Games
Apps
Movies
Books
Kids
google_logo Play
Games
Apps
Movies
Books
Kids
none
search
help_outline
Sign in with Google
play_apps
Library & devices
payment
Payments & subscriptions
reviews
My Play activity
redeem
Offers
Play Pass
Personalization in Play
settings
Settings
Privacy Policy
•
Terms of Service
Games
Apps
Movies
Books
Kids
Similar ebooks
Research Anthology on Securing Mobile Technologies and Applications
€397.78
€278.45
Ethical Hacking and Penetration, Step by Step with Kali Linux
€20.09
Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications
€2,459.94
Kali Linux: Hacking Tools Introduction
€29.28
Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications
€989.21
€692.45
Hacking: The Core of Hacking: An Easy Guide to Open Secret Knowledge of Hacker
€22.23
Biometrics: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications
€2,302.92
€1,612.04
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
€13.99
Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications
€1,088.65
€762.06
Hacking into Hackers' Head: A step towards creating CyberSecurity awareness
€10.09
€3.02
Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications
€2,459.94
Hacking: Be a Hacker with Ethics
€4.62
Identity Theft: Breakthroughs in Research and Practice: Breakthroughs in Research and Practice
€361.14
€252.80
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
€42.99
National Security: Breakthroughs in Research and Practice: Breakthroughs in Research and Practice
€518.16
€362.71
The Art of Deception: Controlling the Human Element of Security
€12.99
Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing
€1,779.53
€1,245.67
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
€18.48
€12.94
Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics
€340.20
€238.14
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World
€17.44
€11.86