English | Size: 1.32 GB
Genre: eLearning
HUMBLE BOOK BUNDLE: CYBERSECURITY BY WILEY
Applied Cryptography – Protocols, Algorithms and Source Code in C (20th Anniversary Edition)
Cryptography Apocalypse – Preparing for the Day When Quantum Computing Breaks Today’s Crypto
Cryptography Engineering – Design Principles and Practical Applications
Cybersecurity and Third-Party Risk – Third Party Threat Hunting
Cybersecurity Blue Team Toolkit
Hacking Multifactor Authentication
Investigating Cryptocurrencies – Understanding, Extracting, and Analyzing Blockchain Evidence
Kali Linux Penetration Testing Bible
Liars and Outliers – Enabling the Trust that Society Needs to Thrive
Malware Analyst’s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code
Practical Reverse Engineering – x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Secrets and Lies – Digital Security in a Networked World (15th Anniversary Edition)
Social Engineering – The Science of Human Hacking
The Art of Attack – Attacker Mindset for Security Professionals
The Art of Deception – Controlling the Human Element of Security
The Art of Intrusion – The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Art of Memory Forensics – Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Pentester BluePrint – Starting a Career as an Ethical Hacker
The Web Application Hacker’s Handbook – Finding and Exploiting Security Flaws (2nd Edition)
Threat Modeling – Designing for Security
Transformational Security Awareness – What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
Tribe of Hackers – Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers Blue Team – Tribal Knowledge from the Best in Defensive Cybersecurity
Tribe of Hackers Red Team – Tribal Knowledge from the Best in Offensive Cybersecurity
Tribe of Hackers Security Leaders – Tribal Knowledge from the Best in Cybersecurity Leadership
Unauthorised Access – Physical Penetration Testing For IT Security Teams
Wireshark for Security Professionals – Using Wireshark and the Metasploit Framework
nitro.download/view/425CE7F4DA801CB/Humble-Book-Bundle-CyberSecurity-by-Wiley-True.28.4.part1.rar
nitro.download/view/9E55A2A89CFA419/Humble-Book-Bundle-CyberSecurity-by-Wiley-True.28.4.part2.rar
nitro.download/view/022FF96F6DAFB57/Humble-Book-Bundle-CyberSecurity-by-Wiley-True.28.4.part3.rar
nitro.download/view/70485A0527E3EAF/Humble-Book-Bundle-CyberSecurity-by-Wiley-True.28.4.part4.rar
rapidgator.net/file/2a9744a54cee187dd53fe2f50f206840/Humble-Book-Bundle-CyberSecurity-by-Wiley-True.28.4.part1.rar.html
rapidgator.net/file/8a351cc4c1af2622788a662d78791f08/Humble-Book-Bundle-CyberSecurity-by-Wiley-True.28.4.part2.rar.html
rapidgator.net/file/4e9a2e3e40e3a10623d408e1e132a118/Humble-Book-Bundle-CyberSecurity-by-Wiley-True.28.4.part3.rar.html
rapidgator.net/file/1008367383fdeee9ef0d18f0afedae42/Humble-Book-Bundle-CyberSecurity-by-Wiley-True.28.4.part4.rar.html