Humble Book Bundle – CyberSecurity by Wiley

Humble Book Bundle – CyberSecurity by Wiley
English | Size: 1.32 GB
Genre: eLearning

Applied Cryptography – Protocols, Algorithms and Source Code in C (20th Anniversary Edition)
Cryptography Apocalypse – Preparing for the Day When Quantum Computing Breaks Today’s Crypto
Cryptography Engineering – Design Principles and Practical Applications
Cybersecurity and Third-Party Risk – Third Party Threat Hunting
Cybersecurity Blue Team Toolkit
Hacking Multifactor Authentication
Investigating Cryptocurrencies – Understanding, Extracting, and Analyzing Blockchain Evidence
Kali Linux Penetration Testing Bible
Liars and Outliers – Enabling the Trust that Society Needs to Thrive
Malware Analyst’s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code
Practical Reverse Engineering – x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Secrets and Lies – Digital Security in a Networked World (15th Anniversary Edition)
Social Engineering – The Science of Human Hacking
The Art of Attack – Attacker Mindset for Security Professionals
The Art of Deception – Controlling the Human Element of Security
The Art of Intrusion – The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
The Art of Memory Forensics – Detecting Malware and Threats in Windows, Linux, and Mac Memory
The Pentester BluePrint – Starting a Career as an Ethical Hacker
The Web Application Hacker’s Handbook – Finding and Exploiting Security Flaws (2nd Edition)
Threat Modeling – Designing for Security
Transformational Security Awareness – What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
Tribe of Hackers – Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers Blue Team – Tribal Knowledge from the Best in Defensive Cybersecurity
Tribe of Hackers Red Team – Tribal Knowledge from the Best in Offensive Cybersecurity
Tribe of Hackers Security Leaders – Tribal Knowledge from the Best in Cybersecurity Leadership
Unauthorised Access – Physical Penetration Testing For IT Security Teams
Wireshark for Security Professionals – Using Wireshark and the Metasploit Framework

If any links die or problem unrar, send request to

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.