Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security, Author: Richard Dorsel
Title: Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit, Author: Debasish Mandal
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: Bits and Bullets: Cyber Warfare in Military Operations - Framework for Military Planners to Envision Ways Cyberspace Can Impact the Battlefield, Hypothetical Conflict in Korea as Thought Experiment, Author: Progressive Management
Title: Montefeltro Conspiracy: A Renaissance Mystery Decoded, Author: Marcello Simonetta
Title: Cryptography: A Very Short Introduction, Author: Fred Piper
Title: SNMP Mastery, Author: Michael W. Lucas
#15 in Series
Title: Passive Regulation: General Systems Design Principles, Author: Gerald M. Weinberg
Title: 2600: The Hacker Digest - Volume 33, Author: 2600 Magazine
Title: Privacidad es poder: Datos, vigilancia y libertad en la era digital, Author: Carissa Véliz
Title: Dentro de WikiLeaks: Mi entapa en la web más peligrosa del mundo (Inside WikiLeaks: My Time with Julian Assange at the World's Most Dangerous Website), Author: Daniel Domscheit-Berg
Title: Wireless Hacking 101 (Come hackerare), Author: Karina Astudillo
Title: Examining Cyber Command Structures - History of Air and Space Domains, Nuclear Weapons Mission, Alternative Force Structures for Cyber Command and Control (C2), USCYBERCOM, Author: Progressive Management
Title: Blockchain Technology in the Department of Defense (DoD) - Implementation to Improve Acquisitions, Procurement, and Supply Chain, Analysis of Private Sector Programs, Purchase Card Pilot Program, Author: Progressive Management
Title: Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work, Author: Scott Gordon
Title: Essential Guide to Homeland Security Cyber Storm National Cyber Exercises: Full Reports from Five Cyber Attack Simulations Through 2016, Preparedness, Response, Coordination and Recovery Mechanisms, Author: Progressive Management
Title: 2018 Department of Homeland Security Cybersecurity Strategy: Five Pillar Framework of Risk Identification, Vulnerability Reduction, Threat Reduction, Consequence Mitigation, and Cyberspace Outcomes, Author: Progressive Management

Pagination Links