Open navigation menu
Close suggestions
Search
Search
en
Change Language
Language
English
(selected)
español
português
Deutsch
français
Русский
italiano
român
Bahasa Indonesia
Learn more
Upload
Read free for 30 days
Welcome to Scribd!
Upload
Language (EN)
Scribd Perks
Invite friends
FAQ and support
Sign in
Skip carousel
Carousel Previous
Carousel Next
What is Scribd?
Books
Audiobooks
Magazines
Podcasts
Sheet Music
Documents
Snapshots
Browse
Cyberwarfare
Cyberwarfare
Everything
Bestselling in Cyberwarfare
View More
Skip carousel
carousel previous
carousel next
BILLS-113s1353is
Author
Andrew Blake
Russia Influence Warning Letter from NSA members
Author
Yahoo News
Statement for the Record - Worldwide Threat Assessment of the U.S. Intelligence Community
Author
Office of the Director of National Intelligence
The Puzzle Palace: A Report on NSA, America's Most Secret Agency
Author
James Bamford
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door
Author
Brian Krebs
Blumstein vs. U.S. - Writ of Mandamus
Author
Grant Stern
Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
Author
James Bamford
Digital Fortress: A Thriller
Author
Dan Brown
Enigma: The Battle for the Code
Author
Hugh Sebag-Montefiore
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
Author
Glenn Greenwald
Spies of No Country: Secret Lives at the Birth of Israel
Author
Matti Friedman
CISA bill text with OTI redlines
Author
Andy Greenberg
The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization
Author
James Bamford
Codes, Ciphers and Secret Writing
Author
Martin Gardner
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Author
Clint Watts
The Secrets of Station X: How the Bletchley Park codebreakers helped win the war
Author
Michael Smith
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
Author
Craig P. Bauer
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Author
Ben Buchanan
The Emperor's Codes: Bletchley Park's role in breaking Japan's secret cyphers
Author
Michael Smith
Becoming an Ethical Hacker
Author
Gary Rivlin
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author
Kevin D. Mitnick
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author
Bruce Sterling
Cryptanalysis: A Study of Ciphers and Their Solution
Author
Helen F. Gaines
Geek Mafia: Black Hat Blues
Author
Rick Dakan
Eyes in the Sky: The Secret Rise of Gorgon Stare and How It Will Watch Us All
Author
Arthur Holland Michel
Cryptography: The Key to Digital Security, How It Works, and Why It Matters
Author
Keith Martin
Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door
Author
Brian Krebs
X, Y & Z: The Real Story of How Enigma Was Broken
Author
Dermot Turing
Net Force: Dark Web: Created by Tom Clancy and Steve Pieczenik
Author
Jerome Preisler
The Bletchley Park Codebreakers
Author
Michael Smith
Everything About Cyberwarfare
View More
Skip carousel
carousel previous
carousel next
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing
Author
Peter Bradley
The Tao of Open Source Intelligence
Author
Stewart Bertram
CYBERSECURITY FOR BEGINNERS: 3 BOOKS IN 1: WHAT YOU MUST KNOW ABOUT CYBERSECURITY, HOW TO GET A JOB IN CYBERSECURITY, HOW TO DEFEND AGAINST HACKERS & MALWARE
Author
ATTILA KOVACS
Exploit the Art of Hacking
Author
RAJ TYAGI
HACKING: Social Engineering Attacks, Techniques & Prevention
Author
Alex Wagner
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Author
Kevin White
Russian Cyber Warfare: The History of Russia’s State-Sponsored Attacks across the World
Author
Charles River Editors
CISSP Practice Exams, Fourth Edition
Author
Shon Harris
Street Cryptography
Author
Christopher Forrest
HACKING: 3 BOOKS IN 1
Author
Alex Wagner
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State
Author
Glenn Greenwald
Codes and Ciphers - A History of Cryptography
Author
Alexander D'Agapeyeff
What is Blockchain?
Author
John Hargrave
Net Force: Dark Web: Created by Tom Clancy and Steve Pieczenik
Author
Jerome Preisler
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Author
Clint Watts
Designing and Building Security Operations Center
Author
David Nathans
HACKING: Hacking Firewalls & Bypassing Honeypots
Author
Alex Wagner
Social Engineering: The Science of Human Hacking, Second Edition
Author
Christopher Hadnagy
Hacking the Hacker: Learn From The Experts Who Take Down Hackers
Author
Roger A. Grimes
Data Protection and the Cloud: Are the risks too great?
Author
Paul Ticher
Industrial Automation and Control System Security Principles
Author
Ronald L. Krutz
What is the Dark Web?: The truth about the hidden part of the internet
Author
Evan J. Rodgers
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Author
Slava Gomzin
Digital Fortress: A Thriller
Author
Dan Brown
Cryptography: The Key to Digital Security, How It Works, and Why It Matters
Author
Keith Martin
Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing
Author
Adidas Wilson
Wireless Hacking 101
Author
Karina Astudillo
The Quick Guide to Cloud Computing and Cyber Security
Author
Marcia R.T. Pistorious
HACKING: Denial of Service Attacks
Author
Alex Wagner
Hacking : A Beginner's Guide to Learn and Master Ethical Hacking with Practical Examples to Computer, Hacking, Wireless Network, Cybersecurity and Penetration Test (Kali Linux)
Author
Peter Bradley
Recently Added
View More
Skip carousel
carousel previous
carousel next
Internet Security and Privacy Self-Awareness
Author
Mark Millery
Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore
Author
Joe Payne
Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1
Author
John Knowles
Latest Technologies for IT Industry 2021 – A Research Paper
Author
prosenjit sengupta
The Elite Cyber Criminals' Stories: The Secret World of Cyber Criminals and Strategies for Addressing Cyber Crime
Author
A. J. WRIGHT
Evaluation of Some Intrusion Detection and Vulnerability Assessment Tools
Author
Dr. Hedaya Mahmood Alasooly
What is Blockchain?
Author
John Hargrave
Codebreaking Sisters: Our Secret War
Author
Jean Owtram
Burners and Black Markets: Opsec for the Next Generation
Author
Lance Henderson
Tor and the Dark Art of Anonymity
Author
Lance Henderson
Zero Days: A Cyber Thriller
Author
Ian Williams
Secure Chains
Author
Srinivas Mahankali
Fundamental of Cyber Security
Author
Mayank Bhushan
Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
Author
Hans Weber
Schneier on Security
Author
Bruce Schneier
The Haystack (NHB Modern Plays)
Author
Al Blyth
Digital Privacy: Internet Security to Stop Big Companies From Tracking and Selling Your Data
Author
Eric Faster
Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.
Author
Hans Weber
Secret and Urgent - The Story of Codes and Ciphers
Author
Anon
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Author
Bruce Sterling
Kingdom of Lies: Unnerving Adventures in the World of Cybercrime
Author
Kate Fazzini
NIST Cybersecurity Framework: A pocket guide
Author
Alan Calder
The Secret Genesis of Area 51
Author
TD Barnes
Transformation of Cryptography: Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Nomenclatura
Author
Linda A. Bertram
Executive Secrets: Covert Action & the Presidency
Author
William J. Daugherty
Safer @ Home with pfSense®
Author
Michael Lines
Bitcoin Basics
Author
P.S Tecwriden
Hacking With Linux 2020:A Complete Beginners Guide to the World of Hacking Using Linux - Explore the Methods and Tools of Ethical Hacking with Linux
Author
Joseph Kenna
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Author
Ben Buchanan
Overview of Some Windows and Linux Intrusion Detection Tools
Author
Dr. Hidaia Mahmood Alassouli
View All In Cyberwarfare
Loading
Quick navigation
Home
Books
Audiobooks
Documents