Cybersecurity

  1. Cybersecurity: The New Frontline in Protecting Our Digital Future
    Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
    0
  2. Schneier on Security
    Schneier on Security Bruce Schneier
    4
  3. Liars and Outliers: Enabling the Trust that Society Needs to Thrive
    Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
    3.5
  4. How to Beat Scammers
    How to Beat Scammers Nick Stapleton
    0
  5. Superintelligence on the Horizon: Steering the Course of Cybersecurity
    Superintelligence on the Horizon: Steering the Course of Cybersecurity Felipe Chavarro Polanía
    0
  6. Desconexión Digital y Seguridad Informática en el Trabajo
    Desconexión Digital y Seguridad Informática en el Trabajo María Dolores Pérez Rodríguez
    0
  7. Sistemas de Gestión de Seguridad de la Información (Iso 27001:2022)
    Sistemas de Gestión de Seguridad de la Información (Iso 27001:2022) José Manuel Cortés
    0
  8. Data Management and Security in Blockchain Systems
    Data Management and Security in Blockchain Systems
    0
  9. Tor and the Dark Art of Anonymity
    Tor and the Dark Art of Anonymity Lance Henderson
    0
  10. Burners and Black Markets: Opsec for the Next Generation
    Burners and Black Markets: Opsec for the Next Generation Lance Henderson
    0
  11. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication.
    Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
    0
  12. Security Automation with Python: Practical Python solutions for automating and scaling security operations
    Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
    0
  13. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
    Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    3.5
  14. Cybersecurity Threats and Digital Safety: Protecting Yourself in a Connected World
    Cybersecurity Threats and Digital Safety: Protecting Yourself in a Connected World William Ubagan
    0
  15. Securing Your Sanctuary: A Comprehensive Guide to Home Safety
    Securing Your Sanctuary: A Comprehensive Guide to Home Safety William Ubagan
    0
  16. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice
    Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
    0
  17. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework
    Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
    0
  18. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security
    Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
    0
  19. Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners
    Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners SIMON JEFFERSON
    0
  20. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!"
    CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
    0
  21. Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily
    Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily Sam Washington
    0
  22. Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques
    Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques Allister Banks
    0
  23. The Mysterious Mr. Nakamoto: A 15-Year Quest for the Secret Genius Behind Crypto
    The Mysterious Mr. Nakamoto: A 15-Year Quest for the Secret Genius Behind Crypto Benjamin Wallace
    0
  24. Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities
    Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities Aditya K. Sood
    0
  25. Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingeniería Social
    Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingeniería Social Quinn Kiser
    0
  26. Ultimate AWS CDK for Infrastructure Automation
    Ultimate AWS CDK for Infrastructure Automation Anish Kumar
    0
  27. Cloud Security in der Praxis: Leitfaden für sicheres Softwaredesign und Deployment
    Cloud Security in der Praxis: Leitfaden für sicheres Softwaredesign und Deployment Chris Dotson
    0
  28. Sitting Duck - The phone call you don't want to receive
    Sitting Duck - The phone call you don't want to receive Leigh Kefford
    0
  29. Security and Cyber Laws Digital Defenders
    Security and Cyber Laws Digital Defenders Manish Soni
    0
  30. Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses
    Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses Todd G. Shipley, Art Bowker
    0
  31. The Sovereign Illusion: Bridging Cryptic Codes and Catastrophic Markets
    The Sovereign Illusion: Bridging Cryptic Codes and Catastrophic Markets Elliot Monroe
    0
  32. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age
    Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  33. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions
    You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown, Ira Winkler, CISSP
    0
  34. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition)
    Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
    4.5
  35. Cybersecurity - Data Protection and Strategies: First Edition
    Cybersecurity - Data Protection and Strategies: First Edition Wesley Palmer
    0
  36. The Art of Deception: Controlling the Human Element of Security
    The Art of Deception: Controlling the Human Element of Security William L. Simon, Kevin D. Mitnick, Steve Wozniak
    4.1
  37. PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms
    PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms Dr. Andrew Blyth
    0
  38. Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques
    Cybersecurity Strategies and Best Practices: A comprehensive guide to mastering enterprise cyber defense tactics and techniques Milad Aslaner
    0
  39. Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR
    Endpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR Guven Boyraz
    0
  40. RHCSA Red Hat Enterprise Linux 9: Comprehensive Mastery for Advanced System Administration and Certification Success
    RHCSA Red Hat Enterprise Linux 9: Comprehensive Mastery for Advanced System Administration and Certification Success Asghar Ghori
    0
  41. Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking
    Network Automation with Nautobot: Adopt a network source of truth and a data-driven approach to networking John Anderson, Josh VanDeraa, Christian Adell, Jason Edelman, Glenn Matthews, Ken Celenza, Brad Haas, Bryan Culver, Gary Snider
    0
  42. Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code
    Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code Dennis Chow
    0
  43. Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World
    Don't Be the Weakest Link: How to Protect Your Personal Information in a Digital World Charles ******, Shayne Kawalilak
    0
  44. Mastering Operating Systems: Comprehensive Guide to Overview, Administration, and Security
    Mastering Operating Systems: Comprehensive Guide to Overview, Administration, and Security Virversity Online Courses
    0
  45. Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity
    Penetration Testing, Threat Hunting, and Cryptography: Mastering Cybersecurity Virversity Online Courses
    0
  46. Cybersecurity Compliance: Navigating Frameworks, Standards & Regulations
    Cybersecurity Compliance: Navigating Frameworks, Standards & Regulations Virversity Online Courses
    0
  47. The Developer's Playbook for Large Language Model Security: Building Secure AI Applications
    The Developer's Playbook for Large Language Model Security: Building Secure AI Applications Steve Wilson
    5
  48. Ethical Hacking for Beginners: A Beginner's Guide to Cybersecurity
    Ethical Hacking for Beginners: A Beginner's Guide to Cybersecurity Daniel Green
    0
  49. Cyber Security for Beginners: Safeguarding Your Cyber Space
    Cyber Security for Beginners: Safeguarding Your Cyber Space Daniel Green
    0
  50. Burners & Black Markets
    Burners & Black Markets Lance Henderson
    0