Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: Hacking : Guide to Computer Hacking and Penetration Testing, Author: Alex Nordeen
Title: Cybersecurity for Beginners: Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams, Author: Michael Patel
Title: Hacked, Now What? Protect Your Business From Cybercriminals, Author: Nathalie Claes
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: CRISC Exam - Study Guide, Author: Hemang Doshi
Title: CISSP Exam Insights: Practice Questions & Explanations, Author: SUJAN
by SUJAN
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Worm: The First Digital World War, Author: Mark Bowden
Title: HACKING WITH KALI LINUX PENETRATION TESTING: Mastering Ethical Hacking Techniques with Kali Linux (2024 Guide for Beginners), Author: BARBARA HEATH
Title: Securing Information in the Digital Age, Author: Roberto Miguel Rodriguez
Title: Ansible For Amazon Web Services AWS By Examples: 10+ Examples To Automate Your AWS Modern Infrastructure, Author: Luca Berton
Title: Cryptography: A Very Short Introduction, Author: Sean Murphy
Title: Cybersecurity: Mastering Information Technology Security: Securing Your Electronic Data from Hacker Attacks While Browsing the Interne, Author: Ryan Roffe
Title: 2600: The Hacker Digest - Volume 36, Author: 2600 Magazine
Title: Ansible For Containers and Kubernetes By Examples: 10+ Automation Examples To Automate Containers, Kubernetes and OpenShift, Author: Luca Berton
Title: Hack the Airwaves: Advanced BLE Exploitation Techniques, Author: Josh Luberisse
Title: Air Force Cyberspace Reports: Principles of War, Act and Actor Attribution, Legal Framework, Influence Operations and the Internet, Command and Control Model, Sea Power and Fleet Resources, Author: Progressive Management
Title: Bullseye Breach, Author: Greg Scott
Title: Cyber Attacks, Attribution, and Deterrence: Case Studies - Stuxnet Attack on Iran, LulzSec, and Estonian Attacks, Protection of Cyberspace and Digital Infrastructure as Vital to National Security, Author: Progressive Management

Pagination Links