Популярные произведения
Worm: The First Digital World War Рейтинг: 4 из 5 звезд4/5Debugging: The 9 Indispensable Rules for Finding Even the Most Elusive Software and Hardware Problems Электронная книга
Debugging: The 9 Indispensable Rules for Finding Even the Most Elusive Software and Hardware Problems
автораDavid J. AGANSРейтинг: 0 из 5 звезд0 оценокWorm: The First Digital World War Рейтинг: 3 из 5 звезд3/5Stealing The Network: How to Own the Box Рейтинг: 3 из 5 звезд3/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Аудиокнига
Cryptography: The Key to Digital Security, How It Works, and Why It Matters
автораKeith MartinРейтинг: 4 из 5 звезд4/5Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World Аудиокнига
Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World
автораBruce SchneierРейтинг: 5 из 5 звезд5/5Blockchain For Dummies: 2nd Edition Рейтинг: 5 из 5 звезд5/5The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption Электронная книга
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
автораJoshua HoldenРейтинг: 0 из 5 звезд0 оценокBlockchain and the Law: The Rule of Code Рейтинг: 5 из 5 звезд5/5Schneier on Security Рейтинг: 5 из 5 звезд5/5Liars and Outliers: Enabling the Trust that Society Needs to Thrive Рейтинг: 5 из 5 звезд5/5Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies Электронная книга
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
автораCraig P. BauerРейтинг: 0 из 5 звезд0 оценокSecurity Awareness For Dummies Рейтинг: 0 из 5 звезд0 оценокThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Электронная книга
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
автораBruce SterlingРейтинг: 4 из 5 звезд4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Рейтинг: 5 из 5 звезд5/5Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers Электронная книга
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
автораTJ O'ConnorРейтинг: 4 из 5 звезд4/5Building Robots With Lego Mindstorms Рейтинг: 1 из 5 звезд1/5Stealing the Network: How to Own an Identity: How to Own an Identity Электронная книга
Stealing the Network: How to Own an Identity: How to Own an Identity
автораRyan RussellРейтинг: 4 из 5 звезд4/5Data For the People: How to Make Our Post-Privacy Economy Work for You Аудиокнига
Data For the People: How to Make Our Post-Privacy Economy Work for You
автораAndreas S. WeigendРейтинг: 3 из 5 звезд3/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Электронная книга
Practical Lock Picking: A Physical Penetration Tester's Training Guide
автораDeviant OllamРейтинг: 4 из 5 звезд4/5Social Engineering: The Science of Human Hacking Рейтинг: 0 из 5 звезд0 оценокHardware Hacking: Have Fun while Voiding your Warranty Рейтинг: 3 из 5 звезд3/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Аудиокнига
The Digital Silk Road: China's Quest to Wire the World and Win the Future
автораJonathan E. HillmanРейтинг: 5 из 5 звезд5/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Рейтинг: 5 из 5 звезд5/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Рейтинг: 0 из 5 звезд0 оценокStealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD Электронная книга
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD
автораJohnny LongРейтинг: 4 из 5 звезд4/5No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Электронная книга
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
автораJohnny LongРейтинг: 4 из 5 звезд4/5The Pirate Organization: Lessons from the Fringes of Capitalism Электронная книга
The Pirate Organization: Lessons from the Fringes of Capitalism
автораRodolphe DurandРейтинг: 5 из 5 звезд5/5Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals Электронная книга
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
автораJames C FosterРейтинг: 1 из 5 звезд1/5Web of Deception: Misinformation on the Internet Рейтинг: 4 из 5 звезд4/5
«Все» на тему «Безопасность»
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA) Электронная книга
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)
автораBenjamin WalkerРейтинг: 0 из 5 звезд0 оценокCybersecurity and Defense in 2021 2nd Ed.: Using awareness, cyber defense and best practices to protect yourself against cyberwarfare and attackers Аудиокнига
Cybersecurity and Defense in 2021 2nd Ed.: Using awareness, cyber defense and best practices to protect yourself against cyberwarfare and attackers
автораMichael Anton Goedeker MSc.Рейтинг: 5 из 5 звезд5/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Электронная книга
The Pentester BluePrint: Starting a Career as an Ethical Hacker
автораPhillip L. WylieРейтинг: 0 из 5 звезд0 оценокSocial Engineering: The Science of Human Hacking Рейтинг: 0 из 5 звезд0 оценокCybersecurity For Dummies Рейтинг: 0 из 5 звезд0 оценокCybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering Электронная книга
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
автораQuinn KiserРейтинг: 5 из 5 звезд5/5CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002) Электронная книга
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
автораBobby E. RogersРейтинг: 5 из 5 звезд5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Электронная книга
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
автораRoger A. GrimesРейтинг: 0 из 5 звезд0 оценокThe Wires of War: Technology and the Global Struggle for Power Рейтинг: 4 из 5 звезд4/5Hacking For Dummies Рейтинг: 0 из 5 звезд0 оценокCISSP Practice Exams, Fifth Edition Рейтинг: 0 из 5 звезд0 оценокCompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601) Электронная книга
CompTIA Security+ Certification Study Guide, Fourth Edition (Exam SY0-601)
автораGlen E. ClarkeРейтинг: 5 из 5 звезд5/5Hacking Connected Cars: Tactics, Techniques, and Procedures Рейтинг: 0 из 5 звезд0 оценокThe Bitcoin Standard: The Decentralized Alternative to Central Banking Электронная книга
The Bitcoin Standard: The Decentralized Alternative to Central Banking
автораSaifedean AmmousРейтинг: 4 из 5 звезд4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Рейтинг: 5 из 5 звезд5/5Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis Электронная книга
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis
автораMark TalabisРейтинг: 4 из 5 звезд4/5Metaverse and NFT: Discovering Web 3.0, Investing in Non-fungible Tokens, Virtual Reality, Crypto Gaming, and Art Аудиокнига
Metaverse and NFT: Discovering Web 3.0, Investing in Non-fungible Tokens, Virtual Reality, Crypto Gaming, and Art
автораDonn NewmanРейтинг: 0 из 5 звезд0 оценокBurp Suite Essentials Рейтинг: 4 из 5 звезд4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Электронная книга
The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse
автораNick SelbyРейтинг: 0 из 5 звезд0 оценокIntroduction to Security Рейтинг: 0 из 5 звезд0 оценокBlockchain For Dummies: 2nd Edition Рейтинг: 5 из 5 звезд5/5Cybersecurity For Dummies Рейтинг: 4 из 5 звезд4/5Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques Электронная книга
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
автораVinny TroiaРейтинг: 0 из 5 звезд0 оценок7 Rules to Influence Behaviour and Win at Cyber Security Awareness Электронная книга
7 Rules to Influence Behaviour and Win at Cyber Security Awareness
автораChirag JoshiРейтинг: 5 из 5 звезд5/5CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition Электронная книга
CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition
автораPeter H. GregoryРейтинг: 5 из 5 звезд5/5ISO 27001 Controls – A guide to implementing and auditing Рейтинг: 0 из 5 звезд0 оценокInformation Security Risk Management for ISO27001/ISO27002 Рейтинг: 5 из 5 звезд5/5EXCEL VBA : A Comprehensive, Step-By-Step Guide On Excel VBA Finance For Data Reporting And Business Analysis: 4 Электронная книга
EXCEL VBA : A Comprehensive, Step-By-Step Guide On Excel VBA Finance For Data Reporting And Business Analysis: 4
автораPeter BradleyРейтинг: 5 из 5 звезд5/5Amazon Web Services (AWS) Interview Questions and Answers Рейтинг: 5 из 5 звезд5/5Blockchain: The Insights You Need from Harvard Business Review Аудиокнига
Blockchain: The Insights You Need from Harvard Business Review
автораHarvard Business ReviewРейтинг: 4 из 5 звезд4/5
Узнать больше
Недавно добавленные
Cybercrime: Protecting your business, your family and yourself Рейтинг: 0 из 5 звезд0 оценокFundamentals of Network Forensics: A Research Perspective Рейтинг: 0 из 5 звезд0 оценокStructured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security Электронная книга
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
автораDmitry KorzunРейтинг: 0 из 5 звезд0 оценокInside Radio: An Attack and Defense Guide Рейтинг: 0 из 5 звезд0 оценокPenetration Testing with Kali Linux Рейтинг: 0 из 5 звезд0 оценокUnderstanding Network Hacks: Attack and Defense with Python Рейтинг: 0 из 5 звезд0 оценокAdvanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE Электронная книга
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
автораPrabath SiriwardenaРейтинг: 0 из 5 звезд0 оценокAttribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage Электронная книга
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
автораTimo SteffensРейтинг: 0 из 5 звезд0 оценокHealthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records Электронная книга
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
автораBernard Peter RobichauРейтинг: 0 из 5 звезд0 оценокMobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS Электронная книга
Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS
автораJames StevensonРейтинг: 0 из 5 звезд0 оценокThe Art of Cyber Security: A practical guide to winning the war on cyber crime Электронная книга
The Art of Cyber Security: A practical guide to winning the war on cyber crime
автораGary HibberdРейтинг: 0 из 5 звезд0 оценокHacking Multifactor Authentication Рейтинг: 0 из 5 звезд0 оценокWireshark for Security Professionals: Using Wireshark and the Metasploit Framework Электронная книга
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
автораJessey BullockРейтинг: 0 из 5 звезд0 оценокHacking For Dummies Рейтинг: 0 из 5 звезд0 оценокAlice and Bob Learn Application Security Рейтинг: 0 из 5 звезд0 оценокSecurity Engineering: A Guide to Building Dependable Distributed Systems Электронная книга
Security Engineering: A Guide to Building Dependable Distributed Systems
автораRoss AndersonРейтинг: 0 из 5 звезд0 оценокCyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk Электронная книга
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk
автораAndrew GoreckiРейтинг: 0 из 5 звезд0 оценокThe Bitcoin Standard: The Decentralized Alternative to Central Banking Электронная книга
The Bitcoin Standard: The Decentralized Alternative to Central Banking
автораSaifedean AmmousРейтинг: 4 из 5 звезд4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Электронная книга
Hacking the Hacker: Learn From the Experts Who Take Down Hackers
автораRoger A. GrimesРейтинг: 0 из 5 звезд0 оценокCompTIA CySA+ Practice Tests: Exam CS0-002 Рейтинг: 0 из 5 звезд0 оценокHunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques Электронная книга
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
автораVinny TroiaРейтинг: 0 из 5 звезд0 оценокOCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817 Электронная книга
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817
автораScott SelikoffРейтинг: 5 из 5 звезд5/5CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003 Электронная книга
CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003
автораJeff T. ParkerРейтинг: 0 из 5 звезд0 оценокTransformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors Электронная книга
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
автораPerry CarpenterРейтинг: 0 из 5 звезд0 оценокApplied Incident Response Рейтинг: 0 из 5 звезд0 оценокCybersecurity Essentials Рейтинг: 0 из 5 звезд0 оценокAdvanced Penetration Testing: Hacking the World's Most Secure Networks Электронная книга
Advanced Penetration Testing: Hacking the World's Most Secure Networks
автораWil AllsoppРейтинг: 0 из 5 звезд0 оценокCompTIA PenTest+ Study Guide: Exam PT0-001 Рейтинг: 0 из 5 звезд0 оценокTribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership Электронная книга
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
автораMarcus J. CareyРейтинг: 0 из 5 звезд0 оценокPenetration Testing For Dummies Рейтинг: 0 из 5 звезд0 оценок
Откройте для себя еще больше в категории Безопасность
Cybercrime: Protecting your business, your family and yourself Рейтинг: 0 из 5 звезд0 оценокFundamentals of Network Forensics: A Research Perspective Рейтинг: 0 из 5 звезд0 оценокStructured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security Электронная книга
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
автораDmitry KorzunРейтинг: 0 из 5 звезд0 оценокInside Radio: An Attack and Defense Guide Рейтинг: 0 из 5 звезд0 оценокPenetration Testing with Kali Linux Рейтинг: 0 из 5 звезд0 оценокUnderstanding Network Hacks: Attack and Defense with Python Рейтинг: 0 из 5 звезд0 оценокAdvanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE Электронная книга
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
автораPrabath SiriwardenaРейтинг: 0 из 5 звезд0 оценокAttribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage Электронная книга
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
автораTimo SteffensРейтинг: 0 из 5 звезд0 оценокHealthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records Электронная книга
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
автораBernard Peter RobichauРейтинг: 0 из 5 звезд0 оценокMobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS Электронная книга
Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS
автораJames StevensonРейтинг: 0 из 5 звезд0 оценокThe Art of Cyber Security: A practical guide to winning the war on cyber crime Электронная книга
The Art of Cyber Security: A practical guide to winning the war on cyber crime
автораGary HibberdРейтинг: 0 из 5 звезд0 оценокHacking Multifactor Authentication Рейтинг: 0 из 5 звезд0 оценокWireshark for Security Professionals: Using Wireshark and the Metasploit Framework Электронная книга
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
автораJessey BullockРейтинг: 0 из 5 звезд0 оценокHacking For Dummies Рейтинг: 0 из 5 звезд0 оценокAlice and Bob Learn Application Security Рейтинг: 0 из 5 звезд0 оценокSecurity Engineering: A Guide to Building Dependable Distributed Systems Электронная книга
Security Engineering: A Guide to Building Dependable Distributed Systems
автораRoss AndersonРейтинг: 0 из 5 звезд0 оценокCyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk Электронная книга
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk
автораAndrew GoreckiРейтинг: 0 из 5 звезд0 оценокThe Bitcoin Standard: The Decentralized Alternative to Central Banking Электронная книга
The Bitcoin Standard: The Decentralized Alternative to Central Banking
автораSaifedean AmmousРейтинг: 4 из 5 звезд4/5Cybersecurity For Dummies Рейтинг: 0 из 5 звезд0 оценок