Category: Privacy & Data Protection

Kali Linux Revealed : Mastering the Penetration Testing Distribution

Kali Linux Revealed

stars

Kali Linux has not only become the information security professional's…
Invitation to Cryptology

Invitation to Cryptology

stars

For a one-semester undergraduate-level course in Cryptology, Mathematics, or Computer…
Hacked Again

Hacked Again

stars

Hacked Again details the ins and outs of cybersecurity expert…
Practical Cryptography

Practical Cryptography

stars

Security is the number one concern for businesses worldwide. The…
This Machine Kills Secrets : Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers

This Machine Kills Secrets

stars

Who Are The Cypherpunks? This is the unauthorized telling of…
SSH Mastery : OpenSSH, PuTTY, Tunnels, and Keys

SSH Mastery

stars

"One of the best technical writers in the networking and…
Regulating Privacy : Data Protection and Public Policy in Europe and the United States

Regulating Privacy

stars

The information revolution has brought with it the technology for…
Surveillance Valley : The Secret Military History of the Internet

Surveillance Valley

stars

Featured as a Guardian Long Read in December 2018 EVERYTHING…
The Ultimate GDPR Practitioner Guide : Demystifying Privacy & Data Protection

The Ultimate GDPR Practitioner Guide

stars

The Ultimate GDPR Practitioner Guide provides those tasked with implementing…
The Art of Deception : Controlling the Human Element of Security

The Art of Deception

stars

The world's most infamous hacker offers an insider's view of…
The Art of Deception : Controlling the Human Element of Security

The Art of Deception

stars

The world's most infamous hacker offers an insider's view of…
Delete : The Virtue of Forgetting in the Digital Age

Delete

stars

Delete looks at the surprising phenomenon of perfect remembering in…
Copyright © 2020 PDF Download eBook. e-Book PDF Library