Open navigation menu
Close suggestions
Search
Search
en
Change Language
close menu
Language
English
(selected)
español
português
Deutsch
français
Русский
italiano
român
Bahasa Indonesia
Learn more
Upload
Read free for 30 days
User Settings
close menu
Welcome to Scribd!
Upload
Language (EN)
Scribd Perks
Invite friends
FAQ and support
Sign in
Skip carousel
Carousel Previous
Carousel Next
What is Scribd?
Books
Audiobooks
Magazines
Podcasts
Sheet Music
Documents
Snapshots
Browse
Cybercrime
Cybercrime
Everything
Bestselling in Cybercrime
View More
Skip carousel
carousel previous
carousel next
Geek Mafia: Black Hat Blues
Author
Rick Dakan
Cryptography: The Key to Digital Security, How It Works, and Why It Matters
Author
Keith Martin
Stealing The Network: How to Own the Box
Author
Syngress
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Author
TJ O'Connor
Worm: The First Digital World War
Author
Mark Bowden
Kingdom of Lies: Unnerving Adventures in the World of Cybercrime
Author
Kate Fazzini
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
Author
Joshua Holden
Kingdom of Lies: Unnerving Adventures in the World of Cybercrime
Author
Kate Fazzini
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Author
Ben Buchanan
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author
Kevin D. Mitnick
Becoming an Ethical Hacker
Author
Gary Rivlin
Cybersecurity and Cyberwar: What Everyone Needs to Know
Author
P.W. Singer
Hacking the Hacker: Learn From The Experts Who Take Down Hackers
Author
Roger A. Grimes
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door
Author
Brian Krebs
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author
Bruce Sterling
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet
Author
Eoghan Casey
Botnets: The Killer Web Applications
Author
Craig Schiller
Stealing the Network: How to Own an Identity: How to Own an Identity
Author
Ryan Russell
Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
Author
Adam Levin
Snort Intrusion Detection 2.0
Author
Syngress
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security
Author
Chris Hurley
True Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem
Author
J. A. Hitchcock
Buffer Overflow Attacks: Detect, Exploit, Prevent
Author
Jason Deckard
Inside the SPAM Cartel: By Spammer-X
Author
Spammer-X Spammer-X
XSS Attacks: Cross Site Scripting Exploits and Defense
Author
Seth Fogie
Malware Forensics: Investigating and Analyzing Malicious Code
Author
Cameron H. Malin
Cyberphobia: Identity, Trust, Security and the Internet
Author
Edward Lucas
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition: The F0rb1dd3n Network
Author
Jayson E Street
Cryptography for Developers
Author
Tom St Denis
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
Author
Johnny Long
Everything About Cybercrime
View More
Skip carousel
carousel previous
carousel next
The Language of Cybersecurity
Author
Maria Antonieta Flores
Codes and Ciphers - A History of Cryptography
Author
Alexander D'Agapeyeff
HACKING WITH KALI LINUX: Penetration Testing Hacking Bible
Author
Alex Wagner
What is Blockchain?
Author
John Hargrave
Hacking : A Beginner's Guide to Learn and Master Ethical Hacking with Practical Examples to Computer, Hacking, Wireless Network, Cybersecurity and Penetration Test (Kali Linux)
Author
Peter Bradley
Cybersecurity for Dummies
Author
Joseph Steinberg
Blueprint, The: 3 Books in 1: Python, Hacking & Advanced Hacking: Everything You Need to Know for Python Programming and Hacking!
Author
Cyber Punk Architects
Information Security Management Principles
Author
David Alexander
CYBERSECURITY FOR BEGINNERS: 3 BOOKS IN 1: WHAT YOU MUST KNOW ABOUT CYBERSECURITY, HOW TO GET A JOB IN CYBERSECURITY, HOW TO DEFEND AGAINST HACKERS & MALWARE
Author
ATTILA KOVACS
Becoming an Ethical Hacker
Author
Gary Rivlin
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Author
Kevin White
Social Engineering: The Science of Human Hacking, Second Edition
Author
Christopher Hadnagy
Hacking For Dummies
Author
Kevin Beaver
Exploit the Art of Hacking
Author
RAJ TYAGI
Cryptography for Developers
Author
Tom St Denis
Dark Territory: The Secret History of Cyber War
Author
Fred Kaplan
Applied Network Security
Author
Arthur Salmon
Application security in the ISO27001:2013 Environment
Author
Vinod Vasudevan
Ethical Hacking
Author
Lakshay Eshan
Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing
Author
Adidas Wilson
HACKING: Denial of Service Attacks
Author
Alex Wagner
Cyber Security: A practitioner's guide
Author
David Sutton
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
Author
Peter Bradley
Web Penetration Testing: Step-By-Step Guide
Author
Radhi Shatob
NIST Cybersecurity Framework: A pocket guide
Author
Alan Calder
Cybersecurity and Cyberwar: What Everyone Needs to Know
Author
P.W. Singer
Malware Forensics: Investigating and Analyzing Malicious Code
Author
Cameron H. Malin
HACKING: 3 BOOKS IN 1
Author
Alex Wagner
CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition
Author
Matt Walker
Practical Cryptography in Python
Author
Christopher K. Monson
Recently Added
View More
Skip carousel
carousel previous
carousel next
Top Secret Methods for Getting Internet Security and Privacy
Author
Mark Millery
Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1
Author
John Knowles
Latest Technologies for IT Industry 2021 – A Research Paper
Author
prosenjit sengupta
The Elite Cyber Criminals' Stories: The Secret World of Cyber Criminals and Strategies for Addressing Cyber Crime
Author
A. J. Wright
Evaluation of Some Intrusion Detection and Vulnerability Assessment Tools
Author
Dr. Hedaya Mahmood Alasooly
Tor and the Dark Art of Anonymity
Author
Lance Henderson
Zero Days: A Cyber Thriller
Author
Ian Williams
Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
Author
Hans Weber
Schneier on Security
Author
Bruce Schneier
Digital Privacy: Internet Security to Stop Big Companies From Tracking and Selling Your Data
Author
Eric Faster
Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
Author
Hans Weber
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author
Bruce Sterling
Kingdom of Lies: Unnerving Adventures in the World of Cybercrime
Author
Kate Fazzini
NIST Cybersecurity Framework: A pocket guide
Author
Alan Calder
Transformation of Cryptography: Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Nomenclatura
Author
Linda A. Bertram
Gangs of Social Media
Author
Vasimraja Bhavikatti
Penetration Testing
Author
Robert Karamagi
Protecting Privacy Online
Author
P.S Tecwriden
Safer @ Home with pfSense®
Author
Michael Lines
Hacking With Linux 2020:A Complete Beginners Guide to the World of Hacking Using Linux - Explore the Methods and Tools of Ethical Hacking with Linux
Author
Joseph Kenna
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Author
Ben Buchanan
Overview of Some Windows and Linux Intrusion Detection Tools
Author
Dr. Hidaia Mahmood Alassouli
Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
Author
Hans Weber
Protecting Yourself Online: A Quick Guide on Safely Navigating the Internet for Non-Techie Users
Author
Andrew J. Carey
Hackers
Author
Anupam Rajak
Cyber Security: Essential principles to secure your organisation
Author
Alan Calder
The Future and Opportunities of Cybersecurity in the Workforce
Author
Dr. Pete Limon PHD
Web Penetration Testing: Step-By-Step Guide
Author
Radhi Shatob
Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration
Author
Hans Weber
Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking
Author
Kevin Clark
View All In Cybercrime
Loading
Quick navigation
Home
Books
Audiobooks
Documents