Crisis, Author: Progressive Management
Title: Web Penetration Testing: Step-By-Step Guide, Author: Radhi Shatob

Pagination Links