Security
Trending titles
The most talked-about and well-loved Security titles this month.
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption Rating: 0 out of 5 stars0 ratingsBlockchain For Dummies Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Stealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know Rating: 4 out of 5 stars4/5Identity Management: A Primer Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 4 out of 5 stars4/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Rating: 5 out of 5 stars5/5Worm: The First Digital World War Rating: 3 out of 5 stars3/5No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Rating: 4 out of 5 stars4/5Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Rating: 4 out of 5 stars4/5The Perfect Weapon: war, sabotage, and fear in the cyber age Rating: 4 out of 5 stars4/5Buffer Overflow Attacks: Detect, Exploit, Prevent Rating: 4 out of 5 stars4/5Schneier on Security Rating: 4 out of 5 stars4/5Blockchain and the Law: The Rule of Code Rating: 4 out of 5 stars4/5Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Liars and Outliers: Enabling the Trust that Society Needs to Thrive Rating: 4 out of 5 stars4/5Web of Deception: Misinformation on the Internet Rating: 4 out of 5 stars4/5Digital Forensics with Open Source Tools Rating: 3 out of 5 stars3/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction Rating: 5 out of 5 stars5/5
Everything About Security
Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsCISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5How Not To Use Your Smartphone Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsDestination CISSP Rating: 3 out of 5 stars3/5HackerTools Crack With Disassembling Rating: 2 out of 5 stars2/5The Wires of War: Technology and the Global Struggle for Power Rating: 5 out of 5 stars5/5Mobile Forensics – Advanced Investigative Strategies Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratingsCISM Certified Information Security Manager Study Guide Rating: 0 out of 5 stars0 ratingsCybersecurity Blue Team Toolkit Rating: 2 out of 5 stars2/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Risk Management and ISO 31000: A pocket guide Rating: 0 out of 5 stars0 ratingsApple Card and Apple Pay: A Ridiculously Simple Guide to Mobile Payments Rating: 0 out of 5 stars0 ratings
Others you might like
From classic favorites to brand new hits, it’s all here for you to discover.
Recently Added
Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsBitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Rating: 4 out of 5 stars4/5HACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 3 BOOKS IN 1 Rating: 0 out of 5 stars0 ratingsCYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5OSINT 101 Handbook: Expert-Level Intelligence Gathering: Advanced Reconnaissance, Threat Assessment, And Counterintelligence Rating: 0 out of 5 stars0 ratingsHacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 0 out of 5 stars0 ratingsHACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5Trojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Rating: 0 out of 5 stars0 ratingsCRISC Exam - Study Guide Rating: 0 out of 5 stars0 ratingsCryptography And Computer Science: Design Manual For Algorithms, Codes And Ciphers Rating: 0 out of 5 stars0 ratingsKali Linux CLI Boss: Novice To Command Line Maestro Rating: 0 out of 5 stars0 ratingsSummary of Andy Greenberg's Sandworm Rating: 4 out of 5 stars4/5Advanced OSINT Strategies: Online Investigations And Intelligence Gathering Rating: 0 out of 5 stars0 ratingsComputer Science 2.0 Beginners Crash Course - Python, Javascript, Cyber Security And Algorithms Rating: 0 out of 5 stars0 ratings
There’s more to discover in Security
Escape into new titles and new adventures.
Advanced OSINT Strategies: Online Investigations And Intelligence Gathering Rating: 0 out of 5 stars0 ratingsCybersecurity Handbook for Small to Mid-size Businesses Rating: 0 out of 5 stars0 ratingsTor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Mastering Secure Java Applications: Navigating security in cloud and microservices for Java (English Edition) Rating: 0 out of 5 stars0 ratingsBitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Rating: 4 out of 5 stars4/5Ethical Hacking for Beginners: Comprehensive Introduction to the World of Cybersecurity Rating: 0 out of 5 stars0 ratingsKey Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World Rating: 0 out of 5 stars0 ratingsSummary of Andy Greenberg's Sandworm Rating: 4 out of 5 stars4/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Pentesting 101: Cracking Gadgets And Hacking Software Rating: 0 out of 5 stars0 ratingsHacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 0 out of 5 stars0 ratingsCCSP Certified Cloud Security Professional A Step by Step Study Guide to Ace the Exam Rating: 0 out of 5 stars0 ratingsOSINT 101 Handbook: Expert-Level Intelligence Gathering: Advanced Reconnaissance, Threat Assessment, And Counterintelligence Rating: 0 out of 5 stars0 ratingsCryptography And Computer Science: Design Manual For Algorithms, Codes And Ciphers Rating: 0 out of 5 stars0 ratingsKali Linux CLI Boss: Novice To Command Line Maestro Rating: 0 out of 5 stars0 ratingsCISA Exam Prep 550+ Practice Questions: 1st Edition - 2024 Rating: 0 out of 5 stars0 ratingsCyber War: The Next Threat to National Security and What to Do About It Rating: 4 out of 5 stars4/5HACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 3 BOOKS IN 1 Rating: 0 out of 5 stars0 ratingsHACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5Malware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsDigital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsThe Smartest Person in the Room Rating: 5 out of 5 stars5/5BEYOND CHECKBOXES Rating: 0 out of 5 stars0 ratingsBurners and Black Markets: How to Be Invisible on Android, Blackberry & Iphone Rating: 5 out of 5 stars5/5Computer Science 2.0 Beginners Crash Course - Python, Javascript, Cyber Security And Algorithms Rating: 0 out of 5 stars0 ratingsXRP: The Future of Crypto Currency Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cybersecurity and Ethical Hacking: Exploring the Dark Art of Ethical Hacking and Penetration Testing Rating: 0 out of 5 stars0 ratingsCybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsDarknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Hack Your Way to Security Bundle, 2 in 1 Bundle Rating: 0 out of 5 stars0 ratingsPenetration Testing Fundamentals -1: Penetration Testing Study Guide To Breaking Into Systems Rating: 0 out of 5 stars0 ratingsRed Team Operations: Attack: Black Box Hacking, Social Engineering & Web App Scanning Rating: 5 out of 5 stars5/5CHFI Computer Hacking Forensic Investigator The Ultimate Study Guide to Ace the Exam Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals Explained Rating: 0 out of 5 stars0 ratingsInvesting in Binance Coin: The Future of Cryptocurrency Rating: 0 out of 5 stars0 ratingsCRISC Exam - Study Guide Rating: 0 out of 5 stars0 ratingsBitcoin For Beginners: Bitcoin, Bitcoin Mining, Cryptography And The Cypherpunk Movement | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsAzure Networking: Command Line Mastery From Beginner To Architect Rating: 0 out of 5 stars0 ratingsOWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks Rating: 0 out of 5 stars0 ratingsSummary of Bruce Sterling's The Hacker Crackdown Law and Disorder on the Electronic Frontier Rating: 0 out of 5 stars0 ratingsCybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity Rating: 5 out of 5 stars5/5Red Team Operations: Black Box Hacking, Social Engineering & Web App Scanning Rating: 0 out of 5 stars0 ratingsMind Hacking for Self-Mastery Rating: 5 out of 5 stars5/5BEYOND BITCOIN INVESTING: Why other cryptocurrencies are so important and easy to make digital cash now Rating: 0 out of 5 stars0 ratingsITF+ CompTIA IT Fundamentals A Step by Step Study Guide to Practice Test Questions With Answers and Master the Exam Rating: 0 out of 5 stars0 ratingsThe Tao of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Rating: 0 out of 5 stars0 ratingsTrojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Rating: 0 out of 5 stars0 ratingsWireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark Rating: 0 out of 5 stars0 ratingsHacking for Beginners Rating: 5 out of 5 stars5/5Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsCyberSecure™: An Essential Guide to Protecting Your Digital World Rating: 0 out of 5 stars0 ratingsPenetration Testing Fundamentals-2: Penetration Testing Study Guide To Breaking Into Systems Rating: 0 out of 5 stars0 ratingsBlockchain for Kids, Teens, Adults, and Dummies: Introduction to Crypto Investing and Blockchain Technology in Simple Words Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5KALI LINUX: Mastering the Art of Ethical Hacking and Penetration Testing (2023 Guide) Rating: 0 out of 5 stars0 ratingsNIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsHacking Wireless With Kali Linux: Learn Fast How To Penetrate Any Wireless Network | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsBlockchain: Everything You Need to Know About Blockchain Rating: 5 out of 5 stars5/5Cloud Computing im Kleinbetrieb - Ein Leitfaden für KMU und Start Ups Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 5 out of 5 stars5/5The Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Rating: 0 out of 5 stars0 ratingsSatoshi's Legacy: A Journey Through Bitcoin's White Paper: From Genesis to the Future of Digital Gold Rating: 0 out of 5 stars0 ratingsIn Depth Guide to IS-IS Routing: Learn Intermediate System to Intermediate System Routing from scratch Rating: 0 out of 5 stars0 ratingsDistributed Ledger Technology Rating: 0 out of 5 stars0 ratingsMonero (XMR): The Unseen World of Cryptocurrency Rating: 0 out of 5 stars0 ratingsZero Trust Security: Building Cyber Resilience & Robust Security Postures Rating: 0 out of 5 stars0 ratingsThe Dark Side of A.I: 7 Ways To Protect Yourself From A.I. Frauds Rating: 0 out of 5 stars0 ratingsBug Hunting 101: Novice To Virtuoso: Web Application Security For Ethical Hackers Rating: 0 out of 5 stars0 ratingsThe Missing Training Manual Rating: 0 out of 5 stars0 ratingsBlockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5NIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 0 out of 5 stars0 ratingsThe GPT-4 Crypto Revolution: Pioneering Profit in a Digital Age Rating: 0 out of 5 stars0 ratingsGovernance of Enterprise IT based on COBIT 5: A Management Guide Rating: 0 out of 5 stars0 ratingsAZURE AZ 500 STUDY GUIDE-1: Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500 Rating: 0 out of 5 stars0 ratingsLitecoin: The Dark Horse of Digital Currency Rating: 0 out of 5 stars0 ratingsHOW TO IMPLEMENT ARTIFICIAL INTELLIGENCE AND CYBERSECURITY IN MODERN BUSINESSES: BASICS AND GUIDES FOR DUMMIES AND BEGINNERS Rating: 0 out of 5 stars0 ratingsCardano (ADA): The Revolution in Cryptocurrency Rating: 0 out of 5 stars0 ratingsReconnaissance 101: Footprinting & Information Gathering: Ethical Hackers Bible To Collect Data About Target Systems Rating: 0 out of 5 stars0 ratingsFighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Rating: 0 out of 5 stars0 ratingsCryptocurrency Trading Guide : From Novice to Pro Trader: A Comprehensive Guide to Successful Cryptocurrency Trading Rating: 0 out of 5 stars0 ratingsMalware Reverse Engineering: Cracking The Code Rating: 0 out of 5 stars0 ratingsGray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratingsThe CISO Perspective: Understand the importance of the CISO in the cyber threat landscape Rating: 0 out of 5 stars0 ratingsCYBER SECURITY HANDBOOK Part-2: Lock, Stock, and Cyber: A Comprehensive Security Handbook Rating: 0 out of 5 stars0 ratingsCompTIA Linux+ Study Guide: Exam XK0-005 Rating: 0 out of 5 stars0 ratingsBlue Team Operations: Operatonal Security, Incident Response & Digital Forensics Rating: 0 out of 5 stars0 ratingsC++ Networking 101: Unlocking Sockets, Protocols, VPNs, and Asynchronous I/O with 75+ sample programs Rating: 0 out of 5 stars0 ratingsHACKING WITH KALI LINUX WIRELESS PENETRATION Rating: 0 out of 5 stars0 ratingsBlueprints of DevSecOps: Foundations to Fortify Your Cloud Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5HACKING WITH KALI LINUX PENETRATION TESTING: Mastering Ethical Hacking Techniques with Kali Linux (2024 Guide for Beginners) Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsCryptography And Computer Science: Design Manual For Algorithms, Codes And Ciphers Rating: 0 out of 5 stars0 ratingsBuilding a Cyber Risk Management Program: Evolving Security for the Digital Age Rating: 0 out of 5 stars0 ratingsCyber Wargaming: Research and Education for Security in a Dangerous Digital World Rating: 0 out of 5 stars0 ratingsTrojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratingsAmerica the Vulnerable: How Our Government is Failing to Protect Us Against Terrorism Rating: 3 out of 5 stars3/5GRC Chronicles Rating: 0 out of 5 stars0 ratingsISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5The 5% Profit Crypto Trading Strategy Rating: 0 out of 5 stars0 ratingsAlice and Bob Learn Application Security Rating: 5 out of 5 stars5/5See Yourself in Cyber: Security Careers Beyond Hacking Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Tests: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsKali Linux, Ethical Hacking And Pen Testing For Beginners Rating: 0 out of 5 stars0 ratingsCryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Deep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsCompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Rating: 0 out of 5 stars0 ratingsSoftware Transparency: Supply Chain Security in an Era of a Software-Driven Society Rating: 0 out of 5 stars0 ratingsUltimate Splunk for Cybersecurity Rating: 0 out of 5 stars0 ratingsThe Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5CompTIA CySA+ Certification The Ultimate Study Guide to Practice Questions With Answers and Master the Cybersecurity Analyst Exam Rating: 0 out of 5 stars0 ratingsNetwork And Security Fundamentals For Ethical Hackers: Advanced Network Protocols, Attacks, And Defenses Rating: 0 out of 5 stars0 ratingsThe DevSecOps Playbook: Deliver Continuous Security at Speed Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners 2024 Rating: 0 out of 5 stars0 ratingsComputer Networking: Enterprise Network Infrastructure, Network Security & Network Troubleshooting Fundamentals Rating: 0 out of 5 stars0 ratingsA Comprehensive Framework for Adapting National Intelligence for Domestic Law Enforcement Rating: 0 out of 5 stars0 ratingsHidemyacc - How to Hide Your Online Accounts A Step-by-Step Guide to Protecting Your Digital Identity Rating: 0 out of 5 stars0 ratingsISO 27001/ISO 27002: A guide to information security management systems Rating: 0 out of 5 stars0 ratingsCISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5The Backlash: Right-Wing Radicals, High-Def Hucksters, and Paranoid Politics in the Age of Obama Rating: 0 out of 5 stars0 ratingsIf It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5PCI DSS Version 4.0: A guide to the payment card industry data security standard Rating: 0 out of 5 stars0 ratingsOSCP Offensive Security Certified Professional Practice Tests With Answers To Pass the OSCP Ethical Hacking Certification Exam Rating: 0 out of 5 stars0 ratingsThe Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Rating: 0 out of 5 stars0 ratingsHands-On Kubernetes, Service Mesh and Zero-Trust: Build and manage secure applications using Kubernetes and Istio (English Edition) Rating: 0 out of 5 stars0 ratingsCCSP For Dummies: Book + 2 Practice Tests + 100 Flashcards Online Rating: 0 out of 5 stars0 ratingsWeb of Deception Unraveling Cyber Espionage World Rating: 0 out of 5 stars0 ratingsZero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know Rating: 4 out of 5 stars4/5Python for Cybersecurity Cookbook: 80+ practical recipes for detecting, defending, and responding to Cyber threats (English Edition) Rating: 0 out of 5 stars0 ratingsLEARN MPLS FROM SCRATCH PART-A: A Beginner's Guide to Next Level of Networking Rating: 0 out of 5 stars0 ratingsThe Language of Deception: Weaponizing Next Generation AI Rating: 0 out of 5 stars0 ratingsThe Dark Web: The Unseen Side of the Internet Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsCybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Become An Ethical Hacker That Can Hack Computer Systems And Secure Them Like Security Experts Rating: 0 out of 5 stars0 ratingsCompTIA PenTest+ Certification The Ultimate Study Guide to Practice Tests, Preparation and Ace the Exam Rating: 0 out of 5 stars0 ratingsCybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCloud Security For Dummies Rating: 5 out of 5 stars5/5Cryptocurrency Trading Guide : Mastering the Cryptocurrency Market: Techniques and Tactics for Profitable Trading Rating: 0 out of 5 stars0 ratingsThe DevSecOps Playbook: Deliver Continuous Security at Speed Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing with Kali Linux: Unlocking industry-oriented VAPT tactics (English Edition) Rating: 0 out of 5 stars0 ratingsCybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications Rating: 0 out of 5 stars0 ratingsSecure Intelligent Machines: Protecting AI from Cyberattack Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Computer Networking: Beginners Guide to Network Security & Network Troubleshooting Fundamentals Rating: 0 out of 5 stars0 ratingsCertified Information Security Manager CISM Study Guide Rating: 5 out of 5 stars5/5(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Study Guide: Exam CS0-003 Rating: 0 out of 5 stars0 ratingsHack the Airwaves: Advanced BLE Exploitation Techniques Rating: 0 out of 5 stars0 ratingsUltimate Web Authentication Handbook Rating: 0 out of 5 stars0 ratingsCybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Build Your Own Blockchain In JS Rating: 5 out of 5 stars5/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5Practical Fraud Prevention: Fraud and AML Analytics for Fintech and eCommerce, Using SQL and Python Rating: 0 out of 5 stars0 ratingsThreats: What Every Engineer Should Learn From Star Wars Rating: 5 out of 5 stars5/5How I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Blockchain: The Insights You Need from Harvard Business Review Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Security Awareness For Dummies Rating: 5 out of 5 stars5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Rating: 5 out of 5 stars5/5The CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsCyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Cyber War: The Next Threat to National Security and What to Do About It Rating: 3 out of 5 stars3/5Sql : The Ultimate Beginner to Advanced Guide To Master SQL Quickly with Step-by-Step Practical Examples Rating: 0 out of 5 stars0 ratingsThe Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Liars and Outliers: Enabling the Trust that Society Needs to Thrive Rating: 4 out of 5 stars4/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsInvestigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Rating: 5 out of 5 stars5/5The Active Defender: Immersion in the Offensive Security Mindset Rating: 0 out of 5 stars0 ratingsYou CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsMaster The Configuration Of Apache Tomcat On Linux Rating: 0 out of 5 stars0 ratingsProject Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION Rating: 3 out of 5 stars3/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5The Real Business of Blockchain: How Leaders Can Create Value in a New Digital Age Rating: 5 out of 5 stars5/5Blockchain and the Law: The Rule of Code Rating: 4 out of 5 stars4/5Linux - a Secure Personal Computer for Beginners Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5Blockchain For Dummies Rating: 5 out of 5 stars5/5Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsNavigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Cryptography: A Very Short Introduction Rating: 5 out of 5 stars5/5Mastering Applied Observability: Empowering Your Business with Continuous Insights Rating: 0 out of 5 stars0 ratingsOperational Technology: A Holistic View Rating: 0 out of 5 stars0 ratingsCybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Breached!: Why Data Security Law Fails and How to Improve It: 1st Edition Rating: 5 out of 5 stars5/5Cybersecurity For Beginners: Learn How To Defend Against Online Threats Rating: 0 out of 5 stars0 ratingsHackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5The Hidden History of Code-Breaking: The Secret World of Cyphers, Uncrackable Codes, and Elusive Encryptions Rating: 0 out of 5 stars0 ratingsCloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Rating: 5 out of 5 stars5/5Certified Ethical Hacker (CEH) Rating: 0 out of 5 stars0 ratingsSchneier on Security Rating: 4 out of 5 stars4/5Navigating Networks: A Comprehensive Guide to IPv4 Addressing for Tech Enthusiasts, CCNA Candidates, and Networking Professionals Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Rating: 5 out of 5 stars5/5C++ Networking 101 Rating: 0 out of 5 stars0 ratingsExploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5The Secret Life: Three True Stories of the Digital Age Rating: 3 out of 5 stars3/5Ransomware Protection Playbook Rating: 5 out of 5 stars5/5Understanding Blockchain Rating: 0 out of 5 stars0 ratingsOperational Technology: The Beginner's Guide Rating: 0 out of 5 stars0 ratingsCloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 0 out of 5 stars0 ratingsPractical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Comprehensive Guide to Personal Cybersecurity: Personal Cybersecurity Practices for a Safer Digital Life Rating: 0 out of 5 stars0 ratingsDefending the Digital Perimeter: Network Security Audit Readiness Strategies Rating: 0 out of 5 stars0 ratingsDecrypting Money: A Comprehensive Introduction to Bitcoin Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-003 Rating: 1 out of 5 stars1/5Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Rating: 4 out of 5 stars4/5The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation Rating: 0 out of 5 stars0 ratingsManaging Modern Security Operations Center & Building Perfect Career as SOC Analyst Rating: 0 out of 5 stars0 ratingsWireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise Rating: 0 out of 5 stars0 ratingsThrough the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 0 out of 5 stars0 ratingsMulti-Cloud Administration Guide: Manage and optimize cloud resources across Azure, AWS, GCP, and Alibaba Cloud (English Edition) Rating: 0 out of 5 stars0 ratingsCyber Guardians: Empowering Board Members for Effective Cybersecurity Rating: 0 out of 5 stars0 ratingsA Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5APIs Unlocked Rating: 0 out of 5 stars0 ratingsMobile Security Fundamentals: A Guide for CompTIA Security+ 601 Exam Rating: 0 out of 5 stars0 ratingsHardware Security: A Hands-on Learning Approach Rating: 0 out of 5 stars0 ratingsThe Hacker's Zibaldone Rating: 0 out of 5 stars0 ratingsSet Up Your Own IPsec VPN, OpenVPN and WireGuard Server: Build Your Own VPN Rating: 5 out of 5 stars5/5Cybersecurity for Remote Workers Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsPrivacy-Preserving Machine Learning Rating: 0 out of 5 stars0 ratingsRetail Security: Strategies and Solutions for Safeguarding Your Business Rating: 0 out of 5 stars0 ratingsCybersecurity Jobs 3- in-1 Value Bundle: Resume, Career Paths, and Work From Home Rating: 0 out of 5 stars0 ratingsMaking Money with Email Marketing: Strategies for Success Rating: 0 out of 5 stars0 ratingsThreat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks Rating: 0 out of 5 stars0 ratingsCryptology for Beginners #1 Guide for Security, Encryption, Crypto, Algorithms and Python Rating: 0 out of 5 stars0 ratingsMastering Go Network Automation: Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter Rating: 0 out of 5 stars0 ratingsMitigating Supply Chain Attacks in the Digital Age Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity: A Project Management Approach Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Lawyers Rating: 0 out of 5 stars0 ratingsPayment Card Industry Professional: PCIP 3.0 Rating: 0 out of 5 stars0 ratingsInternet Basics: Everything You Need to Know Rating: 0 out of 5 stars0 ratingsThreats: What Every Engineer Should Learn From Star Wars Rating: 0 out of 5 stars0 ratingsHow I Rob Banks: And Other Such Places Rating: 0 out of 5 stars0 ratings
Read what you want, how you want
Discover millions of ebooks, audiobooks, podcasts, and so much more with a free trial.
Only $11.99/month after trial. Cancel anytime.