Cyberveiligheid

  1. The Art of Deception: Book Summary & Analysis William L. Simon
  2. Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
  3. El arte del engaño: Resumen y Análisis William L. Simon
  4. Schneier on Security Bruce Schneier
    4
  5. Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
    3.5
  6. Superintelligence on the Horizon: Steering the Course of Cybersecurity Felipe Chavarro Polanía
  7. Desconexión Digital y Seguridad Informática en el Trabajo María Dolores Pérez Rodríguez
  8. Sistemas de Gestión de Seguridad de la Información (Iso 27001:2022) José Manuel Cortés
  9. Data Management and Security in Blockchain Systems
  10. Cryptography and Data Security: Book 1: Comprehensive Introduction to Foundations of Cryptography, Encryption and Decryption Techniques, Digital Signatures and Authentication. Conor Williams
  11. Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
  12. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    3.5
  13. Cybersecurity Threats and Digital Safety: Protecting Yourself in a Connected World William Ubagan
  14. Securing Your Sanctuary: A Comprehensive Guide to Home Safety William Ubagan
  15. Cryptography and Data Security: Book 1: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice Daniel Garfield
  16. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
  17. Cryptography and Data Security: Book 2: Best Practices for Cryptography and Data Security Daniel Garfield
  18. Cybersecurity for Beginners: A Practical Guide to Cybersecurity Fundamentals for Beginners SIMON JEFFERSON
  19. CISM Success Secrets: Elevate Your Cybersecurity Skills Now!: "Boost your CISM exam readiness with dynamic audio lessons for peak cybersecurity performance!" KnowledgeBridge Audiobooks
  20. Guardians of the Digital Realm: Securing the Cyber Frontier: Strategies and Innovations in Protecting the Virtual World Ava Johnson
  21. CompTIA Secrets: Unlock Your Security Success Today: "Achieve CompTIA success! Access captivating audio lessons crafted for peak exam results today!" Harris Penrose
  22. Learning Python Networking: Utilize Python 3 to get network applications up and running quickly and easily Sam Washington
  23. Learning iOS Security: Enhance the security of your iOS platform and applications using iOS-centric security techniques Allister Banks
  24. Combating Cyberattacks Targeting the AI Ecosystem: Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities Aditya K. Sood
  25. Ciberseguridad: Una Simple Guía para Principiantes sobre Ciberseguridad, Redes Informáticas y Cómo Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingeniería Social Quinn Kiser
  26. Ultimate AWS CDK for Infrastructure Automation Anish Kumar
  27. Cloud Security in der Praxis: Leitfaden für sicheres Softwaredesign und Deployment Chris Dotson
  28. Sitting Duck - The phone call you don't want to receive Leigh Kefford
  29. Security and Cyber Laws Digital Defenders Manish Soni
  30. Surviving A Cyberattack: A Comprehensive Guide to Digital Security for Families and Businesses Todd G. Shipley
  31. The Sovereign Illusion: Bridging Cryptic Codes and Catastrophic Markets Elliot Monroe
  32. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  33. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Dr. Tracy Celaya Brown
  34. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
  35. Cybersecurity - Data Protection and Strategies: First Edition Wesley Palmer
  36. The Art of Deception: Controlling the Human Element of Security William L. Simon
    4
  37. Piraté: Guide Ultime De Kali Linux Et De Piratage Sans Fil Avec Des Outils De Test De Sécurité Alan T. Norman
  38. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    4.4
  39. Cybersecurity For Beginners: How to Manage Risk, Using the NIST Cybersecurity Framework John Knowles
    1
  40. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  41. Handbuch Cybersecurity für die öffentliche Verwaltung
  42. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    4
  43. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  44. Nuevos espacios de seguridad nacional: Cómo proteger la información en el ciberespacio Dr. Cristian Barria Huidobro
  45. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    4
  46. Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient – ein Blick über die Schulter eines erfolgreichen Bug Hunters Peter Yaworski
  47. Un fantasma en el sistema: Las aventuras del hacker más buscado del mundo William L. Simon
    5
  48. The Smartest Person in the Room Christian Espinosa
  49. Gehackt! - Stuxnet: een digitale atoombom Hans Klis
    4.1
  50. The Secure Board: How To Be Confident That Your Organisation Is Cyber Safe Claire Pales