Livre électronique
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
deCraig P. BauerLivre électronique
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
deCraig P. BauerLivre électronique
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD
deJohnny LongLivre électronique
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
deJohnny LongLivre électronique
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
deJames C FosterLivre électronique
Practical Lock Picking: A Physical Penetration Tester's Training Guide
deDeviant OllamLivre électronique
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
deTJ O'ConnorLivre électronique
Debugging: The 9 Indispensable Rules for Finding Even the Most Elusive Software and Hardware Problems
deDavid J. AGANSLivre électronique
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
deJoshua HoldenLivre électronique
Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool
deGabriele GiuseppiniLivre électronique
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
deJason AndressLivre électronique
Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!
deLee BarkenLivre électronique
Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction
deArvind NarayananLivre électronique
Stealing the Network: How to Own an Identity: How to Own an Identity
deRyan RussellLivre électronique
True Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem
deJ. A. HitchcockPassez à une autre catégorie et trouvez ce qui correspond à votre état d'esprit :
Livre électronique
Network Security All-in-one: ASA Firepower WSA Umbrella VPN ISE Layer 2 Security
deRedouane MEDDANELivre électronique
The United States of Anonymous: How the First Amendment Shaped Online Speech
deJeff KosseffLivre électronique
Super Secreto - The Third Epoch of Cryptography: Multiple, exponential, quantum-secure and above all, simple and practical Encryption for Everyone
deTheo TenzerLivre électronique
Ethereum: Understanding Blockchain Technology, Ethereum, and the Future of Cryptocurrency
dePaul PaxtonLivre électronique
Implementing DevSecOps with Docker and Kubernetes: An Experiential Guide to Operate in the DevOps Environment for Securing and Monitoring Container Applications
deJosé Manuel Ortega CandelLivre électronique
Quick Guide for Creating, Selling and Buying Non-Fungible Tokens (NFTs)
deDr. Hidaia Mahmood AlassouliLivre électronique
Google Certified Professional Cloud Network Engineer: Practice Questions
deIP SpecialistLivre électronique
Quick Guide for Creating, Selling and Buying Non-Fungible Tokens (NFTs)
deDr. Hidaia Mahmood AlassouliiLivre électronique
The Cybersecurity Mindset: A Virtual and Transformational Thinking Mode
deDewayne HartLivre électronique
Information security - Edition 2022: Risk management. Management systems. The ISO/IEC 27001:2022 standard. The ISO/IEC 27002:2022 controls.
deCesare GallottiLivre électronique
Decentralized Finance Guide: Discover the real strength of Defi and how it could change the future of your business
deSCARLETT CHLOELivre électronique
Blockchain From Concept to Execution: With 10 Blockchains, 3 DLTs, 182 MCQs, 70 Diagrams & Many Sample Codes (English Edition)
deDebajani MohantyLivre électronique
The Executive's Cybersecurity Advisor: Gain Critical Business Insight in Minutes
deMichael GableLivre électronique
ISACA Certified Information Security Manager (CISM) - Practice Exams
deRobert KaramagiLivre électronique
Apple Card and Apple Pay: A Ridiculously Simple Guide to Mobile Payments
deScott La CounteLivre électronique
The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse
deNick SelbyLivre électronique
The EU Data Protection Code of Conduct for Cloud Service Providers: A guide to compliance
deAlan CalderLivre électronique
Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking, Social Engineering, and Vulnerability Assessment (English Edition)
deMohd SohaibLivre électronique
Microsoft Azure Security Technologies (AZ-500) - A Certification Guide
deJayant SharmaLivre électronique
Learn Penetration Testing with Python 3.x: Perform Offensive Pentesting and Prepare Red Teaming to Prevent Network Attacks and Web Vulnerabilities (English Edition)
deYehia ElghalyLivre électronique
Pi Network: The First Crypto-currency That You Can Mine With Your Smartphone: How Not To Miss Out On Mining The Next Big Cryptocurrency With Your Smartphone Unlike Bitcoin, Ethereum, Ripple, Cardano And The Rest
deEric Logan CooperLivre électronique
The Ransomware Handbook: How to Prepare for, Prevent, and Recover from Ransomware Attacks
deMike BoutwellLivre électronique
Computer Programming & Cyber Security The Complete Guide To Learn Python Machine Learning, Sql , Data Science & Ethical Hacking
deChristopher HadnagyLivre électronique
CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601)
deGlen E. ClarkeLivre électronique
Cryptography and Network Security: Demystifying the ideas of Network Security, Cryptographic Algorithms, Wireless Security, IP Security, System Security, and Email Security
deBhushan TrivediLivre électronique
The Five Anchors of Cyber Resilience: Why some enterprises are hacked into bankruptcy, while others easily bounce back
dePhillimon ZongoLivre électronique
The Codebreakers of Bletchley Park: The Secret Intelligence Station that Helped Defeat the Nazis
deDermot TuringLivre électronique
Cybercrime and the Darknet: Revealing the hidden underworld of the internet
deCath SenkerLivre électronique
My First Step in Crypto and Bitcoin Investing for Kids and Beginners
deSweet Smart BooksLivre électronique
Principles of Computer Security: CompTIA Security+ and Beyond Lab Manual (Exam SY0-601)
deJonathan S. WeissmanLivre électronique
Full Stack Python Security: Cryptography, TLS, and attack resistance
deDennis ByrneLivre électronique
A Vulnerable System: The History of Information Security in the Computer Age
deAndrew J. StewartLivre électronique
Penetration Testing with Kali Linux: Learn Hands-on Penetration Testing Using a Process-Driven Framework (English Edition)
dePranav JoshiLivre électronique
Principles of Computer Security: CompTIA Security+ and Beyond, Sixth Edition (Exam SY0-601)
deWm. Arthur ConklinLivre électronique
The Art of Network Penetration Testing: How to take over any company in the world
deRoyce DavisLivre électronique
Building Ethereum Dapps: Decentralized applications on the Ethereum blockchain
deRoberto Infante