Küberturvalisus

  1. Cybersecurity: The New Frontline in Protecting Our Digital Future
    Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
  2. Schneier on Security
    Schneier on Security Bruce Schneier
    4
  3. Liars and Outliers: Enabling the Trust that Society Needs to Thrive
    Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
    3.5
  4. Superintelligence on the Horizon: Steering the Course of Cybersecurity
    Superintelligence on the Horizon: Steering the Course of Cybersecurity Felipe Chavarro Polanía
  5. Data Management and Security in Blockchain Systems
    Data Management and Security in Blockchain Systems
  6. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  7. Security Automation with Python: Practical Python solutions for automating and scaling security operations
    Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
  8. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    3.5
  9. Cybersecurity Threats and Digital Safety: Protecting Yourself in a Connected World
    Cybersecurity Threats and Digital Safety: Protecting Yourself in a Connected World William Ubagan
  10. Securing Your Sanctuary: A Comprehensive Guide to Home Safety
    Securing Your Sanctuary: A Comprehensive Guide to Home Safety William Ubagan
  11. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice
    Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
  12. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework
    Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
  13. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security
    Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
  14. Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners
    Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners SIMON JEFFERSON
  15. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!"
    CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
  16. Guardians of the Digital Realm: Securing the Cyber Frontier, Strategies and Innovations in Protecting the Virtual World
    Guardians of the Digital Realm: Securing the Cyber Frontier, Strategies and Innovations in Protecting the Virtual World Ava Johnson
  17. Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily
    Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily Sam Washington
  18. Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques
    Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques Allister Banks
  19. Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities
    Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities Aditya K. Sood
  20. Ultimate AWS CDK for Infrastructure Automation
    Ultimate AWS CDK for Infrastructure Automation Anish Kumar
  21. Sitting Duck - The phone call you don't want to receive
    Sitting Duck - The phone call you don't want to receive Leigh Kefford
  22. Security and Cyber Laws Digital Defenders
    Security and Cyber Laws Digital Defenders Manish Soni
  23. Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses
    Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses Todd G. Shipley
  24. The Sovereign Illusion: Bridging Cryptic Codes and Catastrophic Markets
    The Sovereign Illusion: Bridging Cryptic Codes and Catastrophic Markets Elliot Monroe
  25. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
    Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  26. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions
    You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown
  27. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition)
    Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    5
  28. Cybersecurity - Data Protection and Strategies: First Edition
    Cybersecurity - Data Protection and Strategies: First Edition Wesley Palmer
  29. The Art of Deception: Controlling the Human Element of Security
    The Art of Deception: Controlling the Human Element of Security William L. Simon
    4
  30. PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms
    PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms Dr. Andrew Blyth
  31. Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques
    Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner
  32. Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR
    Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR Guven Boyraz
  33. RHCSA Red Hat Enterprise Linux 9: Comprehensive Mastery for Advanced System Administration and Certification Success
    RHCSA Red Hat Enterprise Linux 9: Comprehensive Mastery for Advanced System Administration and Certification Success Asghar Ghori
  34. Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking
    Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking John Anderson
  35. Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
    Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow
  36. Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World
    Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******
  37. Mastering Operating Systems: Comprehensive Guide to Overview, Administration, and Security
    Mastering Operating Systems: Comprehensive Guide to Overview, Administration, and Security Virversity Online Courses
  38. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity
    Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
  39. Cybersecurity Compliance: Navigating Frameworks, Standards & Regulations
    Cybersecurity Compliance: Navigating Frameworks, Standards & Regulations Virversity Online Courses
  40. The Developer's Playbook for Large Language Model Security: Building Secure AI Applications
    The Developer's Playbook for Large Language Model Security: Building Secure AI Applications Steve Wilson
    5
  41. Ethical Hacking for Beginners: A Beginner's Guide to Cybersecurity
    Ethical Hacking for Beginners: A Beginner's Guide to Cybersecurity Daniel Green
  42. Cyber Security for Beginners: Safeguarding Your Cyber Space
    Cyber Security for Beginners: Safeguarding Your Cyber Space Daniel Green
  43. Burners & Black Markets
    Burners & Black Markets Lance Henderson
  44. Ultimate Cilium and eBPF for Cloud Native Development
    Ultimate Cilium and eBPF for Cloud Native Development Gaurav Shekhar
  45. Social Engineering: The Art of Human Hacking
    Social Engineering: The Art of Human Hacking Christopher Hadnagy
    4.4
  46. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity
    Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
  47. Cybersecurity Compliance: Navigating Frameworks, Standards & Regulations
    Cybersecurity Compliance: Navigating Frameworks, Standards & Regulations Virversity Online Courses
  48. Network Security For Beginners: Strategies, Tactics, and Ethical Boundaries for Mastering Social Engineering
    Network Security For Beginners: Strategies, Tactics, and Ethical Boundaries for Mastering Social Engineering Daniel Green
    3
  49. Networking and Cybersecurity For Beginners: Strategies, Tools, and Tips for the Digital Age
    Networking and Cybersecurity For Beginners: Strategies, Tools, and Tips for the Digital Age Daniel Green
  50. Networking Fundamentals for Beginners: Comprehensive Guide to Understanding the World of Networks
    Networking Fundamentals for Beginners: Comprehensive Guide to Understanding the World of Networks Daniel Green