Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security, Author: Richard Dorsel
Title: Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit, Author: Debasish Mandal
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: Bits and Bullets: Cyber Warfare in Military Operations - Framework for Military Planners to Envision Ways Cyberspace Can Impact the Battlefield, Hypothetical Conflict in Korea as Thought Experiment, Author: Progressive Management
Title: Montefeltro Conspiracy: A Renaissance Mystery Decoded, Author: Marcello Simonetta
Title: Cryptography: A Very Short Introduction, Author: Fred Piper
Title: SNMP Mastery, Author: Michael W. Lucas
#15 in Series
Title: Silent Wars: Espionage, Sabotage, and the Covert Battles in Cyberspace, Author: Josh Luberisse
Title: 10 Things That Used to be Good Ideas in Data Security, Author: Mike Winkler
Title: Hack the Airwaves: Advanced BLE Exploitation Techniques, Author: Josh Luberisse
Title: Microsoft Office 365 Security Essentials, Author: Mike Halsey
Title: Agile Information Security: Using Scrum to Survive in and Secure a Rapidly Changing Environment, Author: James R. Fitzer
Title: Data Independence: Reclaiming Privacy in an Era of Evolving Tech, Author: Wes Chaar
Title: Interactive Wargaming Cyberwar: 2025 - Support Tool for Training of Basic Cyberspace Operations Concepts to Military Professionals, Building Player's Knowledge Base and Experience, Author: Progressive Management
Title: Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods (English Edition), Author: Ashish Mishra
Title: Cybersecurity: How to Protect Your Electronic Data from Hacker Attacks while you are Browsing the Internet, Author: Megane Noel
Title: Ansible For Containers and Kubernetes By Examples: 10+ Automation Examples To Automate Containers, Kubernetes and OpenShift, Author: Luca Berton

Pagination Links