Title: Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy, Author: Ronald J. Deibert
Title: Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World, Author: Eric Cole
Title: Big Tech Tyrants: How Silicon Valley's Stealth Practices Addict Teens, Silence Speech, and Steal Your Privacy, Author: Floyd Brown
Title: The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer, Author: Perry Carpenter
Title: Surveillance Valley: The Secret Military History of the Internet, Author: Yasha Levine
Title: Certified CMMC Professional Handbook: Developed by CyberDI, Author: J. Gregory McVerry
Title: The Official (ISC)2 CISSP CBK Reference, Author: Arthur J. Deane
Title: Applied Cryptography: Protocols, Algorithms and Source Code in C, Author: Bruce Schneier
Title: The Art of Deception: Controlling the Human Element of Security, Author: Kevin D. Mitnick
Title: The Official (ISC)2 SSCP CBK Reference, Author: Mike Wills
Title: The Code of Honor: Embracing Ethics in Cybersecurity, Author: Paul J. Maurer
Title: The Official (ISC)2 CCSP CBK Reference, Author: Aaron Kraus
Title: Network Security: Private Communication in a Public World, Author: Charlie Kaufman
Title: Cyber Threat Intelligence, Author: Martin Lee
Title: The Cybersecurity Guide to Governance, Risk, and Compliance, Author: Jason Edwards
Title: The Complete Guide to Cybersecurity Risks and Controls, Author: Anne Kohnke
Title: Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD, Author: Ryan Russell
Title: Evidence-Based Cybersecurity: Foundations, Research, and Practice, Author: Pierre-Luc Pomerleau
Title: Secrets and Lies: Digital Security in a Networked World, Author: Bruce Schneier
Title: CISSP All-in-One Exam Guide, Seventh Edition, Author: Fernando Maymi

Pagination Links