Ebook
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
byJoshua HoldenEbook
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
byJoshua HoldenEbook
Debugging: The 9 Indispensable Rules for Finding Even the Most Elusive Software and Hardware Problems
byDavid J. AGANSEbook
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
byTJ O'ConnorEbook
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
byJohnny LongEbook
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
byKevin D. MitnickEbook
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD
byJohnny LongEbook
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
byCraig P. BauerEbook
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
byJames C FosterEbook
Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool
byGabriele GiuseppiniEbook
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
byDmitry KorzunEbook
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
byPrabath SiriwardenaEbook
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
byTimo SteffensEbook
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
byBernard Peter RobichauEbook
Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS
byJames StevensonEbook
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk
byAndrew GoreckiEbook
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
byJessey BullockEbook
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817
byScott SelikoffEbook
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
byVinny TroiaEbook
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
byPerry CarpenterEbook
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
byMarcus J. CareyEbook
Cybersecurity Program Development for Business: The Essential Planning Guide
byChris MoschovitisEbook
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
byNick FurneauxEbook
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
byMatthew HickeyEbook
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
byMarcus J. CareyEbook
The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
byPhil QuadeEbook
Developing Applications with Azure Active Directory: Principles of Authentication and Authorization for Architects and Developers
byManas MayankEbook
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
byAbhijit MohantaEbook
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
byEric C. ThompsonEbook
Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0
byYvonne WilsonEbook
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
byMorey J. HaberEbook
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
byAbhishek ChopraEbook
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
byJon WestfallEbook
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
byCarey ParkerEbook
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data
byVasantha LakshmiEbook
Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
byMarius Iulian MihailescuEbook
Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events
byEric C. ThompsonEbook
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
byNihad A. HassanEbook
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
byAaron Roberts