Open navigation menu
Close suggestions
Search
Search
en
Change Language
close menu
Language
English
(selected)
español
português
Deutsch
français
Русский
italiano
român
Bahasa Indonesia
Learn more
Upload
Read free for 30 days
User Settings
close menu
Welcome to Scribd!
Upload
Language (EN)
Scribd Perks
Invite friends
FAQ and support
Sign in
Skip carousel
Carousel Previous
Carousel Next
What is Scribd?
Books
Audiobooks
Magazines
Podcasts
Sheet Music
Documents
Snapshots
Browse
Computer Security
Computer Security
Everything
Bestselling in Computer Security
View More
Skip carousel
carousel previous
carousel next
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door
Author
Brian Krebs
Exploding Data: Reclaiming Our Cyber Security in the Digital Age
Author
Michael Chertoff
Cryptanalysis: A Study of Ciphers and Their Solution
Author
Helen F. Gaines
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author
Kevin D. Mitnick
The Emperor's Codes: Bletchley Park's role in breaking Japan's secret cyphers
Author
Michael Smith
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Author
Ben Buchanan
BILLS-113s1353is
Author
Andrew Blake
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life
Author
J. J. Luna
Net Force: Dark Web: Created by Tom Clancy and Steve Pieczenik
Author
Jerome Preisler
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Author
Clint Watts
Codes, Ciphers and Secret Writing
Author
Martin Gardner
IS Encryption Guide
Author
AlyssaBereznak
CISA bill text with OTI redlines
Author
Andy Greenberg
FCC Response 12-05-2016
Author
MarkWarner
Geek Mafia: Black Hat Blues
Author
Rick Dakan
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Author
James C Foster
Cyberphobia: Identity, Trust, Security and the Internet
Author
Edward Lucas
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
Author
Johnny Long
Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security
Author
Brian W. Kernighan
Cybersecurity and Cyberwar: What Everyone Needs to Know
Author
P. W. Singer
Hacking the Hacker: Learn From The Experts Who Take Down Hackers
Author
Roger A. Grimes
Becoming an Ethical Hacker
Author
Gary Rivlin
Identity Management: A Primer
Author
Ilan Sharoni
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
Author
Joshua Holden
Kingdom of Lies: Unnerving Adventures in the World of Cybercrime
Author
Kate Fazzini
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door
Author
Brian Krebs
Kingdom of Lies: Unnerving Adventures in the World of Cybercrime
Author
Kate Fazzini
Cryptography: The Key to Digital Security, How It Works, and Why It Matters
Author
Keith Martin
Stealing The Network: How to Own the Box
Author
Syngress
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Author
TJ O'Connor
Everything About Computer Security
View More
Skip carousel
carousel previous
carousel next
Blockchain: The Insights You Need from Harvard Business Review
Author
Harvard Business Review
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Author
Kevin White
NIST Cybersecurity Framework: A pocket guide
Author
Alan Calder
Cybersecurity and Cyberwar: What Everyone Needs to Know
Author
P. W. Singer
The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime
Author
Scott Augenbaum
Social Engineering: The Science of Human Hacking, Second Edition
Author
Christopher Hadnagy
Information Security Management Principles
Author
David Alexander
NIST Cybersecurity Framework: A pocket guide
Author
Alan Calder
ISO 27001 Controls – A guide to implementing and auditing
Author
Bridget Kenyon
CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE
Author
ATTILA KOVACS
Hacking : A Beginner's Guide to Learn and Master Ethical Hacking with Practical Examples to Computer, Hacking, Wireless Network, Cybersecurity and Penetration Test (Kali Linux)
Author
Peter Bradley
Cybersecurity for Dummies
Author
Joseph Steinberg
Codes and Ciphers - A History of Cryptography
Author
Alexander D'Agapeyeff
Ethical Hacking: A Beginners Guide To Learning The World Of Ethical Hacking
Author
Lakshay Eshan
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Author
Sudhanshu Chauhan
Tor and the Dark Art of Anonymity
Author
Lance Henderson
Exploit the Art of Hacking
Author
RAJ TYAGI
Data Protection and the Cloud: Are the risks too great?
Author
Paul Ticher
CYBERSECURITY FOR BEGINNERS: 3 BOOKS IN 1: WHAT YOU MUST KNOW ABOUT CYBERSECURITY, HOW TO GET A JOB IN CYBERSECURITY, HOW TO DEFEND AGAINST HACKERS & MALWARE
Author
ATTILA KOVACS
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
Author
Peter Bradley
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Author
Ben Buchanan
Business Continuity and Disaster Recovery for InfoSec Managers
Author
John Rittinghouse, PhD, CISM
The Dark Web: The Unseen Side of the Internet
Author
A. J. Wright
Ethical Hacking
Author
Lakshay Eshan
Big Data: A Complete Guide to the Basic Concepts in Data Science, Cyber Security, Analytics and Metrics
Author
Hans Weber
EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide
Author
ITGP Privacy Team
HACKING WITH KALI LINUX: Penetration Testing Hacking Bible
Author
Alex Wagner
Dark Territory: The Secret History of Cyber War
Author
Fred Kaplan
Cybersecurity and Applied Mathematics
Author
Leigh Metcalf
The Language of Cybersecurity
Author
Maria Antonieta Flores
Recently Added
View More
Skip carousel
carousel previous
carousel next
Top Secret Methods for Getting Internet Security and Privacy
Author
Mark Millery
Cyber Risk Quantification A Complete Guide - 2021 Edition
Author
Gerardus Blokdyk
Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore
Author
Joe Payne
Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1
Author
John Knowles
Latest Technologies for IT Industry 2021 – A Research Paper
Author
prosenjit sengupta
The Elite Cyber Criminals' Stories: The Secret World of Cyber Criminals and Strategies for Addressing Cyber Crime
Author
A. J. Wright
Evaluation of Some Intrusion Detection and Vulnerability Assessment Tools
Author
Dr. Hedaya Mahmood Alasooly
HACKING SEO 2020: Seo Business and Hacking with Linux for Beginners 3 BOOK IN 1
Author
Paul Walsh
What is Blockchain?
Author
John Hargrave
Cybersecurity Fundamentals: How to Establish Effective Security Management Functions
Author
John Knowles
Tor and the Dark Art of Anonymity
Author
Lance Henderson
Zero Days: A Cyber Thriller
Author
Ian Williams
Managing Cybersecurity Risk: Cases Studies and Solutions
Author
Legend Press
Secure Chains
Author
Srinivas Mahankali
Fundamental of Cyber Security
Author
Mayank Bhushan
Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
Author
Hans Weber
Schneier on Security
Author
Bruce Schneier
Cybersecurity for Beginners: What You Must Know about Cybersecurity & How to Get a Job in Cybersecurity (2 Manuscripts)
Author
ATTILA KOVACS
Digital Privacy: Internet Security to Stop Big Companies From Tracking and Selling Your Data
Author
Eric Faster
Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
Author
Hans Weber
Secret and Urgent - The Story of Codes and Ciphers
Author
Anon
Bitcoin & Cryptocurrency Technologies (3 Books in 1): Bitcoin Invest in Digital Gold, Wallet Technology Book and Anonymous Altcoins
Author
Szabolcs Juhasz
Kingdom of Lies: Unnerving Adventures in the World of Cybercrime
Author
Kate Fazzini
NIST Cybersecurity Framework: A pocket guide
Author
Alan Calder
Cybersecurity Experts
Author
Madison Capitano
Transformation of Cryptography: Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Nomenclatura
Author
Linda A. Bertram
Penetration Testing
Author
Robert Karamagi
Protecting Privacy Online
Author
P.S Tecwriden
Safer @ Home with pfSense®
Author
Michael Lines
Bitcoin Basics
Author
P.S Tecwriden
View All In Computer Security
Loading
Quick navigation
Home
Books
Audiobooks
Documents