Kyberturvallisuus

  1. Inferno.fi
    Inferno.fi Taavi Soininvaara
    3.8
  2. Seuraaja
    Seuraaja Corine Hartman
    3.9
  3. Verkkorikokset
    Verkkorikokset Ari Haasio
    3.3
  4. Internet
    Internet Mikko Hyppönen
    4.6
  5. Yliote
    Yliote Signe Svensson
    3.5
  6. Jos kerrot tästä, tapan sinut
    Jos kerrot tästä, tapan sinut Leone Milton
    3.5
  7. 10 syytä tuhota kaikki sometilit nyt
    10 syytä tuhota kaikki sometilit nyt Jaron Lanier
    3.7
  8. NIST CSF 2.0: Your essential introduction to managing cybersecurity risks
    NIST CSF 2.0: Your essential introduction to managing cybersecurity risks Andrew Pattison
    4
  9. Digiajan tietosuoja: Turvaa henkilötietosi, torju identiteettivarkaudet ja suojaudu urkinnalta
    Digiajan tietosuoja: Turvaa henkilötietosi, torju identiteettivarkaudet ja suojaudu urkinnalta Petteri Järvinen
    4.3
  10. If It's Smart, It's Vulnerable
    If It's Smart, It's Vulnerable Mikko Hypponen
    4.2
  11. Hackers & Painters: Big Ideas from the Computer Age
    Hackers & Painters: Big Ideas from the Computer Age Paul Graham
    4.3
  12. Pahan päivän varalle
    Pahan päivän varalle Mari Koistinen
    3.8
  13. Mitä some tekee meille?
    Mitä some tekee meille? Suvi Uski
    4.1
  14. Kaikki saa tietää
    Kaikki saa tietää Meri Auer
    3.7
  15. This is For Everyone: The Captivating Memoir from the Inventor of the World Wide Web
    This is For Everyone: The Captivating Memoir from the Inventor of the World Wide Web Tim Berners-Lee
    5
  16. Uhka pilvistä
    Uhka pilvistä Clive Cussler
    3.7
  17. Cybersecurity: The New Frontline in Protecting Our Digital Future
    Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
  18. Schneier on Security
    Schneier on Security Bruce Schneier
    4
  19. Liars and Outliers: Enabling the Trust that Society Needs to Thrive
    Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
    3.5
  20. Superintelligence on the Horizon: Steering the Course of Cybersecurity
    Superintelligence on the Horizon: Steering the Course of Cybersecurity Felipe Chavarro Polanía
  21. Desconexión Digital y Seguridad Informática en el Trabajo
    Desconexión Digital y Seguridad Informática en el Trabajo María Dolores Pérez Rodríguez
  22. Sistemas de Gestión de Seguridad de la Información (Iso 27001:2022)
    Sistemas de Gestión de Seguridad de la Información (Iso 27001:2022) José Manuel Cortés
  23. Data Management and Security in Blockchain Systems
    Data Management and Security in Blockchain Systems
  24. Tor and the Dark Art of Anonymity
    Tor and the Dark Art of Anonymity Lance Henderson
  25. Burners and Black Markets: Opsec for the Next Generation
    Burners and Black Markets: Opsec for the Next Generation Lance Henderson
  26. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  27. Security Automation with Python: Practical Python solutions for automating and scaling security operations
    Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
  28. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    3.5
  29. Cybersecurity Threats and Digital Safety: Protecting Yourself in a Connected World
    Cybersecurity Threats and Digital Safety: Protecting Yourself in a Connected World William Ubagan
  30. Securing Your Sanctuary: A Comprehensive Guide to Home Safety
    Securing Your Sanctuary: A Comprehensive Guide to Home Safety William Ubagan
  31. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice
    Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
  32. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework
    Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
  33. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security
    Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
  34. Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners
    Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners SIMON JEFFERSON
  35. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!"
    CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
  36. Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily
    Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily Sam Washington
  37. Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques
    Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques Allister Banks
  38. Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities
    Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities Aditya K. Sood
  39. Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingeniería Social
    Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingeniería Social Quinn Kiser
  40. Ultimate AWS CDK for Infrastructure Automation
    Ultimate AWS CDK for Infrastructure Automation Anish Kumar
  41. Cloud Security in der Praxis: Leitfaden für sicheres Softwaredesign und Deployment
    Cloud Security in der Praxis: Leitfaden für sicheres Softwaredesign und Deployment Chris Dotson
  42. Sitting Duck - The phone call you don't want to receive
    Sitting Duck - The phone call you don't want to receive Leigh Kefford
  43. Security and Cyber Laws Digital Defenders
    Security and Cyber Laws Digital Defenders Manish Soni
  44. Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses
    Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses Todd G. Shipley
  45. The Sovereign Illusion: Bridging Cryptic Codes and Catastrophic Markets
    The Sovereign Illusion: Bridging Cryptic Codes and Catastrophic Markets Elliot Monroe
  46. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
    Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  47. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions
    You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown
  48. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition)
    Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    4.5
  49. Cybersecurity - Data Protection and Strategies: First Edition
    Cybersecurity - Data Protection and Strategies: First Edition Wesley Palmer
  50. The Art of Deception: Controlling the Human Element of Security
    The Art of Deception: Controlling the Human Element of Security William L. Simon
    4.1