Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • File formats
  • Shelves

Category: Humble Book Bundle: Cybersecurity 2020

Advanced Penetration Testing: Hacking the World's Most Secure Networks

Advanced Penetration Testing: Hacking the World's Most Secure ...

Wil Allsopp

Security Engineering

Security Engineering

Ross J. Anderson

The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

The Shellcoder’s Handbook: Discovering and Exploiting Security ...

Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte

Wireshark for Security Professionals

Wireshark for Security Professionals

Jessey Bullock & Jeff T. Parker

Tribe of Hackers

Tribe of Hackers

Marcus J. Carey & Jennifer Jin

Tribe of Hackers: Red Team

Tribe of Hackers: Red Team

Marcus J. Carey & Jennifer Jin

Practical Reverse Engineering

Practical Reverse Engineering

Bruce Dang & Alexandre Gazet & Elias Bachaalany

Reversing: Secrets of Reverse Engineering

Reversing: Secrets of Reverse Engineering

Eldad Eilam

Cryptography Engineering: Design Principles and Practical Applications

Cryptography Engineering: Design Principles and Practical Applications

Niels Ferguson & Bruce Schneier & Tadayoshi Kohno

Investigating Cryptocurrencies

Investigating Cryptocurrencies

Nick Furneaux

Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto

Cryptography Apocalypse: Preparing for the Day When Quantum ...

Roger A. Grimes

Social Engineering: The Science of Human Hacking

Social Engineering: The Science of Human Hacking

Christopher Hadnagy

Malware Analyst's Cookbook

Malware Analyst's Cookbook

Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard

The Art of Memory Forensics

The Art of Memory Forensics

Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters

Secrets & Lies: Digital Security in a Networked World

Secrets & Lies: Digital Security in a Networked World

Bruce Schneier

We Have Root

We Have Root

Bruce Schneier

Applied Cryptography

Applied Cryptography

Bruce Schneier

Threat Modeling

Threat Modeling

Adam Shostack

The Web Application Hacker's Handbook

The Web Application Hacker's Handbook

Dafydd Stuttard & Marcus Pinto

Cybersecurity: Blue Team Toolkit

Cybersecurity: Blue Team Toolkit

Nadean H. Tanner

Book Details

...