Computer Security in 2019
I'm a Romance Scam IT Detective (Edition 2): Book Award Finalist - Non-fiction True Crime, deception
by
Co, Selina
The Emerging Risk of Virtual Societal Warfare: Social Manipulation in a Changing Information Environment
by
Casey, Abigail, Bauer, Ryan Michael, Mazarr, Michael J.
Operation Espionage: the Spy Within: A Primer on Risk Mitigation
by
Schwartz, Harris
Operation Espionage: the Spy Within: A Primer on Risk Mitigation
by
Schwartz, Harris
Kali Linux: Simple and Effective Approach to Learn Kali Linux
by
Thorpe, Ethan
Blockchain: The Insights You Need from Harvard Business Review
by
Tapscott, Don, Review, Harvard Business
Computer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners
by
Warren, Tim
Computer Hacking: A beginners guide to computer hacking, how to hack, internet skills, hacking techniques, and more!
by
Benton, Joe
Perceived Privacy in Location-Based Mobile System
by
Poikela, Maija Elina
Blockchain: Una Guía Esencial Para Principiantes Para Comprender La Tecnología Blockchain, Criptomonedas, Bitcoin y el Futuro del
by
Jones, Herbert
Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Gui
by
Evans, Lester
Cybersecurity Maturity Model Certification (CMMC): Levels 1-3 Manual: Detailed Security Control Implementation Guidance
by
Russo Cissp-Issap-Ceh, Mark a.
WTF Is My Password: Internet Password Logbook- White
by
Journals, River Valley
Network+: A Practitioner's Study Guide
by
Breth, John, Evenden, David
What the Fuck is my Password
by
Sweary, Wicked
WTF Is My Password: Internet Password Logbook- Purple
by
Journals, River Valley
WTF Is My Password: Internet Password Logbook- Black
by
Journals, River Valley
What's My Password? An Easy Password Tracker for 700 Websites.: Discrete size (5.5x8.5 in). 50 pages for up to 700 user names and passwords. White pap
by
Protect Your Privacy Press
Texas Senate Bill (TXSB) 820 & NIST 800-171: Creating an Effective Cybersecurity Policy
by
Russo Cissp-Issap Ceh, Mark a.
Cybercon: Protecting Ourselves from Big Tech & Bigger Lies
by
Norrie, James L.
Conversations in Communication: Volume 3: Technology and Cybersecurity: How They Protect and Shape an Organization
by
Weinholtz, Donn, Weinholtz, Philip T., Dunham-Carson, Jabaree
Criptomonedas: Una guía completa para invertir en bitcoin, altcoin, litecoin y más (Guía para entender el litecoin, bitcoin y más.)
by
Marín, Eryk
Cryptomonedas: Cómo lucrar del bitcoin, ethereum para aprendices (Cómo invertir y comerciar en criptomoneda?)
by
Díaz, Ione
Criptomoneda: Consejos exitosos sobre el comercio en criptomoneda (Un libro lleno de conocimientos desde principiantes hasta avanzados)
by
Pagan, Yoel
Cybersecurity - Attack and Defense Strategies - Second Edition: Counter modern threats and employ state-of-the-art tools and techniques to protect you
by
Diogenes, Yuri, Ozkaya, Erdal
Hands-On Smart Contract Development with Solidity and Ethereum: From Fundamentals to Deployment
by
Hoover, David H., Solorio, Kevin, Kanna, Randall