Keamanan eBook
e-book yang yang sedang tren
The Hacker Crackdown: Law and Disorder on the Electronic Frontier Penilaian: 3 dari 5 bintang3/5No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing eBook
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
karyaJohnny LongPenilaian: 4 dari 5 bintang4/5Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals eBook
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
karyaJames C FosterPenilaian: 1 dari 5 bintang1/5Web of Deception: Misinformation on the Internet Penilaian: 4 dari 5 bintang4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers eBook
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
karyaKevin D. MitnickPenilaian: 3 dari 5 bintang3/5Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies eBook
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
karyaCraig P. BauerPenilaian: 0 dari 5 bintang0 penilaianBlockchain Basics: A Non-Technical Introduction in 25 Steps Penilaian: 4 dari 5 bintang4/5Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD eBook
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD
karyaJohnny LongPenilaian: 4 dari 5 bintang4/5The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption eBook
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
karyaJoshua HoldenPenilaian: 0 dari 5 bintang0 penilaianViolent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers eBook
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
karyaTJ O'ConnorPenilaian: 4 dari 5 bintang4/5Stealing The Network: How to Own the Box Penilaian: 3 dari 5 bintang3/5Worm: The First Digital World War Penilaian: 3 dari 5 bintang3/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Penilaian: 4 dari 5 bintang4/5Social Engineering: The Science of Human Hacking Penilaian: 0 dari 5 bintang0 penilaianHardware Hacking: Have Fun while Voiding your Warranty Penilaian: 3 dari 5 bintang3/5The Pirate Organization: Lessons from the Fringes of Capitalism Penilaian: 5 dari 5 bintang5/5Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool eBook
Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool
karyaGabriele GiuseppiniPenilaian: 0 dari 5 bintang0 penilaianCyber Warfare: Techniques, Tactics and Tools for Security Practitioners Penilaian: 3 dari 5 bintang3/5Identity Management: A Primer Penilaian: 4 dari 5 bintang4/5Digital Forensics with Open Source Tools Penilaian: 2 dari 5 bintang2/5Inside the SPAM Cartel: By Spammer-X Penilaian: 1 dari 5 bintang1/5Buffer Overflow Attacks: Detect, Exploit, Prevent Penilaian: 0 dari 5 bintang0 penilaianTrue Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem eBook
True Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem
karyaJ. A. HitchcockPenilaian: 1 dari 5 bintang1/5Ethereal Packet Sniffing Penilaian: 0 dari 5 bintang0 penilaianRuby Developers Guide Penilaian: 3 dari 5 bintang3/5Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction Penilaian: 5 dari 5 bintang5/5Building Robots With Lego Mindstorms Penilaian: 1 dari 5 bintang1/5Stealing the Network: How to Own an Identity: How to Own an Identity Penilaian: 4 dari 5 bintang4/5Introduction to Security Penilaian: 0 dari 5 bintang0 penilaianWikiLeaks and the Age of Transparency Penilaian: 5 dari 5 bintang5/5
Jelajahi selengkapnya
Masih banyak yang bisa ditemukan di Keamanan
7 Rules To Become Exceptional At Cyber Security Penilaian: 5 dari 5 bintang5/5Cybersecurity Essentials: The Beginner's Guide Penilaian: 0 dari 5 bintang0 penilaianCertified Cybersecurity Compliance Professional Penilaian: 5 dari 5 bintang5/5Comptia+ Network Penilaian: 0 dari 5 bintang0 penilaianCybercrime: Protecting your business, your family and yourself Penilaian: 0 dari 5 bintang0 penilaianFundamentals of Network Forensics: A Research Perspective Penilaian: 0 dari 5 bintang0 penilaianEdge Computing: A Primer Penilaian: 0 dari 5 bintang0 penilaianStructured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security eBook
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
karyaDmitry KorzunPenilaian: 0 dari 5 bintang0 penilaianInside Radio: An Attack and Defense Guide Penilaian: 0 dari 5 bintang0 penilaianPenetration Testing with Kali Linux Penilaian: 0 dari 5 bintang0 penilaianUnderstanding Network Hacks: Attack and Defense with Python Penilaian: 0 dari 5 bintang0 penilaianAdvanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE eBook
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
karyaPrabath SiriwardenaPenilaian: 0 dari 5 bintang0 penilaianAttribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage eBook
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
karyaTimo SteffensPenilaian: 0 dari 5 bintang0 penilaianHealthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records eBook
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
karyaBernard Peter RobichauPenilaian: 0 dari 5 bintang0 penilaianMobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS eBook
Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS
karyaJames StevensonPenilaian: 0 dari 5 bintang0 penilaianThe Art of Cyber Security: A practical guide to winning the war on cyber crime eBook
The Art of Cyber Security: A practical guide to winning the war on cyber crime
karyaGary HibberdPenilaian: 0 dari 5 bintang0 penilaianSecurity Engineering: A Guide to Building Dependable Distributed Systems Penilaian: 4 dari 5 bintang4/5Hacking For Dummies Penilaian: 0 dari 5 bintang0 penilaianCompTIA PenTest+ Practice Tests: Exam PT0-001 Penilaian: 0 dari 5 bintang0 penilaianAlice and Bob Learn Application Security Penilaian: 0 dari 5 bintang0 penilaianCyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk eBook
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk
karyaAndrew GoreckiPenilaian: 0 dari 5 bintang0 penilaianHacking Multifactor Authentication Penilaian: 0 dari 5 bintang0 penilaianWireshark for Security Professionals: Using Wireshark and the Metasploit Framework eBook
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
karyaJessey BullockPenilaian: 0 dari 5 bintang0 penilaianCybercrime Investigators Handbook Penilaian: 0 dari 5 bintang0 penilaianThe Bitcoin Standard: The Decentralized Alternative to Central Banking Penilaian: 4 dari 5 bintang4/5Cybersecurity For Dummies Penilaian: 0 dari 5 bintang0 penilaianOCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817 eBook
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817
karyaScott SelikoffPenilaian: 5 dari 5 bintang5/5Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques eBook
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
karyaVinny TroiaPenilaian: 0 dari 5 bintang0 penilaianCompTIA CySA+ Practice Tests: Exam CS0-002 Penilaian: 0 dari 5 bintang0 penilaianHacking the Hacker: Learn From the Experts Who Take Down Hackers Penilaian: 0 dari 5 bintang0 penilaianCybersecurity Essentials Penilaian: 0 dari 5 bintang0 penilaianCASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003 Penilaian: 0 dari 5 bintang0 penilaianTransformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors eBook
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
karyaPerry CarpenterPenilaian: 0 dari 5 bintang0 penilaianApplied Incident Response Penilaian: 0 dari 5 bintang0 penilaianSocial Engineering: The Science of Human Hacking Penilaian: 0 dari 5 bintang0 penilaianCompTIA PenTest+ Study Guide: Exam PT0-001 Penilaian: 0 dari 5 bintang0 penilaianAdvanced Penetration Testing: Hacking the World's Most Secure Networks Penilaian: 0 dari 5 bintang0 penilaianTribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership eBook
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
karyaMarcus J. CareyPenilaian: 0 dari 5 bintang0 penilaianPenetration Testing For Dummies Penilaian: 0 dari 5 bintang0 penilaianCybersecurity Program Development for Business: The Essential Planning Guide eBook
Cybersecurity Program Development for Business: The Essential Planning Guide
karyaChris MoschovitisPenilaian: 0 dari 5 bintang0 penilaianLinux Security Fundamentals Penilaian: 0 dari 5 bintang0 penilaianThe Pentester BluePrint: Starting a Career as an Ethical Hacker Penilaian: 0 dari 5 bintang0 penilaianInvestigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence eBook
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
karyaNick FurneauxPenilaian: 0 dari 5 bintang0 penilaianHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming eBook
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
karyaMatthew HickeyPenilaian: 0 dari 5 bintang0 penilaianHacking Connected Cars: Tactics, Techniques, and Procedures Penilaian: 0 dari 5 bintang0 penilaianTribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity eBook
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
karyaMarcus J. CareyPenilaian: 0 dari 5 bintang0 penilaianTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World Penilaian: 0 dari 5 bintang0 penilaianThe Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity eBook
The Digital Big Bang: The Hard Stuff, the Soft Stuff, and the Future of Cybersecurity
karyaPhil QuadePenilaian: 0 dari 5 bintang0 penilaianDeveloping Applications with Azure Active Directory: Principles of Authentication and Authorization for Architects and Developers eBook
Developing Applications with Azure Active Directory: Principles of Authentication and Authorization for Architects and Developers
karyaManas MayankPenilaian: 0 dari 5 bintang0 penilaianMalware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware eBook
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
karyaAbhijit MohantaPenilaian: 0 dari 5 bintang0 penilaianZero Trust Security: An Enterprise Guide Penilaian: 0 dari 5 bintang0 penilaianCybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents eBook
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
karyaEric C. ThompsonPenilaian: 0 dari 5 bintang0 penilaianSolving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0 eBook
Solving Identity Management in Modern Applications: Demystifying OAuth 2.0, OpenID Connect, and SAML 2.0
karyaYvonne WilsonPenilaian: 0 dari 5 bintang0 penilaianIdentity Attack Vectors: Implementing an Effective Identity and Access Management Solution eBook
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
karyaMorey J. HaberPenilaian: 0 dari 5 bintang0 penilaianImplementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines eBook
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
karyaAbhishek ChopraPenilaian: 0 dari 5 bintang0 penilaianCyber Operations: Building, Defending, and Attacking Modern Computer Networks Penilaian: 0 dari 5 bintang0 penilaianCompTIA Security+ Certification Study Guide: Network Security Essentials Penilaian: 0 dari 5 bintang0 penilaianThe IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things eBook
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
karyaAditya GuptaPenilaian: 0 dari 5 bintang0 penilaianSnowflake Security: Securing Your Snowflake Data Cloud Penilaian: 0 dari 5 bintang0 penilaianPCI DSS: An Integrated Data Security Standard Guide Penilaian: 0 dari 5 bintang0 penilaianSet Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals eBook
Set Up and Manage Your Virtual Private Server: Making System Administration Accessible to Professionals
karyaJon WestfallPenilaian: 0 dari 5 bintang0 penilaianFirewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies eBook
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
karyaCarey ParkerPenilaian: 0 dari 5 bintang0 penilaianBeginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data eBook
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data
karyaVasantha LakshmiPenilaian: 0 dari 5 bintang0 penilaianPro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms eBook
Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
karyaMarius Iulian MihailescuPenilaian: 0 dari 5 bintang0 penilaianDesigning a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events eBook
Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events
karyaEric C. ThompsonPenilaian: 0 dari 5 bintang0 penilaianAdvanced API Security: OAuth 2.0 and Beyond Penilaian: 0 dari 5 bintang0 penilaianOpen Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence eBook
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
karyaNihad A. HassanPenilaian: 0 dari 5 bintang0 penilaianCyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers eBook
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
karyaAaron Roberts