English | Size: 1.9 GB
Genre: eLearning
Applied Cryptography – Protocols, Algorithms and Source Code in C (20th Anniversary Edition)
Cryptography Apocalypse – Preparing for the Day When Quantum Computing Breaks Today’s Crypto
Cryptography Engineering – Design Principles and Practical Applications
Cybersecurity and Third-Party Risk – Third Party Threat Hunting
Cybersecurity Blue Team Toolkit
Hacking Multifactor Authentication
Investigating Cryptocurrencies – Understanding, Extracting, and Analyzing Blockchain Evidence
Kali Linux Penetration Testing Bible
Liars and Outliers – Enabling the Trust that Society Needs to Thrive
Malware Analyst’s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code
Practical Reverse Engineering – x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Secrets and Lies – Digital Security in a Networked World (15th Anniversary Edition)
Social Engineering – The Science of Human Hacking
The Art of Attack – Attacker Mindset for Security Professionals
The Art of Deception – Controlling the Human Element of Security
The Art of Intrusion – The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Art of Memory Forensics – Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Pentester BluePrint – Starting a Career as an Ethical Hacker
The Web Application Hacker’s Handbook – Finding and Exploiting Security Flaws (2nd Edition)
Threat Modeling – Designing for Security
Transformational Security Awareness – What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
Tribe of Hackers – Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers Blue Team – Tribal Knowledge from the Best in Defensive Cybersecurity
Tribe of Hackers Red Team – Tribal Knowledge from the Best in Offensive Cybersecurity
Tribe of Hackers Security Leaders – Tribal Knowledge from the Best in Cybersecurity Leadership
Unauthorised Access – Physical Penetration Testing For IT Security Teams
Wireshark for Security Professionals – Using Wireshark and the Metasploit Framework
rapidgator.net/file/119b25291783f4b45c220da2dd5ad4f5/Humble-Book-Bundle-CyberSecurity-by-Wiley.part1.rar.html
rapidgator.net/file/301a2e50ec1058d6e6453086c425e1e0/Humble-Book-Bundle-CyberSecurity-by-Wiley.part2.rar.html
rapidgator.net/file/3b834d4975e21f81c97e95c56453a0dd/Humble-Book-Bundle-CyberSecurity-by-Wiley.part3.rar.html
rapidgator.net/file/6df4285d952cd151f4958457bd1d1c55/Humble-Book-Bundle-CyberSecurity-by-Wiley.part4.rar.html
rapidgator.net/file/497b923a82bffc74927d09ccd4f8de1a/Humble-Book-Bundle-CyberSecurity-by-Wiley.part5.rar.html
trbbt.net/ibgbd0sqhlfk/Humble-Book-Bundle-CyberSecurity-by-Wiley.part1.rar.html
trbbt.net/ar8n4ye6nnxe/Humble-Book-Bundle-CyberSecurity-by-Wiley.part2.rar.html
trbbt.net/xx2dn6cj7yys/Humble-Book-Bundle-CyberSecurity-by-Wiley.part3.rar.html
trbbt.net/6orll3faa2og/Humble-Book-Bundle-CyberSecurity-by-Wiley.part4.rar.html
trbbt.net/rq4rg55ncbf2/Humble-Book-Bundle-CyberSecurity-by-Wiley.part5.rar.html
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9