Practical Social Engineering: A Primer for the Ethical Hacker
If you like book Practical Social Engineering: A Primer for the Ethical Hacker here is the list of books you may also like
Buy this book on AmazonPractical Social Engineering: A Primer for the Ethical Hacker similar books
-
Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug d…
Buy this book on Amazon -
The Linux Command Line: A Complete Introduction
You've experienced the shiny, point-and-click surface of your Linux computer--now dive below and explore its depths with the power of the command line.The Linux Command Line takes you from your very f…
Buy this book on Amazon -
-
-
Hacking APIs: Breaking Web Application Programming Interfaces
Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.
Buy this book on Amazon
Hacking APIs is … -
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking…
Buy this book on Amazon -
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time.
Buy this book on Amazon
Scattered across the world, an elite team of code-cracking techies is work… -
-
Chip War: The Fight for the World's Most Critical Technology
An epic account of the decades-long battle to control what has emerged as the world's most critical resource—microchip technology—with the United States and China increasingly in conflict.
Buy this book on Amazon
You may be s… -
Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
Featuring an introduction by Rachel Maddow, Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the behind-the-scenes story of one of the most sophisticated and in…
Buy this book on Amazon -
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to be figured out, such as scalability, consistency, reliability, efficiency, and maintainability. In addition, w…
Buy this book on Amazon -
Project Zero Trust: A Story about a Strategy for Aligning Security and the Business (Wiley Tax Library)
Implement Zero Trust initiatives efficiently and effectively
Buy this book on Amazon
In Project Zero A Story About a Strategy for Aligning Security and the Business, George Finney, Chief Security Officer at Southern Methodist… -
The Great Mental Models: General Thinking Concepts
The old saying goes, "To the man with a hammer, everything looks like a nail." But anyone who has done any kind of project knows a hammer often isn't enough.
Buy this book on Amazon
The more tools you have at your disposal,… -
A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back
It’s not just computers―hacking is everywhere.
Buy this book on Amazon
Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker’s mindset can change how you think about y… -
How Linux Works: What Every Superuser Should Know
How Linux Works describes the inside of the Linux system for systems administrators, whether they maintain an extensive network in the office or one Linux box at home. Some books try to give you copy-…
Buy this book on Amazon -
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
A chilling, globe-spanning detective story, tracking an elite group of Russian hackers and the future of global warfare
Buy this book on Amazon
In 2014, the world witnessed the start of an escalating series of cyberattacks. T… -
Slow Productivity: The Lost Art of Accomplishment Without Burnout
Do fewer things. Work at a natural pace. Obsess over quality.
Buy this book on Amazon
From the New York Times bestselling author of Digital Minimalism and Deep Work, a groundbreaking philosophy for pursuing meaningful accompl… -
Discipline Is Destiny: The Power of Self-Control
In his New York Times bestselling book Courage is Calling, author Ryan Holiday made the Stoic case for a bold and brave life. In this much-anticipated second book of his Stoic Virtue series, Holiday c…
Buy this book on Amazon -
The Hero Code: Lessons Learned from Lives Well Lived
From the acclaimed, #1 New York Times bestselling author of Make Your Bed -- a short, inspirational book about the qualities of true, everyday heroes.
Buy this book on Amazon
The Hero Code is Admiral McRaven's ringing tribute… -
Internet
Internet on parasta ja pahinta mitä meille on tapahtunut.
Buy this book on Amazon
Suomen tunnetuin tietoturva-asiantuntija kertoo kirjassaan, mitä jokaisen meistä tulee tietää internetin uhkista ja mahdollisuuksista.
Internet-…