Security
Trending titles
The most talked-about and well-loved Security titles this month.
Liars and Outliers: Enabling the Trust that Society Needs to Thrive Rating: 3 out of 5 stars3/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 3 out of 5 stars3/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Web of Deception: Misinformation on the Internet Rating: 4 out of 5 stars4/5Building Robots With Lego Mindstorms Rating: 3 out of 5 stars3/5Stealing The Network: How to Own the Box Rating: 3 out of 5 stars3/5Worm: The First Digital World War Rating: 3 out of 5 stars3/5Debugging: The 9 Indispensable Rules for Finding Even the Most Elusive Software and Hardware Problems Rating: 3 out of 5 stars3/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 4 out of 5 stars4/5Hardware Hacking: Have Fun while Voiding your Warranty Rating: 3 out of 5 stars3/5Blockchain For Dummies: 2nd Edition Rating: 4 out of 5 stars4/5Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World Rating: 3 out of 5 stars3/5Schneier on Security Rating: 3 out of 5 stars3/5Digital Forensics with Open Source Tools Rating: 3 out of 5 stars3/5Identity Management: A Primer Rating: 4 out of 5 stars4/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 5 out of 5 stars5/5Buffer Overflow Attacks: Detect, Exploit, Prevent Rating: 3 out of 5 stars3/5No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Rating: 4 out of 5 stars4/5Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction Rating: 5 out of 5 stars5/5Stealing the Network: How to Own an Identity: How to Own an Identity Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Rating: 4 out of 5 stars4/5WikiLeaks and the Age of Transparency Rating: 5 out of 5 stars5/5Introduction to Security Rating: 2 out of 5 stars2/5The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5
Everything About Security
Destination CISSP Rating: 5 out of 5 stars5/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 5 out of 5 stars5/5EC-Council Certified Ethical Hacker - (Practice Exams) Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5ISACA Certified Information Security Manager (CISM) - Practice Exams Rating: 0 out of 5 stars0 ratingsISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 0 out of 5 stars0 ratingsDark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 4 out of 5 stars4/5ISO27001/ISO27002:2013: A Pocket Guide Rating: 4 out of 5 stars4/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5HackerTools Crack With Disassembling Rating: 2 out of 5 stars2/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Modern Cybersecurity Practices Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsNavigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CISSP in 21 Days - Second Edition Rating: 3 out of 5 stars3/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCertified Information Security Manager CISM Study Guide Rating: 0 out of 5 stars0 ratings
Others you might like
From classic favorites to brand new hits, it’s all here for you to discover.
Recently Added
CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 0 out of 5 stars0 ratingsCISSP All-in-One Exam Guide, Ninth Edition Rating: 0 out of 5 stars0 ratings