Master The Art Of Digital Defense – Bundle
English | Tutorial | Size: 504.58 MB
Books of the publisher Wiley on hacking and cybersecurity.
These are epubs:
Schneier, Bruce – Applied cryptography: protocols, algorithms, and source code in C (2017)
Nadean H. Tanner – Cybersecurity Blue Team Toolkit (2019)
The rest are PDFs:
Alexander V. Sergienko – Quantum communications and cryptography-Taylor & Francis (2006)
Marcus J. Carey, Jennifer Jin – Tribe of Hackers Blue Team: Tribal Knowledge from the best in Defensive Cybersecurity (2020)
Marcus J. Carey, Jennifer Jin – Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity (2019)
Marcus J. Carey, Jennifer Jin – Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
Adam Shostack – Threat modeling: designing for security (2014)
Allsopp, Wil – Unauthorised Access: Physical Penetration Testing For IT Security Teams (2010)
Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse – Practical reverse engineering: x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
Bruce Schneier – Applied Cryptography: Protocols, Algorithms and Source Code in C (2017)
Bruce Schneier – Liars and Outliers: Enabling the Trust that Society Needs to thrive (2012)
Bullock, Jessey-Kadijk, Jan – Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework (2017)
Carey, Marcus- Jin, Jennifer – Tribe of Hackers (2019)
Christopher Hadnagy – Social Engineering: The Science of Human Hacking (2018)
Dafydd Stuttard, Marcus Pinto – The web application hacker’s handbook: finding and exploiting security flaws (2011)
Gregory C. Rasner – Cybersecurity and Third-Party Risk: Third Party Threat Hunting (2021)
Grimes, Roger A – Cryptography apocalypse: preparing for the day when quantum computing breaks today’s cryptography (2019-2020)
Gus Khawaja – Kali Linux Penetration Testing Bible (2021)
Jessey Bullock with Jeff T. Parkers – Wireshark For Security Professionals (2016)
Kevin D. Mitnick, William L. Simon – The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers (2005)
Kevin D. Mitnick, William L. Simon, Steve Wozniak – The art of deception: controlling the human element of security (2003)
Kohno, Tadayoshi-Schneier, Bruce-Ferguson, Niels – Cryptography Engineering: Design Principles and Practical Applications (2012)
Ligh, Michael Hale – The art of memory forensics: detecting malware and threats in Windows, Linux, and Mac Memory (2014)
Ligh, Michael Hale-Richard, Matt-Adair, Steven-Hartstein, Blake – Malware analyst’s cookbook and DVD: tools and techniques for fighting malicious code
Maxie Reynolds – The Art of Attack: Attacker Mindset for Security Professionals (2021)
Nick Furneaux – Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence (2018)
Perry Carpenter – Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behavio (2019)
Phillip L. Wylie, Kim Crawley – The Pentester BluePrint: Starting a Career as an Ethical Hacker (2020)
Roger A. Grimes – Hacking Multifactor Authentication (2020)
Schneier, Bruce – Applied cryptography: protocols, algorithms, and source code in C (2017)
Schneier, Bruce – Secrets and Lies: Digital Security in a Networked World (2015)
RAPIDGATOR
rapidgator.net/file/48eaa973c87439cc14362e1df44df664/Master_The_Art_Of_Digital_Defense_-_Bundle.rar.html
NITROFLARE
nitroflare.com/view/F041B81396BE2F8/Master_The_Art_Of_Digital_Defense_-_Bundle.rar