Calibre-Web
  • Advanced Search
  • Guest
  • Browse
  • Books
  • Hot Books
  • Top Rated Books
  • Discover
  • Categories
  • Series
  • Authors
  • Publishers
  • Languages
  • File formats
  • Shelves

Category: Humble Book Bundle: Cybersecurity 2020

Cybersecurity: Blue Team Toolkit

Cybersecurity: Blue Team Toolkit

Nadean H. Tanner

The Art of Memory Forensics

The Art of Memory Forensics

Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters

Malware Analyst's Cookbook

Malware Analyst's Cookbook

Michael Ligh & Steven Adair & Blake Hartstein & Matthew Richard

Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto

Cryptography Apocalypse: Preparing for the Day When Quantum ...

Roger A. Grimes

Cryptography Engineering: Design Principles and Practical Applications

Cryptography Engineering: Design Principles and Practical Applications

Niels Ferguson & Bruce Schneier & Tadayoshi Kohno

Investigating Cryptocurrencies

Investigating Cryptocurrencies

Nick Furneaux

Reversing: Secrets of Reverse Engineering

Reversing: Secrets of Reverse Engineering

Eldad Eilam

Tribe of Hackers: Red Team

Tribe of Hackers: Red Team

Marcus J. Carey & Jennifer Jin

Applied Cryptography

Applied Cryptography

Bruce Schneier

Security Engineering

Security Engineering

Ross J. Anderson

Advanced Penetration Testing: Hacking the World's Most Secure Networks

Advanced Penetration Testing: Hacking the World's Most Secure ...

Wil Allsopp

Practical Reverse Engineering

Practical Reverse Engineering

Bruce Dang & Alexandre Gazet & Elias Bachaalany

Tribe of Hackers

Tribe of Hackers

Marcus J. Carey & Jennifer Jin

We Have Root

We Have Root

Bruce Schneier

Wireshark for Security Professionals

Wireshark for Security Professionals

Jessey Bullock & Jeff T. Parker

The Web Application Hacker's Handbook

The Web Application Hacker's Handbook

Dafydd Stuttard & Marcus Pinto

Social Engineering: The Science of Human Hacking

Social Engineering: The Science of Human Hacking

Christopher Hadnagy

Threat Modeling

Threat Modeling

Adam Shostack

The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

The Shellcoder’s Handbook: Discovering and Exploiting Security ...

Chris Anley & John Heasman & Felix “FX” Lindner & Gerardo Richarte

Secrets & Lies: Digital Security in a Networked World

Secrets & Lies: Digital Security in a Networked World

Bruce Schneier

Book Details

...