Apri il menu di navigazioneScribd Logo
itChange LanguageCambia lingua

Lingua

  • English
  • español
  • português
  • Deutsch
  • français
  • Русский
  • italiano(selezionato)
  • român
  • Bahasa Indonesia
Maggiori informazioni
CaricaLeggi gratis per 30 giorni
Impostazioni utente

Benvenuto in Scribd!

  • Carica
  • Lingua (IT)
  • Vantaggi Scribd
  • Invita amici
  • FAQ e assistenza
  • Accedi
  • Cos'è Scribd?
  • Libri
  • Audiolibri
  • Riviste
  • Podcast
  • Spartito
  • Documenti
  • Snapshot
  1. Esplora

Guerra cibernetica

I più venduti in Guerra cibernetica

Visualizza altro
Skip carousel
carousel previouscarousel next
  • The Puzzle Palace: A Report on NSA, America's Most Secret Agency

    Autore James Bamford
  • Blumstein vs. U.S. - Writ of Mandamus

    Autore Grant Stern
  • Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door

    Autore Brian Krebs
  • Statement for the Record - Worldwide Threat Assessment of the U.S. Intelligence Community

    Autore Office of the Director of National Intelligence
  • BILLS-113s1353is

    Autore Andrew Blake
  • Russia Influence Warning Letter from NSA members

    Autore Yahoo News
  • X, Y & Z: The Real Story of How Enigma Was Broken

    Autore Dermot Turing
  • The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization

    Autore James Bamford
  • Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News

    Autore Clint Watts
  • CISA bill text with OTI redlines

    Autore Andy Greenberg
  • No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State

    Autore Glenn Greenwald
  • Spies of No Country: Secret Lives at the Birth of Israel

    Autore Matti Friedman
  • Digital Fortress: A Thriller

    Autore Dan Brown
  • Body of Secrets: Anatomy of the Ultra-Secret National Security Agency

    Autore James Bamford
  • Enigma: The Battle for the Code

    Autore Hugh Sebag-Montefiore
  • The Hacker Crackdown: Law and Disorder on the Electronic Frontier

    Autore Bruce Sterling
  • Cryptanalysis: A Study of Ciphers and Their Solution

    Autore Helen F. Gaines
  • The Emperor's Codes: Bletchley Park's role in breaking Japan's secret cyphers

    Autore Michael Smith
  • The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

    Autore Kevin D. Mitnick
  • Becoming an Ethical Hacker

    Autore Gary Rivlin
  • The Secrets of Station X: How the Bletchley Park codebreakers helped win the war

    Autore Michael Smith
  • Unsolved!: The History and Mystery of the World's Greatest Ciphers from Ancient Egypt to Online Secret Societies

    Autore Craig P. Bauer
  • The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics

    Autore Ben Buchanan
  • Codes, Ciphers and Secret Writing

    Autore Martin Gardner
  • Net Force: Dark Web: Created by Tom Clancy and Steve Pieczenik

    Autore Jerome Preisler
  • The Bletchley Park Codebreakers

    Autore Michael Smith
  • Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door

    Autore Brian Krebs
  • Cryptography: The Key to Digital Security, How It Works, and Why It Matters

    Autore Keith Martin
  • Geek Mafia: Black Hat Blues

    Autore Rick Dakan
  • Eyes in the Sky: The Secret Rise of Gorgon Stare and How It Will Watch Us All

    Autore Arthur Holland Michel

Qualunque cosa Informazioni su Guerra cibernetica

Visualizza altro
Skip carousel
carousel previouscarousel next
  • Exploit the Art of Hacking

    Autore RAJ TYAGI
  • Cybersecurity and Cyberwar: What Everyone Needs to Know

    Autore P. W. Singer
  • Social Engineering: The Science of Human Hacking, Second Edition

    Autore Christopher Hadnagy
  • The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime

    Autore Scott Augenbaum
  • Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux

    Autore Kevin White
  • Information Security Management Principles

    Autore David Alexander
  • Hacking ISIS: How to Destroy the Cyber Jihad

    Autore Malcolm Nance
  • NIST Cybersecurity Framework: A pocket guide

    Autore Alan Calder
  • CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE

    Autore ATTILA KOVACS
  • Cybersecurity for Dummies

    Autore Joseph Steinberg
  • Hacking : A Beginner's Guide to Learn and Master Ethical Hacking with Practical Examples to Computer, Hacking, Wireless Network, Cybersecurity and Penetration Test (Kali Linux)

    Autore Peter Bradley
  • Ethical Hacking: A Beginners Guide To Learning The World Of Ethical Hacking

    Autore Lakshay Eshan
  • Codes and Ciphers - A History of Cryptography

    Autore Alexander D'Agapeyeff
  • Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

    Autore Sudhanshu Chauhan
  • Digital Fortress: A Thriller

    Autore Dan Brown
  • Permanent Record

    Autore Edward Snowden
  • Tor and the Dark Art of Anonymity

    Autore Lance Henderson
  • Data Protection and the Cloud: Are the risks too great?

    Autore Paul Ticher
  • CYBERSECURITY FOR BEGINNERS: 3 BOOKS IN 1: WHAT YOU MUST KNOW ABOUT CYBERSECURITY, HOW TO GET A JOB IN CYBERSECURITY, HOW TO DEFEND AGAINST HACKERS & MALWARE

    Autore ATTILA KOVACS
  • The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics

    Autore Ben Buchanan
  • Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing

    Autore Peter Bradley
  • The Dark Web: The Unseen Side of the Internet

    Autore A. J. WRIGHT
  • Ethical Hacking

    Autore Lakshay Eshan
  • HACKING WITH KALI LINUX: Penetration Testing Hacking Bible

    Autore Alex Wagner
  • What is Blockchain?

    Autore John Hargrave
  • The Language of Cybersecurity

    Autore Maria Antonieta Flores
  • No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State

    Autore Glenn Greenwald
  • The Spy in Moscow Station: A Counterspy's Hunt for a Deadly Cold War Threat

    Autore Eric Haseltine
  • Dark Territory: The Secret History of Cyber War

    Autore Fred Kaplan
  • Deceiving the Sky: Inside Communist China's Drive for Global Supremacy

    Autore Bill Gertz

Aggiunti recentemente

Visualizza altro
Skip carousel
carousel previouscarousel next
  • Top Secret Methods for Getting Internet Security and Privacy

    Autore Mark Millery
  • Inside Jobs: Why Insider Risk Is the Biggest Cyber Threat You Can't Ignore

    Autore Joe Payne
  • Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1

    Autore John Knowles
  • Latest Technologies for IT Industry 2021 – A Research Paper

    Autore prosenjit sengupta
  • The Elite Cyber Criminals' Stories: The Secret World of Cyber Criminals and Strategies for Addressing Cyber Crime

    Autore A. J. WRIGHT
  • Evaluation of Some Intrusion Detection and Vulnerability Assessment Tools

    Autore Dr. Hedaya Mahmood Alasooly
  • What is Blockchain?

    Autore John Hargrave
  • Codebreaking Sisters: Our Secret War

    Autore Jean Owtram
  • Burners and Black Markets: Opsec for the Next Generation

    Autore Lance Henderson
  • Tor and the Dark Art of Anonymity

    Autore Lance Henderson
  • Zero Days: A Cyber Thriller

    Autore Ian Williams
  • Secure Chains

    Autore Srinivas Mahankali
  • Fundamental of Cyber Security

    Autore Mayank Bhushan
  • Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.

    Autore Hans Weber
  • Schneier on Security

    Autore Bruce Schneier
  • The Haystack (NHB Modern Plays)

    Autore Al Blyth
  • Digital Privacy: Internet Security to Stop Big Companies From Tracking and Selling Your Data

    Autore Eric Faster
  • Hacking Network Protocols: Complete Guide about Hacking, Scripting and Security of Computer Systems and Networks.

    Autore Hans Weber
  • Secret and Urgent - The Story of Codes and Ciphers

    Autore Anon
  • The Hacker Crackdown: Law and Disorder on the Electronic Frontier

    Autore Bruce Sterling
  • Kingdom of Lies: Unnerving Adventures in the World of Cybercrime

    Autore Kate Fazzini
  • NIST Cybersecurity Framework: A pocket guide

    Autore Alan Calder
  • The Secret Genesis of Area 51

    Autore TD Barnes
  • Transformation of Cryptography: Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Nomenclatura

    Autore Linda A. Bertram
  • Executive Secrets: Covert Action & the Presidency

    Autore William J. Daugherty
  • Penetration Testing

    Autore Robert Karamagi
  • Protecting Privacy Online

    Autore P.S Tecwriden
  • Safer @ Home with pfSense®

    Autore Michael Lines
  • Bitcoin Basics

    Autore P.S Tecwriden
  • Hacking With Linux 2020:A Complete Beginners Guide to the World of Hacking Using Linux - Explore the Methods and Tools of Ethical Hacking with Linux

    Autore Joseph Kenna
Visualizza tutto in Guerra cibernetica
Caricamento

Navigazione rapida

  • Home
  • Libri
  • Audiolibri
  • Documenti

Menu a piè di pagina

Torna a inizio pagina

Informazioni

  • Informazioni su Scribd
  • Stampa
  • Il nostro blog
  • Entra nel nostro team!
  • Contattaci
  • Iscriviti oggi stesso
  • Invita amici
  • Regali
  • Scribd per Aziende

Supporto

  • Aiuto / Domande frequenti
  • Accessibilità
  • Guida agli acquisti
  • AdChoices
  • Editori

Legale

  • Termini
  • Privacy
  • Copyright

Social media

    • Scribd - Scarica sull'App Store
    • Scribd - Scaricalo su Google Play
  • Copyright © 2021 Scribd Inc.
  • .
  • Esplora libri
  • .
  • Directory del sito
  • .
  • Lingua del sito: