Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: Hacking : Guide to Computer Hacking and Penetration Testing, Author: Alex Nordeen
Title: Cybersecurity Jobs & Career Paths (Find Cybersecurity Jobs, #2), Author: bruce brown
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: Hacked, Now What? Protect Your Business From Cybercriminals, Author: Nathalie Claes
Title: Cybersecurity for Beginners: Learn Practical Skills to Defend Against Cyber Threats and Prepare for Certification Exams, Author: Michael Patel
Title: CRISC Exam - Study Guide, Author: Hemang Doshi
Title: CISSP Exam Insights: Practice Questions & Explanations, Author: SUJAN
by SUJAN
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: OAuth 2.0: Proteja suas aplicações com o Spring Security OAuth2, Author: Adolfo Eloy
Title: Army Techniques Publication ATP 6-02.75 Techniques for Communication Security May 2020, Author: United States Government Us Army
Title: 2600: The Hacker Digest - Volume 33, Author: 2600 Magazine
Title: Cybersecurity: Steps to Protect Our Critical Infrastructure, Author: United States Senate
Title: Anatomy of a cyberattack, Author: Mikko Niemelä
Title: Stealth Protocols - Using Phone to Create Feedback Loops in Closed Surveillance Systems, Author: innerfold
Explore Series
Title: We Need To Talk: 52 Weeks To Better Cyber-Security, Author: L. Brent Huston
Title: Wireless Hacking 101 (Come hackerare), Author: Karina Astudillo
Title: The Four Rs of Cybersecurity Resist. Restrict. Recover. Report.: The simplest step-by-step guide for CEOs, Board Directors & other non-geeks, Author: Scott Goldman
Title: Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security, Author: Rob Botwright
Title: Categorical Trust in Digitality, Author: Srinivas Kumar

Pagination Links