Open navigation menu
Close suggestions
Search
Search
en
Change Language
close menu
Language
English
(selected)
español
português
Deutsch
français
Русский
italiano
român
Bahasa Indonesia
Learn more
Upload
Read free for 30 days
User Settings
close menu
Welcome to Scribd!
Upload
Language (EN)
Scribd Perks
Invite friends
FAQ and support
Sign in
Skip carousel
Carousel Previous
Carousel Next
What is Scribd?
Books
Audiobooks
Magazines
Podcasts
Sheet Music
Documents
Snapshots
Browse
Computers
Security
Security
Everything
Bestselling in Security
View More
Skip carousel
carousel previous
carousel next
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Author
Ben Buchanan
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
Author
Craig P. Bauer
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author
Kevin D. Mitnick
Hacking the Hacker: Learn From The Experts Who Take Down Hackers
Author
Roger A. Grimes
Cybersecurity and Cyberwar: What Everyone Needs to Know
Author
P. W. Singer
The Art of Deception: Controlling the Human Element of Security
Author
Kevin D. Mitnick
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security
Author
Brian W. Kernighan
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author
Bruce Sterling
Practical Lock Picking: A Physical Penetration Tester's Training Guide
Author
Deviant Ollam
Stealing The Network: How to Own the Box
Author
Syngress
Cryptography: The Key to Digital Security, How It Works, and Why It Matters
Author
Keith Martin
Worm: The First Digital World War
Author
Mark Bowden
Blockchain and the Law: The Rule of Code
Author
Primavera De Filippi
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
Author
Joshua Holden
Blockchain for Dummies: 2nd Edition
Author
Tiana Laurence
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD
Author
Johnny Long
Buffer Overflow Attacks: Detect, Exploit, Prevent
Author
Jason Deckard
Identity Management: A Primer
Author
Ilan Sharoni
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Author
Jason Andress
Web of Deception: Misinformation on the Internet
Author
Anne P. Mintz
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Author
James C Foster
The Pirate Organization: Lessons from the Fringes of Capitalism
Author
Rodolphe Durand
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
Author
Johnny Long
Data for the People: How to Make Our Post-Privacy Economy Work for You
Author
Andreas S. Weigend
WikiLeaks and the Age of Transparency
Author
Micah L. Sifry
Hardware Hacking: Have Fun while Voiding your Warranty
Author
Joe Grand
Building Robots With Lego Mindstorms
Author
Mario Ferrari
Stealing the Network: How to Own an Identity: How to Own an Identity
Author
Ryan Russell
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Author
TJ O'Connor
True Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem
Author
J. A. Hitchcock
Everything About Security
View More
Skip carousel
carousel previous
carousel next
Social Engineering: The Art of Human Hacking
Author
Christopher Hadnagy
CCNA 200 301
Author
Samuel Foster
NIST Cybersecurity Framework: A pocket guide
Author
Alan Calder
Information Security Management Principles
Author
David Alexander
ISO 27001 Controls – A guide to implementing and auditing
Author
Bridget Kenyon
The Art of Deception: Controlling the Human Element of Security
Author
Kevin D. Mitnick
Wireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks!
Author
Lee Barken
Codes and Ciphers - A History of Cryptography
Author
Alexander D'Agapeyeff
Bitcoin for Beginners & Dummies: Cryptocurrency & Blockchain
Author
Giovanni Rigters
Mastering Blockchain
Author
Imran Bashir
Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601)
Author
Dawn Dunkerley
Mike Meyers' CompTIA A+ Certification Passport, Seventh Edition (Exams 220-1001 & 220-1002)
Author
Mike Meyers
Blockchain for Dummies: 2nd Edition
Author
Tiana Laurence
Cybersecurity for Dummies
Author
Joseph Steinberg
CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE
Author
ATTILA KOVACS
Digital Forensics with Open Source Tools
Author
Cory Altheide
CYBERSECURITY FOR BEGINNERS: 3 BOOKS IN 1: WHAT YOU MUST KNOW ABOUT CYBERSECURITY, HOW TO GET A JOB IN CYBERSECURITY, HOW TO DEFEND AGAINST HACKERS & MALWARE
Author
ATTILA KOVACS
NIST Cybersecurity Framework: A pocket guide
Author
Alan Calder
Blockchain: The Insights You Need from Harvard Business Review
Author
Harvard Business Review
The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime
Author
Scott Augenbaum
EU GDPR - A pocket guide, second edition
Author
Alan Calder
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Author
Sudhanshu Chauhan
In Math We Trust: Bitcoin, Cryptocurrency and the Journey To Being Your Own Bank
Author
Simon Dingle
Dark Territory: The Secret History of Cyber War
Author
Fred Kaplan
Cisco Certified: Find out how to get all the cisco certifications with simple and targeted tests real and unique practice tests
Author
David Mayer
Ethical Hacking: A Beginners Guide To Learning The World Of Ethical Hacking
Author
Lakshay Eshan
Unmasking the Social Engineer: The Human Element of Security
Author
Christopher Hadnagy
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
Author
Bobby E. Rogers
Hacking : A Beginner's Guide to Learn and Master Ethical Hacking with Practical Examples to Computer, Hacking, Wireless Network, Cybersecurity and Penetration Test (Kali Linux)
Author
Peter Bradley
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
Author
Gene K. Landy
Recently Added
View More
Skip carousel
carousel previous
carousel next
Tor Anonymity Network 101: An Introduction to The Most Private Part of The Internet
Author
Steven Gates
You CAN Stop Stupid: Stopping Accidental and Malicious Actions
Author
Ira Winkler
Getting started with Deep Learning for Natural Language Processing: Learn how to build NLP applications with Deep Learning (English Edition)
Author
Sunil Patel
Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601)
Author
Dawn Dunkerley
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
Author
Bobby E. Rogers
Pseudorandomness and Cryptographic Applications
Author
Michael Luby
Risk Management and Information Systems Control
Author
Selwyn Classen
Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far
Author
Ted Demopoulos
Earning Money through Crypto Currency Airdrops, Faucets, Cloud Mining, Online Trading and Online Advertisements
Author
Dr. Hidaia Mahmood Alassouli
Quick Guide for Smart Contracts Creation and Deployment on Ethereum Blockchain
Author
Dr. Hidaia Mahmood Alassouli
Cryptocurrency Mastery: The Ultimate Guide to Bitcoin and Cryptocurrency, Learn About Bitcoin, Altcoins, Ethereum and Other Effective Strategies to Earn Money From Cryptocurrency
Author
Jean Antony
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
Author
Alan Calder
Hackable: How to Do Application Security Right
Author
Ted Harrington
Hacking for Beginners
Author
Richard Dorsel
Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity
Author
HUGO HOFFMAN
Ethical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics | 2 Books In 1
Author
ATTILA KOVACS
Bitcoin For Beginners: Bitcoin, Bitcoin Mining, Cryptography And The Cypherpunk Movement | 2 Books In 1
Author
Boris Weiser
Bitcoin And Blockchain For Beginners: Bitcoin, Bitcoin Mining And Blockchain Basics | 2 Books In 1
Author
Boris Weiser
Hacking Wireless With Kali Linux: Learn Fast How To Penetrate Any Wireless Network | 2 Books In 1
Author
HUGO HOFFMAN
Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1
Author
HUGO HOFFMAN
The Art of Deception: Controlling the Human Element of Security
Author
Kevin D. Mitnick
HACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 3 BOOKS IN 1
Author
Alex Wagner
Top Secret Methods for Getting Internet Security and Privacy
Author
Mark Millery
The Cybersecurity Maturity Model Certification (CMMC) – A pocket guide
Author
William Gamble
Blockchain Simply Explained
Author
Aik Cheow Khor
Modern encryption and virtual security
Author
Dr mahdi pourdehghan
Kaspersky security center
Author
Mohammed Haytham Khabbaz samkary
Bitcoin Invest: Five secret cryptocurrencies other than bitcoin that have potential to make higher gains than Bitcoin!
Author
Bryan Hoo
Cisco Certified: Find out how to get all the cisco certifications with simple and targeted tests real and unique practice tests
Author
David Mayer
How to Leak Documents and Surf the Web Anonymously
Author
Nathan Bowie
View All In Security
Related Categories
Computer & Internet Law
Certification Guides
Networking
Operating Systems
System Administration
Related authors
Skip carousel
carousel previous
carousel next
Kevin Beaver
Chey Cobb
Peter H. Gregory
Robert Knake
Sam Washington
Imran Bashir
sparc Flow
Lakshay Eshan
Evan J. Rodgers
Joe Payne
Loading
Quick navigation
Home
Books
Audiobooks
Documents