Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: HACKING WITH KALI LINUX PENETRATION TESTING: Mastering Ethical Hacking Techniques with Kali Linux (2024 Guide for Beginners), Author: BARBARA HEATH
Title: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Author: Kim Zetter
Title: Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security, Author: Richard Dorsel
Title: Penetration Testing for Jobseekers: Perform Ethical Hacking across Web Apps, Networks, Mobile Devices using Kali Linux, Burp Suite, MobSF, and Metasploit, Author: Debasish Mandal
Title: Change the Box: A Guide to Dream, Incubate, and Scale Your Innovations, Author: John Spencer-Taylor
Title: Cybersecurity for Everyone: Securing your home or small business network, Author: Terence L. Sadler
Title: Cryptography: A Very Short Introduction, Author: Sean Murphy
Title: Bits and Bullets: Cyber Warfare in Military Operations - Framework for Military Planners to Envision Ways Cyberspace Can Impact the Battlefield, Hypothetical Conflict in Korea as Thought Experiment, Author: Progressive Management
Title: Montefeltro Conspiracy: A Renaissance Mystery Decoded, Author: Marcello Simonetta
Title: Pentest+ Exam Pass: Penetration Testing And Vulnerability Management For Cybersecurity Professionals, Author: Rob Botwright
Title: Cryptography: A Very Short Introduction, Author: Fred Piper
Title: 100 mandaciertos para dominar la tecnología (y no ella a ti), Author: Laura Sánchez Gutiérrez
Title: Recruiting the Cyber Leader: An Evaluation of the Human Resource Model Used for Recruiting the Army's Cyber Operations Officer - Recommendations for This Fast-Paced Operational Environment, Author: Progressive Management
Title: An Online Guide For Basic PC Users, Author: Jeremy Schaefer
Title: No Domain: The John McAfee Tapes, Author: Mark Eglinton
Title: OPAQUE: Secure Passwords Never Leave Your Device, Author: Tony Gaitatzis
Title: The Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices, Author: Emily Foster
Title: Grundlagen und Anwendung von Information Security Awareness: Mitarbeiter zielgerichtet f�r Informationssicherheit sensibilisieren, Author: Kristin Weber
Title: CBSA Certified Blockchain Solution Architect Exam Practice Test and Dumps CBSA Blockchain Exam Guidebook Updated Questions, Author: Byte Books

Pagination Links