1. Guía De Hacking De Computadora Para Principiantes: Cómo Hackear Una Red Inalámbrica Seguridad Básica Y Pruebas De Penetración Kali Linux Su Primer Hack Alan T. Norman
    4.5
  2. Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
  3. Schneier on Security Bruce Schneier
    4
  4. Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
    3.5
  5. Segurança em front-end: Estratégias para mitigar ataques e proteger suas aplicações Antonio Luis Rossi
  6. How to Beat Scammers Nick Stapleton
  7. Superintelligence on the Horizon: Steering the Course of Cybersecurity Felipe Chavarro Polanía
  8. Desconexión Digital y Seguridad Informática en el Trabajo María Dolores Pérez Rodríguez
  9. Sistemas de Gestión de Seguridad de la Información (Iso 27001:2022) José Manuel Cortés
  10. Data Management and Security in Blockchain Systems
  11. Técnicas de invasão de sistemas pentest: práticas detalhadas de hacker ético para os novos profissionais do mercado César Felipe Gonçalves da Silva
  12. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  13. Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
  14. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    3.5
  15. Cybersecurity Threats and Digital Safety: Protecting Yourself in a Connected World William Ubagan
  16. Securing Your Sanctuary: A Comprehensive Guide to Home Safety William Ubagan
  17. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
  18. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
  19. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
  20. Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners SIMON JEFFERSON
  21. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
  22. Guardians of the Digital Realm: Securing the Cyber Frontier: Strategies and Innovations in Protecting the Virtual World Ava Johnson
  23. CompTIA Secrets: Unlock Your Security Success Today: "Achieve CompTIA success! Access captivating audio lessons crafted for peak exam results today!" Harris Penrose
  24. Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily Sam Washington
  25. Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques Allister Banks
  26. The Mysterious Mr. Nakamoto: A 15-Year Quest for the Secret Genius Behind Crypto Benjamin Wallace
  27. Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities Aditya K. Sood
  28. Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingeniería Social Quinn Kiser
  29. Ultimate AWS CDK for Infrastructure Automation Anish Kumar
  30. Cloud Security in der Praxis: Leitfaden für sicheres Softwaredesign und Deployment Chris Dotson
  31. Sitting Duck - The phone call you don't want to receive Leigh Kefford
  32. Security and Cyber Laws Digital Defenders Manish Soni
  33. Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses Todd G. Shipley
  34. The Sovereign Illusion: Bridging Cryptic Codes and Catastrophic Markets Elliot Monroe
  35. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  36. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown
  37. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    5
  38. Cybersecurity - Data Protection and Strategies: First Edition Wesley Palmer
  39. The Art of Deception: Controlling the Human Element of Security William L. Simon
    4
  40. PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms Dr. Andrew Blyth
  41. Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner
  42. Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR Guven Boyraz
  43. RHCSA Red Hat Enterprise Linux 9: Comprehensive Mastery for Advanced System Administration and Certification Success Asghar Ghori
  44. Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking John Anderson
  45. Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow
  46. Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******
  47. Mastering Operating Systems: Comprehensive Guide to Overview, Administration, and Security Virversity Online Courses
  48. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
  49. Cybersecurity Compliance: Navigating Frameworks, Standards & Regulations Virversity Online Courses
  50. The Developer's Playbook for Large Language Model Security: Building Secure AI Applications Steve Wilson