| 1 |
|
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
by
4.30 avg rating — 28,775 ratings
|
|
| 2 |
|
The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online
by
3.74 avg rating — 1,497 ratings
|
|
| 3 |
|
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
by
3.90 avg rating — 258 ratings
|
|
| 4 |
|
How to Measure Anything in Cybersecurity Risk
by
4.05 avg rating — 377 ratings
|
|
| 5 |
|
Hack-Proof Your Life Now! The New Cybersecurity Rules: Protect your email, computers, and bank accounts from hacks, malware, and identity theft
by
4.34 avg rating — 41 ratings
|
|
| 5 |
|
This Is Not Propaganda: Adventures in the War Against Reality
by
4.04 avg rating — 4,928 ratings
|
|
| 7 |
|
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
by
4.17 avg rating — 8,212 ratings
|
|
| 7 |
|
Computer Network Security and Cyber Ethics, 2d edition
by
3.33 avg rating — 3 ratings
|
|
| 9 |
|
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
by
4.35 avg rating — 9,847 ratings
|
|
| 9 |
|
The Identity Trade: Selling Privacy and Reputation Online (Critical Cultural Communication, 7)
by
3.56 avg rating — 16 ratings
|
|
| 11 |
|
The Ethics of Cybersecurity
by
0.00 avg rating — 0 ratings
|
|
| 11 |
|
Data Love: The Seduction and Betrayal of Digital Technologies
by
3.22 avg rating — 41 ratings
|
|
| 13 |
|
Cybersecurity Essentials
by
3.92 avg rating — 53 ratings
|
|
| 13 |
|
Haters: Harassment, Abuse, and Violence Online
by
3.90 avg rating — 72 ratings
|
|
| 15 |
|
Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
by
4.12 avg rating — 68 ratings
|
|
| 15 |
|
Epic Win for Anonymous: How 4chan's Army Conquered the Web
by
3.35 avg rating — 218 ratings
|
|
| 17 |
|
The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime
by
4.29 avg rating — 62 ratings
|
|
| 17 |
|
Julian Assange - The Unauthorised Autobiography
by
3.78 avg rating — 963 ratings
|
|
| 19 |
|
Cyber Security For Beginners: Understanding Cybersecurity and ways to protect yourself
by
it was amazing 5.00 avg rating — 1 rating
|
|
| 19 |
|
The Art of Deception: Controlling the Human Element of Security
by
3.76 avg rating — 7,223 ratings
|
|
| 21 |
|
The Hacker Playbook 3: Practical Guide To Penetration Testing
by
4.40 avg rating — 252 ratings
|
|
| 21 |
|
The Accidental Billionaires: The Founding Of Facebook
by
3.59 avg rating — 17,157 ratings
|
|
| 23 |
|
Hacking: A Beginners’ Guide to Computer Hacking, Basic Security, Ethical Hacking and Penetration Testing
by
3.89 avg rating — 54 ratings
|
|
| 23 |
|
This Machine Kills Secrets: How Wikileakers, Hacktivists, and Cipherpunks Are Freeing the World's Information
by
really liked it 4.00 avg rating — 1,204 ratings
|
|
| 25 |
|
Hacking: The Art of Exploitation w/CD
by
4.17 avg rating — 2,503 ratings
|
|
| 25 |
|
The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online
by
3.69 avg rating — 312 ratings
|
|
| 27 |
|
Metasploit: The Penetration Tester's Guide
by
4.07 avg rating — 866 ratings
|
|
| 27 |
|
Defeating the Hacker: A non-technical guide to computer security
by
3.46 avg rating — 13 ratings
|
|
| 29 |
|
Penetration Testing: A Hands-On Introduction to Hacking
by
4.17 avg rating — 391 ratings
|
|
| 30 |
|
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
by
4.48 avg rating — 605 ratings
|
|
| 31 |
|
Social Engineering: The Science of Human Hacking
by
3.83 avg rating — 3,873 ratings
|
|
| 32 |
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C
by
4.21 avg rating — 2,135 ratings
|
|
| 33 |
|
Black Hat Python: Python Programming for Hackers and Pentesters
by
4.12 avg rating — 610 ratings
|
|
| 34 |
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by
4.24 avg rating — 1,225 ratings
|
|
| 35 |
|
Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
by
3.75 avg rating — 2,370 ratings
|
|
| 36 |
|
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
by
3.98 avg rating — 5,409 ratings
|
|
| 37 |
|
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
by
3.97 avg rating — 27,230 ratings
|
|
| 38 |
|
Social Engineering
by
3.83 avg rating — 3,873 ratings
|
|
| 39 |
|
No More Magic Wands
by
3.46 avg rating — 46 ratings
|
|
| 40 |
|
Cybersecurity Dilemma
by
4.21 avg rating — 53 ratings
|
|
| 41 |
|
Dark Territory: The Secret History of Cyber War
by
3.90 avg rating — 3,164 ratings
|
|
| 42 |
|
World-Class Risk Management
by
really liked it 4.00 avg rating — 20 ratings
|
|
| 43 |
|
Hacking Exposed 7: Network Security Secrets and Solutions
by
3.80 avg rating — 1,165 ratings
|
|
| 44 |
|
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering)
by
3.90 avg rating — 42 ratings
|
|
| 45 |
|
Threat Modeling: Designing for Security
by
4.08 avg rating — 287 ratings
|
|
| 46 |
|
Cyber Security: Threats and Responses for Government and Business
by
0.00 avg rating — 0 ratings
|
|
| 47 |
|
Cyber Security: Law and Guidance
by
0.00 avg rating — 0 ratings
|
|
| 48 |
|
Cyber Security for Seniors: A SecureTheVillage Guide
by
liked it 3.00 avg rating — 1 rating
|
|
| 49 |
|
Cybersecurity: What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Guide to Ethical Hacking for Beginners
by
4.06 avg rating — 17 ratings
|
|