Kyberturvallisuus

  1. Seuraaja Corine Hartman
    3.9
  2. Internet Mikko Hyppönen
    4.6
  3. Kaikki saa tietää Meri Auer
    3.8
  4. Mitä some tekee meille? Suvi Uski
    4.1
  5. Jos kerrot tästä, tapan sinut Leone Milton
    3.5
  6. Inferno.fi Taavi Soininvaara
    3.8
  7. Suomen tulevaisuudet: Suuret kysymykset ja vastaukset Jarno Limnéll
    3.7
  8. Certified Information Security Manager CISM Study Guide Mike Chapple, PhD, CISM
  9. RMF ISSO: Foundations (Guide): NIST 800 Risk Management Framework For Cybersecurity Professionals Brown Brown
    5
  10. Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
  11. Schneier on Security Bruce Schneier
    4
  12. Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
    3.5
  13. Superintelligence on the Horizon: Steering the Course of Cybersecurity Felipe Chavarro Polanía
  14. Desconexión Digital y Seguridad Informática en el Trabajo María Dolores Pérez Rodríguez
  15. Sistemas de Gestión de Seguridad de la Información (Iso 27001:2022) José Manuel Cortés
  16. Data Management and Security in Blockchain Systems
  17. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  18. Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
  19. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    3.5
  20. Cybersecurity Threats and Digital Safety: Protecting Yourself in a Connected World William Ubagan
  21. Securing Your Sanctuary: A Comprehensive Guide to Home Safety William Ubagan
  22. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
  23. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
  24. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
  25. Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners SIMON JEFFERSON
  26. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
  27. Guardians of the Digital Realm: Securing the Cyber Frontier: Strategies and Innovations in Protecting the Virtual World Ava Johnson
  28. CompTIA Secrets: Unlock Your Security Success Today: "Achieve CompTIA success! Access captivating audio lessons crafted for peak exam results today!" Harris Penrose
  29. Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily Sam Washington
  30. Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques Allister Banks
  31. Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities Aditya K. Sood
  32. Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingeniería Social Quinn Kiser
  33. Ultimate AWS CDK for Infrastructure Automation Anish Kumar
  34. Cloud Security in der Praxis: Leitfaden für sicheres Softwaredesign und Deployment Chris Dotson
  35. Sitting Duck - The phone call you don't want to receive Leigh Kefford
  36. Security and Cyber Laws Digital Defenders Manish Soni
  37. Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses Todd G. Shipley
  38. The Sovereign Illusion: Bridging Cryptic Codes and Catastrophic Markets Elliot Monroe
  39. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  40. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown
  41. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
  42. Cybersecurity - Data Protection and Strategies: First Edition Wesley Palmer
  43. The Art of Deception: Controlling the Human Element of Security William L. Simon
    4
  44. PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms Dr. Andrew Blyth
  45. Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner
  46. Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR Guven Boyraz
  47. RHCSA Red Hat Enterprise Linux 9: Comprehensive Mastery for Advanced System Administration and Certification Success Asghar Ghori
  48. Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking John Anderson
  49. Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow
  50. Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******