Security Audiobooks
Trending audiobooks
The most talked-about and well-loved Security titles this month.
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5CISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5Blockchain For Dummies Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Cybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know Rating: 4 out of 5 stars4/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Alice and Bob Learn Application Security Rating: 5 out of 5 stars5/5How I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5Schneier on Security Rating: 4 out of 5 stars4/5Liars and Outliers: Enabling the Trust that Society Needs to Thrive Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5Ransomware Protection Playbook Rating: 5 out of 5 stars5/5Blockchain and the Law: The Rule of Code Rating: 4 out of 5 stars4/5
Others you might like
From classic favorites to brand new hits, it’s all here for you to discover.
There’s more to discover in Security
Escape into new audiobooks and new adventures.
Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO’s Guide to Protecting the Digital World Rating: 0 out of 5 stars0 ratingsAdvanced OSINT Strategies: Online Investigations And Intelligence Gathering Rating: 0 out of 5 stars0 ratingsComputer Science 2.0 Beginners Crash Course - Python, Javascript, Cyber Security And Algorithms Rating: 0 out of 5 stars0 ratingsHacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 0 out of 5 stars0 ratingsMind Hacking for Self-Mastery Rating: 5 out of 5 stars5/5Michael Saylor's Bitcoin MicroStrategy Rating: 0 out of 5 stars0 ratingsHACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5See Yourself in Cyber: Security Careers Beyond Hacking Rating: 0 out of 5 stars0 ratingsAI Cybersecurity: Guardians of the Net Rating: 0 out of 5 stars0 ratingsMalware Analysis: Digital Forensics, Cybersecurity, And Incident Response Rating: 0 out of 5 stars0 ratingsHACKING: HOW TO HACK: PENETRATION TESTING HACKING BOOK | 3 BOOKS IN 1 Rating: 0 out of 5 stars0 ratingsBitcoin for Beginners & Dummies: Cryptocurrency & Blockchain Rating: 4 out of 5 stars4/5HACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsOSINT 101 Handbook: Expert-Level Intelligence Gathering: Advanced Reconnaissance, Threat Assessment, And Counterintelligence Rating: 0 out of 5 stars0 ratingsSummary of Bruce Sterling's The Hacker Crackdown Law and Disorder on the Electronic Frontier Rating: 0 out of 5 stars0 ratingsOWASP Top 10 Vulnerabilities: Beginner's Guide To Web Application Security Risks Rating: 0 out of 5 stars0 ratingsKali Linux CLI Boss: Novice To Command Line Maestro Rating: 0 out of 5 stars0 ratingsCyberwatch 101: The Art Of Cyber Defense And Infrastructure Security Rating: 0 out of 5 stars0 ratingsHack Your Way to Security Bundle, 2 in 1 Bundle Rating: 0 out of 5 stars0 ratingsDarknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Social Engineering for Beginners: Manipulating Minds, Securing Systems Rating: 0 out of 5 stars0 ratingsCYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Pentesting 101: Cracking Gadgets And Hacking Software Rating: 0 out of 5 stars0 ratingsCybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity Rating: 5 out of 5 stars5/5Summary of Andy Greenberg's Sandworm Rating: 4 out of 5 stars4/5Trojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Practical Fraud Prevention: Fraud and AML Analytics for Fintech and eCommerce, Using SQL and Python Rating: 0 out of 5 stars0 ratingsHacking for Beginners Rating: 5 out of 5 stars5/5HOW TO IMPLEMENT ARTIFICIAL INTELLIGENCE AND CYBERSECURITY IN MODERN BUSINESSES: BASICS AND GUIDES FOR DUMMIES AND BEGINNERS Rating: 0 out of 5 stars0 ratingsThe Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5Cyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Cyber Security: Essential principles to secure your organisation Rating: 5 out of 5 stars5/5ISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5The Tao of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsZero Trust Security: Building Cyber Resilience & Robust Security Postures Rating: 0 out of 5 stars0 ratingsISO 27001 Controls – A guide to implementing and auditing Rating: 0 out of 5 stars0 ratingsNIST Cloud Security: Cyber Threats, Policies, And Best Practices Rating: 5 out of 5 stars5/5(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Rating: 5 out of 5 stars5/5The Smartest Person in the Room Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsThreats: What Every Engineer Should Learn From Star Wars Rating: 5 out of 5 stars5/5Blockchain for Kids, Teens, Adults, and Dummies: Introduction to Crypto Investing and Blockchain Technology in Simple Words Rating: 0 out of 5 stars0 ratingsThe Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Rating: 0 out of 5 stars0 ratingsCryptography And Computer Science: Design Manual For Algorithms, Codes And Ciphers Rating: 0 out of 5 stars0 ratingsHacking Wireless With Kali Linux: Learn Fast How To Penetrate Any Wireless Network | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsCloud Security For Dummies Rating: 5 out of 5 stars5/5Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career Rating: 0 out of 5 stars0 ratingsBitcoin For Beginners: Bitcoin, Bitcoin Mining, Cryptography And The Cypherpunk Movement | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Real Business of Blockchain: How Leaders Can Create Value in a New Digital Age Rating: 5 out of 5 stars5/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Blockchain: Everything You Need to Know About Blockchain Rating: 5 out of 5 stars5/5Malware Reverse Engineering: Cracking The Code Rating: 0 out of 5 stars0 ratingsBurners and Black Markets: How to Be Invisible on Android, Blackberry & Iphone Rating: 5 out of 5 stars5/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5Governance of Enterprise IT based on COBIT 5: A Management Guide Rating: 0 out of 5 stars0 ratingsBitcoin: All You Need to Know Rating: 0 out of 5 stars0 ratingsCybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5Ethical Hacking With Kali Linux: Learn Fast How To Penetrate Wired Or Wireless Networks | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsDigital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsCybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5The Missing Training Manual Rating: 0 out of 5 stars0 ratingsThe Psychology of Information Security: Resolving conflicts between security compliance and human behaviour Rating: 0 out of 5 stars0 ratingsReconnaissance 101: Footprinting & Information Gathering: Ethical Hackers Bible To Collect Data About Target Systems Rating: 0 out of 5 stars0 ratingsCyber Wargaming: Research and Education for Security in a Dangerous Digital World Rating: 0 out of 5 stars0 ratingsWireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark Rating: 0 out of 5 stars0 ratingsCISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5Cyberwar: How Russian Hackers and Trolls Helped Elect a President What We Don't, Can't, and Do Know Rating: 4 out of 5 stars4/5The Secret Life: Three True Stories of the Digital Age Rating: 3 out of 5 stars3/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5The Digital Silk Road: China's Quest to Wire the World and Win the Future Rating: 5 out of 5 stars5/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5BEYOND BITCOIN INVESTING: Why other cryptocurrencies are so important and easy to make digital cash now Rating: 0 out of 5 stars0 ratingsAlice and Bob Learn Application Security Rating: 5 out of 5 stars5/5Cybersecurity Handbook for Small to Mid-size Businesses Rating: 0 out of 5 stars0 ratingsHow I Rob Banks: And Other Such Places Rating: 4 out of 5 stars4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Rating: 5 out of 5 stars5/5Red Team Operations: Attack: Black Box Hacking, Social Engineering & Web App Scanning Rating: 5 out of 5 stars5/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Certified Information Security Manager CISM Study Guide Rating: 5 out of 5 stars5/5Building a Cyber Risk Management Program: Evolving Security for the Digital Age Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Rating: 5 out of 5 stars5/5Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Bitcoin: Invest In Digital Gold Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Ethical Hacking for Beginners: Comprehensive Introduction to the World of Cybersecurity Rating: 0 out of 5 stars0 ratingsThe DevSecOps Playbook: Deliver Continuous Security at Speed Rating: 0 out of 5 stars0 ratingsCompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Maximizing Investment Returns: Navigating the Crypto Market: A Comprehensive Guide to Successful Investments Rating: 0 out of 5 stars0 ratingsBlockchain For Dummies Rating: 5 out of 5 stars5/5Hackers & Painters: Big Ideas from the Computer Age Rating: 4 out of 5 stars4/5Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsA Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsCryptography: A Very Short Introduction Rating: 5 out of 5 stars5/5Liars and Outliers: Enabling the Trust that Society Needs to Thrive Rating: 4 out of 5 stars4/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5Breached!: Why Data Security Law Fails and How to Improve It: 1st Edition Rating: 5 out of 5 stars5/5Security Awareness For Dummies Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5The Pentester BluePrint: Starting a Career as an Ethical Hacker Rating: 5 out of 5 stars5/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsInvestigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Deciphering the Bitcoin Blueprint: Mastering Bitcoin: Strategies for Success in the Cryptocurrency Market Rating: 0 out of 5 stars0 ratingsEthical Hacking & Cybersecurity For Beginners: Pen Test Workflow & Lab Building Basics | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsCrypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age Rating: 4 out of 5 stars4/5Blockchain: The Insights You Need from Harvard Business Review Rating: 4 out of 5 stars4/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Crypto Horizons: Beyond Bitcoin: Unraveling the Potential of Altcoins and New Crypto Projects Rating: 0 out of 5 stars0 ratingsThe CISO Evolution: Business Knowledge for Cybersecurity Executives Rating: 5 out of 5 stars5/5Cybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5Cyber War: The Next Threat to National Security and What to Do About It Rating: 3 out of 5 stars3/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5Blockchain and the Law: The Rule of Code Rating: 4 out of 5 stars4/5Blue Team Operations: Defense: Operational Security, Incident Response & Digital Forensics Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Cryptocurrency: 3 Manuscripts: Blockchain, Cryptocurrency, Bitcoin Rating: 3 out of 5 stars3/5Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology Rating: 5 out of 5 stars5/5The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Rating: 4 out of 5 stars4/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5Ransomware Protection Playbook Rating: 5 out of 5 stars5/5Bitcoin & Cryptocurrency Technologies (3 Books in 1): Bitcoin Invest in Digital Gold, Wallet Technology Book and Anonymous Altcoins Rating: 0 out of 5 stars0 ratingsGuardians of Secrecy: Your Expert Guide to Protecting Your Confidential Information Rating: 0 out of 5 stars0 ratingsThe Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5ISO27001/ISO27002:2013: A Pocket Guide Rating: 0 out of 5 stars0 ratingsCybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Schneier on Security Rating: 4 out of 5 stars4/5Linux for Beginners: 37 Linux Commands you Must Know Rating: 4 out of 5 stars4/5Risk Management and ISO 31000: A pocket guide Rating: 0 out of 5 stars0 ratingsBug Hunting 101: Novice To Virtuoso: Web Application Security For Ethical Hackers Rating: 0 out of 5 stars0 ratingsYour Short Guide to Security Systems: What You Need to Know Before Purchasing a Security System to Protect Your Family and Assets Rating: 0 out of 5 stars0 ratingsHow To Protect Your Personal Computer: Your Step By Step Guide To Protecting Your Personal Computer Rating: 0 out of 5 stars0 ratingsHow to Build a Cyber-Resilient Organization Rating: 0 out of 5 stars0 ratingsSummary of Ellen Notbohm's Ten Things Every Child with Autism Wishes You Knew Rating: 0 out of 5 stars0 ratingsRethinking IT Security: What Needs to Be Said — How Can We Solve the IT Security Problem Long Term? Rating: 0 out of 5 stars0 ratingsCryptocurrency: Everything You Need to Know About Cryptocurrency Rating: 0 out of 5 stars0 ratingsCyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5OSINT Commando: Penetrating Networks With Spokeo, Spiderfoot, Seon, And Lampyre Rating: 0 out of 5 stars0 ratingsGuarding Against Online Identity Fraud: A Simple Guide to Online Security Rating: 0 out of 5 stars0 ratingsEthereum: Everything You Need to Know About Ethereum Rating: 0 out of 5 stars0 ratingsSecurity in the Digital World Rating: 0 out of 5 stars0 ratingsThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsBlockchain: The New Internet? How You Can Benefit from Blockchain Technology Beyond Bitcoin, Cryptocurrency, and Ethereum Rating: 0 out of 5 stars0 ratingsCybersecurity Fundamentals Explained Rating: 0 out of 5 stars0 ratingsA Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Rating: 0 out of 5 stars0 ratingsNMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library Rating: 0 out of 5 stars0 ratingsEthical Hacking Rating: 0 out of 5 stars0 ratingsThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 4 out of 5 stars4/5Summary of Andy Greenberg's Sandworm Rating: 0 out of 5 stars0 ratingsOSINT Cracking Tools: Maltego, Shodan, Aircrack-NG, Recon-NG Rating: 0 out of 5 stars0 ratingsCrypto Wealth Navigation: Cryptocurrency Investment Fundamentals: Building Wealth in the Digital Age Rating: 0 out of 5 stars0 ratingsBitcoin And Blockchain For Beginners: Bitcoin, Bitcoin Mining And Blockchain Basics | 2 Books In 1 Rating: 0 out of 5 stars0 ratingsGet in the Game: How to Level Up Your Business with Gaming, Esports, and Emerging Technologies Rating: 0 out of 5 stars0 ratingsThe Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5NFT: What Malevich Didn't Know Rating: 0 out of 5 stars0 ratingsMetasploit Masterclass For Ethical Hackers: Expert Penetration Testing And Vulnerability Assessment Rating: 0 out of 5 stars0 ratingsBitcoin: Everything You Need to Know About Bitcoin Rating: 0 out of 5 stars0 ratingsDefense In Depth: Network Security And Cyber Resilience Rating: 0 out of 5 stars0 ratingsBitcoin and Cryptocurrency: 2 Books in 1, Discover the secrets to the Blockchain and get ready for the 2020 Bull Run! Rating: 0 out of 5 stars0 ratingsFight Off Hackers Rating: 5 out of 5 stars5/5Summary of Kevin D. Mitnick & William L. Simon’s The Art of Deception Rating: 0 out of 5 stars0 ratingsMetaverse for Beginners: The Ultimate Guide to Understanding and Investing in Web 3.0, NFTs, Crypto Gaming, and Virtual Reality Rating: 0 out of 5 stars0 ratingsMetaverse and NFT: Discovering Web 3.0, Investing in Non-fungible Tokens, Virtual Reality, Crypto Gaming, and Art Rating: 0 out of 5 stars0 ratingsBitcoin: 2 Manuscripts: Blockchain, Cryptocurrency Rating: 0 out of 5 stars0 ratingsBlockchain for Everyone - A Guide for Absolute Newbies: The Technology and the Cyber-Economy That Have Already Changed Our Future Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsThe Art of Cyber Security: A practical guide to winning the war on cyber crime Rating: 0 out of 5 stars0 ratingsOSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith Rating: 0 out of 5 stars0 ratingsData For the People: How to Make Our Post-Privacy Economy Work for You Rating: 3 out of 5 stars3/5The Security Consultant's Handbook Rating: 0 out of 5 stars0 ratingsNFT for Beginners: An Essential Guide to Understanding and Investing in Non-fungible Tokens and Crypto Art Rating: 0 out of 5 stars0 ratingsGray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Maturity Model Certification (CMMC) – A pocket guide Rating: 0 out of 5 stars0 ratingsThe Enigma Story: The Truth Behind the 'Unbreakable' World War II Cipher Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsNine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 0 out of 5 stars0 ratingsZero Day: Novice No More: Expose Software Vulnerabilities And Eliminate Bugs Rating: 0 out of 5 stars0 ratingsBurp Suite: Novice To Ninja: Pen Testing Cloud, Network, Mobile & Web Applications Rating: 0 out of 5 stars0 ratingsThrough the Firewall: The Alchemy of Turning Crisis into Opportunity Rating: 5 out of 5 stars5/5The Basics of Hacking Rating: 5 out of 5 stars5/5Your Data, Their Billions: Unraveling and Simplifying Big Tech Rating: 4 out of 5 stars4/5Cyber Warfare in 2022+ Rating: 0 out of 5 stars0 ratings
Read what you want, how you want
Discover millions of ebooks, audiobooks, podcasts, and so much more with a free trial.
Only $11.99/month after trial. Cancel anytime.