Technique
History
Math
Linguistics
Computers
Social Sciences
Psychology
Free Security Books
Computer Security [Art and Science] 2nd Ed
Digital Forensics Explained
Reconnaissance for Ethical Hackers: Focus on the starting point of data breaches and explore essential steps
Math for Security: From Graphs and Geometry to Spatial Analysis
Security and Privacy Schemes for Dense 6G Wireless Communication Networks
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
Ethical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking 2023
Accelerated Linux API for Software Diagnostics: With Category Theory in View
Reverse Engineering For Everyone!
Protect Your Privacy - How to Protect Your Identity As Well As Your Financial, Personal and Computer Records In An Age of Constant Surveillance
The Complete Guide to E-Security: Protect Your Privacy on the Internet
Security in Computing, 6th Edition (Final)
Cybercrime During the SARS-CoV-2 Pandemic: Evolutions, Adaptations, Consequences
Advances in Face Presentation Attack Detection
Penetration Testing with Kali Linux - PEN-200 2023
Hacking SaaS: An Insider's Guide to Managing Software Business Success
CC Certified in Cybersecurity All-in-One Exam Guide
The Joy of Cryptography (2021 Updated)
Counterintelligence in a Cyber World
CISA – Certified Information Systems Auditor Study Guide: Achieve CISA certification with practical examples, 2nd Edition
Security for Containers and Kubernetes: Learn how to implement robust security measures in containerized environments
The Active Defender: Immersion in the Offensive Security Mindset
Practical Insecurity: The Layman's Guide to Digital Security and Digital Self-defense
Take Control of Your Passwords
Security and Risk Analysis for Intelligent Edge Computing
Space-Air-Ground Integrated Network Security
Ethical Hacker's Certification Guide (CEHv11): A comprehensive guide on Penetration Testing including Network Hacking
The Active Defender: Immersion in the Offensive Security Mindset
Cybersecurity First Principles: A Reboot of Strategy and Tactics
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release)
Certified Secure Computer User (CSCU) Version 2
Artificial Intelligence and Cyber Security in Industry 4.0
Ethical Hacking and Countermeasures
Computer Hacking for Beginners
Аппаратный хакинг: взлом реальных вещей
Autonomous Intelligent Cyber Defense Agent (AICA) : A Comprehensive Guide
Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide
Cognitive Security: A System-Scientific Approach
Breaking Ransomware: Explore ways to find and exploit flaws in a ransomware attack
Writing API Tests with Karate: Enhance your API testing for improved security and performance
Aligning Security Operations with the MITRE ATT&CK Framework
Fuzzing Against the Machine
UNREDACTED Magazine Issue #005 - January 2023
UNREDACTED Magazine Issue #004 - October 2022
UNREDACTED Magazine Issue #003 - July 2022
UNREDACTED Magazine Issue #002 - June 2022
UNREDACTED Magazine Issue #001 - May 2022
CAD for Hardware Security
User-Centric Privacy and Security in Biometrics
Handbook of Research on Cybersecurity Risk in Contemporary Business Systems
Information Security and Privacy in Smart Devices: Tools, Methods, and Applications
How I Rob Banks: And Other Such Places
Cybercrime and Cyber Warfare
Blockchain for Cybersecurity in Cyber-Physical Systems
Cloud Security Handbook for Architects: Practical Strategies and Solutions for Architecting Enterprise Cloud Security
Security, Trust and Privacy Models, and Architectures in IoT Environments
Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices
MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100
CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions
Digital Forensics with Kali Linux , 3rd Edition
Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices
Intelligence-Driven Incident Response, 2nd Edition (5th Early Release)
Practical Data Privacy (Final Release)
The NICE Cyber Security Framework: Cyber Security Intelligence and Analytics
Cyber Threat Intelligence
IT Essentials Companion Guide v8 (Rough Cuts)
Machine Learning Techniques for Cybersecurity
Machine Learning Techniques for Cybersecurity
How to Measure Anything in Cybersecurity Risk
Emerging ICT Technologies and Cybersecurity: From AI and ML to Other Futuristic Technologies
Security Chaos Engineering: Sustaining Resilience in Software and Systems
Deep Dive: Exploring the Real-world Value of Open Source Intelligence
An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection
Cybersecurity for Smart Cities: Practices and Challenges
AI, Machine Learning and Deep Learning: A Security Perspective
Security Chaos Engineering: Sustaining Resilience in Software and Systems
GDPR and Cyber Security for Business Information Systems
Cyber Resilience
Privacy-Preserving in Mobile Crowdsensing
Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare
Cyber Warfare – Truth, Tactics, and Strategies
Malware Analysis Techniques: Tricks for the triage of adversarial software
Malware Analysis Techniques
Privacy-Preserving Machine Learning
Tribe of Hackers
Secrets and Lies: Digital Security in a Networked World
Cybersecurity in Transport Systems (Transportation)
Metasploit: The Penetration Tester's Guide
CryptoGraphics: Exploiting Graphics Cards For Security
Security and Privacy in Federated Learning
Cyber Deception: Techniques, Strategies, and Human Aspects
Security and Privacy Issues in Internet of Medical Things
Cyber Deception: Techniques, Strategies, and Human Aspects
Cybertax: Managing the Risks and Results
Physical Layer Security for Wireless Sensing and Communication
Introduction to Modern Cryptography
Software Supply Chain Security (First Early Release)
Secure Software Systems: Design and Development
2
3
4
5
6
Go to Page
GO
Technique
History
Math
Linguistics
Computers
Social Sciences
Psychology