Security Ebooks
Trending ebooks
The most talked-about and well-loved Security titles this month.
Buffer Overflow Attacks: Detect, Exploit, Prevent Rating: 3 out of 5 stars3/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 3 out of 5 stars3/5No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Rating: 4 out of 5 stars4/5Web of Deception: Misinformation on the Internet Rating: 4 out of 5 stars4/5Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Rating: 4 out of 5 stars4/5Stealing the Network: How to Own an Identity: How to Own an Identity Rating: 4 out of 5 stars4/5Stealing The Network: How to Own the Box Rating: 3 out of 5 stars3/5Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction Rating: 5 out of 5 stars5/5Building Robots With Lego Mindstorms Rating: 3 out of 5 stars3/5WikiLeaks and the Age of Transparency Rating: 5 out of 5 stars5/5Hardware Hacking: Have Fun while Voiding your Warranty Rating: 3 out of 5 stars3/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 4 out of 5 stars4/5Identity Management: A Primer Rating: 4 out of 5 stars4/5Inside the SPAM Cartel: By Spammer-X Rating: 2 out of 5 stars2/5Digital Forensics with Open Source Tools Rating: 3 out of 5 stars3/5Dissecting the Hack: The F0rb1dd3n Network, Revised Edition: The F0rb1dd3n Network Rating: 4 out of 5 stars4/5Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool Rating: 5 out of 5 stars5/5Malware Forensics: Investigating and Analyzing Malicious Code Rating: 5 out of 5 stars5/5Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Rating: 3 out of 5 stars3/5Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex Rating: 5 out of 5 stars5/5Ruby Developers Guide Rating: 3 out of 5 stars3/5Introduction to Security Rating: 2 out of 5 stars2/5Worm: The First Digital World War Rating: 3 out of 5 stars3/5Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption Rating: 0 out of 5 stars0 ratingsWarDriving: Drive, Detect, Defend: A Guide to Wireless Security Rating: 3 out of 5 stars3/5
Others you might like
From classic favorites to brand new hits, it’s all here for you to discover.
There’s more to discover in Security
Escape into new ebooks and new adventures.
The Survival Guide to Maintaining Access and Evading Detection Post-Exploitation Rating: 0 out of 5 stars0 ratingsHack the Airwaves: Advanced BLE Exploitation Techniques Rating: 0 out of 5 stars0 ratingsMulti-Cloud Administration Guide: Manage and optimize cloud resources across Azure, AWS, GCP, and Alibaba Cloud (English Edition) Rating: 0 out of 5 stars0 ratingsZero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsManaging Modern Security Operations Center & Building Perfect Career as SOC Analyst Rating: 0 out of 5 stars0 ratingsLinux - a Secure Personal Computer for Beginners Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker (CEH) Rating: 0 out of 5 stars0 ratingsSql : The Ultimate Beginner to Advanced Guide To Master SQL Quickly with Step-by-Step Practical Examples Rating: 0 out of 5 stars0 ratingsAPIs Unlocked Rating: 0 out of 5 stars0 ratingsCryptology for Beginners #1 Guide for Security, Encryption, Crypto, Algorithms and Python Rating: 0 out of 5 stars0 ratingsUnderstanding Blockchain Rating: 0 out of 5 stars0 ratingsCybersecurity Jobs 3- in-1 Value Bundle: Resume, Career Paths, and Work From Home Rating: 0 out of 5 stars0 ratingsCybersecurity For Beginners: Learn How To Defend Against Online Threats Rating: 0 out of 5 stars0 ratingsDecrypting Money: A Comprehensive Introduction to Bitcoin Rating: 0 out of 5 stars0 ratingsC++ Networking 101 Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Practice Tests: Exam CS0-003 Rating: 1 out of 5 stars1/5Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsCloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 0 out of 5 stars0 ratingsMobile Security Fundamentals: A Guide for CompTIA Security+ 601 Exam Rating: 0 out of 5 stars0 ratingsCyber Attacks: Protecting National Infrastructure, STUDENT EDITION Rating: 3 out of 5 stars3/5The Active Defender: Immersion in the Offensive Security Mindset Rating: 0 out of 5 stars0 ratingsThrough the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 0 out of 5 stars0 ratingsHardware Security: A Hands-on Learning Approach Rating: 0 out of 5 stars0 ratingsC++ Networking 101: Unlocking Sockets, Protocols, VPNs, and Asynchronous I/O with 75+ sample programs Rating: 0 out of 5 stars0 ratingsComplete Guide to Building an Information Security Program Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Study Guide: Exam CS0-003 Rating: 5 out of 5 stars5/5Comprehensive Guide to Personal Cybersecurity: Personal Cybersecurity Practices for a Safer Digital Life Rating: 0 out of 5 stars0 ratingsPrivacy-Preserving Machine Learning Rating: 0 out of 5 stars0 ratingsMitigating Supply Chain Attacks in the Digital Age Rating: 0 out of 5 stars0 ratings