Cyberveiligheid

Cyberveiligheid

  1. The Art of Deception: Book Summary & Analysis Kevin D. Mitnick
  2. Cybersecurity: The New Frontline in Protecting Our Digital Future Marcus Kline
  3. El arte del engaño: Resumen y Análisis Kevin D. Mitnick
  4. Schneier on Security Bruce Schneier
    4
  5. Liars and Outliers: Enabling the Trust that Society Needs to Thrive Bruce Schneier
    3.5
  6. Cybersecurity Fundamentals: How to Establish Effective Security Management Functions John Knowles
    3.5
  7. Cybersecurity For Beginners: How to apply the NIST Risk Management Framework John Knowles
  8. Coding Democracy: How a Growing Hacking Movement Is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism: How a Growing Hacking Movement is Disrupting Concentrations of Power, Mass Surveillance, and Authoritarianism in the Digital Age Maureen Webb
    3.3
  9. You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Ira Winkler, CISSP
  10. The Art of Deception: Controlling the Human Element of Security Steve Wozniak
    4
  11. Piraté: Guide Ultime De Kali Linux Et De Piratage Sans Fil Avec Des Outils De Test De Sécurité Alan T. Norman
  12. Social Engineering: The Art of Human Hacking Christopher Hadnagy
    4.4
  13. Cybersecurity For Beginners: How to Manage Risk, Using the NIST Cybersecurity Framework John Knowles
    1
  14. Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 John Knowles
  15. Handbuch Cybersecurity für die öffentliche Verwaltung
  16. Zuckerberg Senate Transcript 2018: Navigating Tech, Privacy, & Responsibility: A Deep Dive into Zuckerberg's Senate Testimony 2018 US Senat
  17. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide: 2nd Edition Ben Malisow
    4
  18. Cybercrime and the Darknet: Revealing the hidden underworld of the internet Cath Senker
  19. Nuevos espacios de seguridad nacional: Cómo proteger la información en el ciberespacio Dr. Cristian Barria Huidobro
  20. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
    4
  21. Hacking und Bug Hunting: Wie man Softwarefehler aufspürt und damit Geld verdient – ein Blick über die Schulter eines erfolgreichen Bug Hunters Peter Yaworski
  22. Un fantasma en el sistema: Las aventuras del hacker más buscado del mundo William L. Simon
    5
  23. The Smartest Person in the Room Christian Espinosa
  24. Gehackt! - Stuxnet: een digitale atoombom Hans Klis
    4.1
  25. The Secure Board: How To Be Confident That Your Organisation Is Cyber Safe Claire Pales
  26. Je hebt wél iets te verbergen: Over het levensbelang van privacy Maurits Martijn
    4.4
  27. Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan Worth Books
  28. How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses Perry S
    1
  29. Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Chris Castaldo
    3.5
  30. The Digital Silk Road: China's Quest to Wire the World and Win the Future Jonathan E. Hillman
    3.5
  31. Enter Karl Olsberg
    4.3
  32. Honungsapan André Catry
    3.6
  33. A Vulnerable System: The History of Information Security in the Computer Age Andrew J. Stewart
    4.4
  34. Cyber security: Een hoorcollege over de kansen en gevaren in cyberspace Bibi van den Berg
    4.5
  35. Hacking of Computer Networks: Full Course on Hacking of Computer Networks Dr. Hidaia Mahmood Alassouli
    5
  36. La seguridad para los menores en internet Erik de Luis Gargallo
  37. Unmasking the Social Engineer: The Human Element of Security Christopher Hadnagy
    4.2
  38. Löschkonzept nach DSGVO erstellen und anwenden Forum Verlag Herkert GmbH
  39. 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Kim Crawley
    3
  40. Ransomware Protection Playbook Roger A. Grimes
    3
  41. Cybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Trust Genics
  42. Cybersecurity: The Hacker Proof Guide to Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Trust Genics
  43. Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Daniel Lohrmann
    5
  44. Can. Trust. Will.: Hiring for the Human Element in the New Age of Cybersecurity Leeza Garber
  45. CISSP Exam Study Guide For Information Security Professionals: Beginners Guide To Cybersecurity Threats, Ethical Hacking And Defense Techniques 3 Books In 1 John Knowles
    2
  46. Navigating the Cybersecurity Career Path: Insider Advice for Navigating from Your First Gig to the C-Suite Helen Patton
    4
  47. The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Nick Selby
  48. Hacking : Guide to Computer Hacking and Penetration Testing Alex Nordeen
    4
  49. Sichere Verbindung ins Netzwerk, VPN Daniel Schubert
    1
  50. CISSP Exam Study Guide For Cybersecurity Professionals: 2 Books In 1: Beginners Guide To Nist Cybersecurity Framework & Risk Management Governance Strategies HUGO HOFFMAN
    3