There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

appassionato , to bookstodon
@appassionato@mastodon.social avatar

Hacked: The Secrets Behind Cyber Attacks by Jessica Barker, 2024

In this book, cybersecurity expert Jessica Barker uncovers how hackers are weaponizing cutting-edge tactics and technologies to target individuals and organizations, before showing how you can safeguard yourself against any potential attacks and how to react if you do become a target.

@bookstodon




appassionato , to bookstodon
@appassionato@mastodon.social avatar

Cyber Operations: A Case Study Approach by Jerry M. Couretas, 2024

Cyber Operations offers a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed.

@bookstodon




appassionato , to bookstodon
@appassionato@mastodon.social avatar

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics

Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age.

@bookstodon





  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • lifeLocal
  • goranko
  • All magazines