Title: Big Tech Tyrants: How Silicon Valley's Stealth Practices Addict Teens, Silence Speech, and Steal Your Privacy, Author: Floyd Brown
Title: The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer, Author: Perry Carpenter
Title: Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy, Author: Ronald J. Deibert
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, Author: Eric Cole
Title: Surveillance Valley: The Secret Military History of the Internet, Author: Yasha Levine
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: The Art of Deception: Controlling the Human Element of Security, Author: Kevin D. Mitnick
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: Secrets and Lies: Digital Security in a Networked World, Author: Bruce Schneier
Title: The Official (ISC)2 SSCP CBK Reference, Author: Mike Wills
Title: Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach, Author: Jennifer L. Bayuk
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke
Title: CISSP All-in-One Exam Guide, Seventh Edition, Author: Fernando Maymi
Title: Edge Intelligence and Analytics for Internet of Things, Author: Govind P. Gupta
Title: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, Author: Bruce Schneier
Title: Zero Trust and Third-Party Risk: Reduce the Blast Radius, Author: Gregory C. Rasner
Title: Disseminating Security Updates at Internet Scale, Author: Jun Li
Title: Network Security: Private Communication in a Public World, Author: Charlie Kaufman

Pagination Links