Humble Book Bundle – CyberSecurity by Wiley
English | Tutorial | Size: 1.9 GB
Applied Cryptography – Protocols, Algorithms and Source Code in C (20th Anniversary Edition)
Cryptography Apocalypse – Preparing for the Day When Quantum Computing Breaks Today’s Crypto
Cryptography Engineering – Design Principles and Practical Applications
Cybersecurity and Third-Party Risk – Third Party Threat Hunting
Cybersecurity Blue Team Toolkit
Hacking Multifactor Authentication
Investigating Cryptocurrencies – Understanding, Extracting, and Analyzing Blockchain Evidence
Kali Linux Penetration Testing Bible
Liars and Outliers – Enabling the Trust that Society Needs to Thrive
Malware Analyst’s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code
Practical Reverse Engineering – x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Secrets and Lies – Digital Security in a Networked World (15th Anniversary Edition)
Social Engineering – The Science of Human Hacking
The Art of Attack – Attacker Mindset for Security Professionals
The Art of Deception – Controlling the Human Element of Security
The Art of Intrusion – The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Art of Memory Forensics – Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Pentester BluePrint – Starting a Career as an Ethical Hacker
The Web Application Hacker’s Handbook – Finding and Exploiting Security Flaws (2nd Edition)
Threat Modeling – Designing for Security
Transformational Security Awareness – What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
Tribe of Hackers – Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers Blue Team – Tribal Knowledge from the Best in Defensive Cybersecurity
Tribe of Hackers Red Team – Tribal Knowledge from the Best in Offensive Cybersecurity
Tribe of Hackers Security Leaders – Tribal Knowledge from the Best in Cybersecurity Leadership
Unauthorised Access – Physical Penetration Testing For IT Security Teams
Wireshark for Security Professionals – Using Wireshark and the Metasploit Framework
RAPIDGATOR
rapidgator.net/file/589a2febe55d27088323cb9c86820c51/Humble_Book_Bundle_-_CyberSecurity_by_Wiley.part1.rar.html
rapidgator.net/file/0c687923f9b15c9566534bd0a0a150f5/Humble_Book_Bundle_-_CyberSecurity_by_Wiley.part2.rar.html
rapidgator.net/file/21d12f8153d8485bdf7f4317d89e0270/Humble_Book_Bundle_-_CyberSecurity_by_Wiley.part3.rar.html
ALFAFILE
alfafile.net/file/A8jch/Humble%20Book%20Bundle%20-%20CyberSecurity%20by%20Wiley.part1.rar
alfafile.net/file/A8jci/Humble%20Book%20Bundle%20-%20CyberSecurity%20by%20Wiley.part2.rar
alfafile.net/file/A8jcH/Humble%20Book%20Bundle%20-%20CyberSecurity%20by%20Wiley.part3.rar