Segurança E-books
E-books em alta
Stealing The Network: How to Own the Box Nota: 3 de 5 estrelas3/5Worm: The First Digital World War Nota: 3 de 5 estrelas3/5Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers E-book
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
deTJ O'ConnorNota: 4 de 5 estrelas4/5Debugging: The 9 Indispensable Rules for Finding Even the Most Elusive Software and Hardware Problems E-book
Debugging: The 9 Indispensable Rules for Finding Even the Most Elusive Software and Hardware Problems
deDavid J. AGANSNota: 0 de 5 estrelas0 notasHardware Hacking: Have Fun while Voiding your Warranty Nota: 3 de 5 estrelas3/5Social Engineering: The Science of Human Hacking Nota: 0 de 5 estrelas0 notasPractical Lock Picking: A Physical Penetration Tester's Training Guide Nota: 4 de 5 estrelas4/5The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption E-book
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
deJoshua HoldenNota: 0 de 5 estrelas0 notasStealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD E-book
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series Collector's Edition, Final Chapter, and DVD
deJohnny LongNota: 4 de 5 estrelas4/5Blockchain Basics: A Non-Technical Introduction in 25 Steps Nota: 0 de 5 estrelas0 notasUnsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies E-book
Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies
deCraig P. BauerNota: 0 de 5 estrelas0 notasSockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals E-book
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
deJames C FosterNota: 1 de 5 estrelas1/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Nota: 4 de 5 estrelas4/5No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing E-book
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
deJohnny LongNota: 4 de 5 estrelas4/5Web of Deception: Misinformation on the Internet Nota: 4 de 5 estrelas4/5Stealing the Network: How to Own an Identity: How to Own an Identity Nota: 4 de 5 estrelas4/5Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction Nota: 5 de 5 estrelas5/5Building Robots With Lego Mindstorms Nota: 1 de 5 estrelas1/5Ruby Developers Guide Nota: 3 de 5 estrelas3/5WikiLeaks and the Age of Transparency Nota: 5 de 5 estrelas5/5Introduction to Security Nota: 0 de 5 estrelas0 notasEthereal Packet Sniffing Nota: 0 de 5 estrelas0 notasTrue Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem E-book
True Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem
deJ. A. HitchcockNota: 1 de 5 estrelas1/5Inside the SPAM Cartel: By Spammer-X Nota: 1 de 5 estrelas1/5Digital Forensics with Open Source Tools Nota: 2 de 5 estrelas2/5Identity Management: A Primer Nota: 4 de 5 estrelas4/5Buffer Overflow Attacks: Detect, Exploit, Prevent Nota: 0 de 5 estrelas0 notasThe Pirate Organization: Lessons from the Fringes of Capitalism Nota: 5 de 5 estrelas5/5Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Nota: 3 de 5 estrelas3/5Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool E-book
Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool
deGabriele GiuseppiniNota: 0 de 5 estrelas0 notas
Explorar mais
Há mais para descobrir em Segurança
Cybercrime: Protecting your business, your family and yourself Nota: 0 de 5 estrelas0 notasFundamentals of Network Forensics: A Research Perspective Nota: 0 de 5 estrelas0 notasStructured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security E-book
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
deDmitry KorzunNota: 0 de 5 estrelas0 notasInside Radio: An Attack and Defense Guide Nota: 0 de 5 estrelas0 notasPenetration Testing with Kali Linux Nota: 0 de 5 estrelas0 notasUnderstanding Network Hacks: Attack and Defense with Python Nota: 0 de 5 estrelas0 notasAdvanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE E-book
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
dePrabath SiriwardenaNota: 0 de 5 estrelas0 notasAttribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage E-book
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage
deTimo SteffensNota: 0 de 5 estrelas0 notasHealthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records E-book
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
deBernard Peter RobichauNota: 0 de 5 estrelas0 notasMobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS E-book
Mobile Offensive Security Pocket Guide: A Quick Reference Guide For Android And iOS
deJames StevensonNota: 0 de 5 estrelas0 notasThe Art of Cyber Security: A practical guide to winning the war on cyber crime Nota: 0 de 5 estrelas0 notasHacking Multifactor Authentication Nota: 0 de 5 estrelas0 notasHacking For Dummies Nota: 0 de 5 estrelas0 notasAlice and Bob Learn Application Security Nota: 0 de 5 estrelas0 notasWireshark for Security Professionals: Using Wireshark and the Metasploit Framework E-book
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
deJessey BullockNota: 0 de 5 estrelas0 notasCyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk E-book
Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk
deAndrew GoreckiNota: 0 de 5 estrelas0 notasSecurity Engineering: A Guide to Building Dependable Distributed Systems Nota: 0 de 5 estrelas0 notasThe Bitcoin Standard: The Decentralized Alternative to Central Banking Nota: 4 de 5 estrelas4/5Cybersecurity For Dummies Nota: 0 de 5 estrelas0 notasHacking the Hacker: Learn From the Experts Who Take Down Hackers Nota: 0 de 5 estrelas0 notasCompTIA CySA+ Practice Tests: Exam CS0-002 Nota: 0 de 5 estrelas0 notasOCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817 E-book
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests: Exam 1Z0-819 and Upgrade Exam 1Z0-817
deScott SelikoffNota: 5 de 5 estrelas5/5Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques E-book
Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and Techniques
deVinny TroiaNota: 0 de 5 estrelas0 notasCASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003 Nota: 0 de 5 estrelas0 notasTransformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors E-book
Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
dePerry CarpenterNota: 0 de 5 estrelas0 notasApplied Incident Response Nota: 0 de 5 estrelas0 notasCybersecurity Essentials Nota: 0 de 5 estrelas0 notasSocial Engineering: The Science of Human Hacking Nota: 0 de 5 estrelas0 notasAdvanced Penetration Testing: Hacking the World's Most Secure Networks Nota: 0 de 5 estrelas0 notasTribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership E-book
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
deMarcus J. CareyNota: 0 de 5 estrelas0 notasCompTIA PenTest+ Study Guide: Exam PT0-001 Nota: 0 de 5 estrelas0 notasPenetration Testing For Dummies Nota: 0 de 5 estrelas0 notasCybersecurity Program Development for Business: The Essential Planning Guide E-book
Cybersecurity Program Development for Business: The Essential Planning Guide
deChris MoschovitisNota: 0 de 5 estrelas0 notasThe Pentester BluePrint: Starting a Career as an Ethical Hacker Nota: 0 de 5 estrelas0 notasInvestigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence E-book
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
deNick FurneauxNota: 0 de 5 estrelas0 notasHacking Connected Cars: Tactics, Techniques, and Procedures Nota: 0 de 5 estrelas0 notasTribe of Hackers: Cybersecurity Advice from the Best Hackers in the World Nota: 0 de 5 estrelas0 notasTribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity E-book
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
deMarcus J. CareyNota: 0 de 5 estrelas0 notasHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming E-book
Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming
deMatthew HickeyNota: 0 de 5 estrelas0 notasMalware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware E-book
Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware
deAbhijit MohantaNota: 0 de 5 estrelas0 notasDeveloping Applications with Azure Active Directory: Principles of Authentication and Authorization for Architects and Developers E-book
Developing Applications with Azure Active Directory: Principles of Authentication and Authorization for Architects and Developers
deManas MayankNota: 0 de 5 estrelas0 notasIdentity Attack Vectors: Implementing an Effective Identity and Access Management Solution E-book
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
deMorey J. HaberNota: 0 de 5 estrelas0 notasImplementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines E-book
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
deAbhishek ChopraNota: 0 de 5 estrelas0 notasCyber Operations: Building, Defending, and Attacking Modern Computer Networks Nota: 0 de 5 estrelas0 notasCompTIA Security+ Certification Study Guide: Network Security Essentials Nota: 0 de 5 estrelas0 notasThe IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things Nota: 0 de 5 estrelas0 notasSnowflake Security: Securing Your Snowflake Data Cloud Nota: 0 de 5 estrelas0 notasPCI DSS: An Integrated Data Security Standard Guide Nota: 0 de 5 estrelas0 notasFirewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies E-book
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
deCarey ParkerNota: 0 de 5 estrelas0 notasBeginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data E-book
Beginning Security with Microsoft Technologies: Protecting Office 365, Devices, and Data
deVasantha LakshmiNota: 0 de 5 estrelas0 notasPro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms E-book
Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
deMarius Iulian MihailescuNota: 0 de 5 estrelas0 notasDesigning a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events E-book
Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events
deEric C. ThompsonNota: 0 de 5 estrelas0 notasAdvanced API Security: OAuth 2.0 and Beyond Nota: 0 de 5 estrelas0 notasCyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers E-book
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
deAaron RobertsNota: 0 de 5 estrelas0 notasAzure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment E-book
Azure Security Handbook: A Comprehensive Guide for Defending Your Enterprise Environment
deKarl OtsNota: 0 de 5 estrelas0 notasPowerShell and Python Together: Targeting Digital Investigations Nota: 0 de 5 estrelas0 notasJump-start Your SOC Analyst Career: A Roadmap to Cybersecurity Success Nota: 0 de 5 estrelas0 notasHow to Speak Tech: The Non-Techie’s Guide to Key Technology Concepts Nota: 0 de 5 estrelas0 notasSecuring SQL Server: DBAs Defending the Database Nota: 0 de 5 estrelas0 notasInfrastructure-as-Code Automation Using Terraform, Packer, Vault, Nomad and Consul: Hands-on Deployment, Configuration, and Best Practices E-book
Infrastructure-as-Code Automation Using Terraform, Packer, Vault, Nomad and Consul: Hands-on Deployment, Configuration, and Best Practices
deNavin SabharwalNota: 0 de 5 estrelas0 notasChoose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners E-book
Choose Your InfoSec Path: An Interactive Cybersecurity Adventure for Beginners
deAlexander J. RoxonNota: 0 de 5 estrelas0 notasAt first glance in NFT Investing for Kids and Beginners: Introduction to Non-Fungible Token: Crypto, Bitcoin, Blockchain, and Stocks Investing E-book
At first glance in NFT Investing for Kids and Beginners: Introduction to Non-Fungible Token: Crypto, Bitcoin, Blockchain, and Stocks Investing
deSweet Smart BooksNota: 0 de 5 estrelas0 notasInside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore Nota: 0 de 5 estrelas0 notasGameFi: Crypto, Metaverse, and NFT Gaming Can Make You Millionaire in 2022. A Complete Guide to Blockchain and DeFi Games Investing | Top 10 Play-to-Earn Projects to Make 100$ a Day E-book
GameFi: Crypto, Metaverse, and NFT Gaming Can Make You Millionaire in 2022. A Complete Guide to Blockchain and DeFi Games Investing | Top 10 Play-to-Earn Projects to Make 100$ a Day
deJohn RusselNota: 0 de 5 estrelas0 notasIBM i Security Administration and Compliance Nota: 0 de 5 estrelas0 notasNetwork Security All-in-one: ASA Firepower WSA Umbrella VPN ISE Layer 2 Security E-book
Network Security All-in-one: ASA Firepower WSA Umbrella VPN ISE Layer 2 Security
deRedouane MEDDANENota: 0 de 5 estrelas0 notasImplementing Zero Trust Architecture: An Enterprise Guide Nota: 5 de 5 estrelas5/5Getting started with Deep Learning for Natural Language Processing Nota: 0 de 5 estrelas0 notasDevOps and Containers Security Nota: 0 de 5 estrelas0 notasModern Cybersecurity Practices Nota: 0 de 5 estrelas0 notasYour Data, Their Billions: Unraveling and Simplifying Big Tech Nota: 0 de 5 estrelas0 notasCYBERDEFENSE: Domain Name Systems as the Next Public Utility Nota: 0 de 5 estrelas0 notasAnsible For Containers and Kubernetes By Examples Nota: 0 de 5 estrelas0 notasThe Internet: A Practical Guide for Beginners Nota: 0 de 5 estrelas0 notasSecret Colors Nota: 0 de 5 estrelas0 notasPractical Ethical Hacking from Scratch Nota: 0 de 5 estrelas0 notasRubicon Nota: 0 de 5 estrelas0 notasBlockchain Basics: A Non-Technical Introduction in 25 Steps Nota: 0 de 5 estrelas0 notas