Join us on a literary world trip!
Add this book to bookshelf
Grey

Machine Readable Me - The Hidden Ways Tech Shapes our Identities

Zara Rahman

The Hacker Crackdown - Law and Disorder on the Electronic Frontier

Bruce Sterling

Managing Cybersecurity Risk - Book 3

Jonathan Reuvid

Cryptography - The Art of Secret Keeping in the Digital Age

John Smith

Cyber Security - Beginners’ Guide to Hacking Phishing Social Engineering and Malware

Jonathan Rigdon

Bitcoin Development Philosophy

Kalle Rosenbaum, Linnéa Rosembaum

Ultimate Monorepo and Bazel for Building Apps at Scale - Level Up Your Large-Scale Application Development with Monorepo and Bazel for Enhanced Productivity Scalability and Integration

Javier Antoniucci

Hands-On Ethical Hacking Tactics - Strategies tools and techniques for effective cyber defense

Shane Hartman

Implementing Palo Alto Networks Prisma® Access - Learn real-world network protection

Tom Piens Aka 'Reaper'

Ultimate Pentesting for Web Applications - Unlock Advanced Web App Security Through Penetration Testing Using Burp Suite Zap Proxy Fiddler Charles Proxy and Python for Robust Defense

Dr. Rohit Gautam, Dr. Shifa Cyclewala

Basic Setup of FortiGate Firewall

Dr. Hidaia Mahmood Alassouli

Network Engineer's Bible - Mastering 100 Protocols For Communication Management And Security

Rob Botwright

Rust for Blockchain Application Development - Learn to build decentralized applications on popular blockchain technologies using Rust

Akhil Sharma

Developing Blockchain Solutions in the Cloud - Design and develop blockchain-powered Web3 apps on AWS Azure and GCP

Stefano Tempesta, Michael John Peña

Mastering AWS Security - Strengthen your cloud environment using AWS security features coupled with proven strategies

Laurent Mathieu

Dero Rising - The Crypto-Rebel's Guide to Financial Freedom

Craig McKay

Ultimate Penetration Testing with Nmap - Master Cybersecurity Assessments for Network Security Monitoring and Scanning Using Nmap

Travis Deforge

Microsoft 365 Security and Compliance for Administrators - A definitive guide to planning implementing and maintaining Microsoft 365 security posture

Sasha Kranjac, Omar Kudović

ChatGPT for Cybersecurity Cookbook - Learn practical generative AI recipes to supercharge your cybersecurity skills

Clint Bodungen

Building Full Stack DeFi Applications - A practical guide to creating your own decentralized finance projects on blockchain

Samuel Zhou

The OSINT Handbook - A practical guide to gathering and analyzing online information

Dale Meredith

Cybersecurity in the Age of Espionage - Protecting Your Digital Life

B. Vincent

Adventures in Crypto - The Dogecoin Diaries

Penelope I.

Security-Driven Software Development - Learn to analyze and mitigate risks in your software projects

Aspen Olmsted

Akash Network - Decentralized Cloud Computing Redefined

Penelope I.

The World of INJ - Inside Injective Protocol

Penelope I.

XRP - The Future of Crypto Currency

Penelope I.

Crypto Kings - The Success Story of Klaytn and KLAY

Penelope I.

WBTC - The Master Token

Penelope I.

CFX - Introduction to Conflux Network

Penelope I.