Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid
If you like book Cybersecurity for Small Networks: A Guide for the Reasonably Paranoid here is the list of books you may also like
Buy this book on AmazonSimilar books (20)
-
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking…
Buy this book on Amazon -
-
-
Pegasus: How a Spy in Your Pocket Threatens the End of Privacy, Dignity, and Democracy
Featuring an introduction by Rachel Maddow, Pegasus: How a Spy in Our Pocket Threatens the End of Privacy, Dignity, and Democracy is the behind-the-scenes story of one of the most sophisticated and in…
Buy this book on Amazon -
-
Building a Second Brain: A Proven Method to Organize Your Digital Life and Unlock Your Creative Potential
>For the first time in history, we have instantaneous access to the world’s knowledge. There has never been a better time to learn, to contribute, and to improve ourselves. Yet, rather than feeling em…
Buy this book on Amazon -
Learn Enough Developer Tools to Be Dangerous: Command Line, Text Editor, and Git Version Control Essentials
Buy this book on Amazon -
-
Zero Days
Ruth Ware returns with this adrenaline-fueled thriller about a woman in a race against time to clear her name and find her husband’s murderer.
Buy this book on Amazon
Hired by companies to break into buildings and hack securi… -
Digital Zettelkasten: Principles, Methods, & Examples
Are you an academic, author, or blogger or anyone else who wants to make writing a breeze?
Buy this book on Amazon
The Zettelkasten method is the perfect way to harness the power of technology to remember what you read and bo… -
-
The Stars My Destination
In this pulse-quickening novel, Alfred Bester imagines a future in which people "jaunte" a thousand miles with a single thought, where the rich barricade themselves in labyrinths and protect themselve…
Buy this book on Amazon -
-
-
Evasive Malware: A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats
Buy this book on Amazon -
-
-
-
Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict
Buy this book on Amazon -
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
Buy this book on Amazon