Games
Apps
Books
Children
google_logo Play
  • Sign in with Google
  • play_appsLibrary & devices
  • paymentPayments & subscriptions
  • reviewsMy Play activity
  • redeemOffers
  • Play Pass
  • Personalization in Play
  • settingsSettings
  • Privacy Policy • Terms of Service
Games
Apps
Books
Children
Similar ebooks
Icon image Artificial Intelligence and Cybersecurity: Advances and Innovations
Artificial Intelligence and Cybersecurity: Advances and Innovations
€73.02€55.86
Icon image Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
€9.22
Icon image Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
€9.22€5.12
Icon image Waste Management for Smart Cities
Waste Management for Smart Cities
€163.49€114.44
Icon image 🔒Hacking: The Core of Hacking: An Easy Guide to Open Secret Knowledge of Hacker🔓
🔒Hacking: The Core of Hacking: An Easy Guide to Open Secret Knowledge of Hacker🔓
€20.37
Icon image 5G and Beyond
5G and Beyond
€0
Icon image An Introduction to Cyber Security: A Beginner’s Guide
An Introduction to Cyber Security: A Beginner’s Guide
Book 2
€0
Icon image Deep Learning for Healthcare Decision Making
Deep Learning for Healthcare Decision Making
€133.51€53.25
Icon image Cyber Safety for Children (VIEH GROUP)
Cyber Safety for Children (VIEH GROUP)
€0
Icon image Cyber Security
Cyber Security
€0
Icon image Mr. Robot and Philosophy: Beyond Good and Evil Corp
Mr. Robot and Philosophy: Beyond Good and Evil Corp
Book 109
€22.88€16.02
Icon image Data Protection and Privacy, Volume 13: Data Protection and Artificial Intelligence
Data Protection and Privacy, Volume 13: Data Protection and Artificial Intelligence
€32.32€22.62
Icon image Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
Malware Development for Ethical Hackers: Learn how to develop various types of malware to strengthen cybersecurity
€35.96€25.17
Icon image How to Protect Yourself Online
How to Protect Yourself Online
€0.05
Icon image 🔒Certified Ethical Hacker 🇨‌|🇪‌🇭‌ : A Practical Guide to Cybersecurity🔓
🔒Certified Ethical Hacker 🇨‌|🇪‌🇭‌ : A Practical Guide to Cybersecurity🔓
€41.58€1.48
Icon image Kali Linux 2: Windows Penetration Testing
Kali Linux 2: Windows Penetration Testing
€35.96€25.17
Icon image Is It Necessary to SIGN NDA for Mobile App Development?
Is It Necessary to SIGN NDA for Mobile App Development?
€0
Icon image Services Marketing: People, Technology, Strategy (Eighth Edition)
Services Marketing: People, Technology, Strategy (Eighth Edition)
€22.20€15.54
Icon image The RevOps Revolution: How to Rocket Your Revenue
The RevOps Revolution: How to Rocket Your Revenue
€9.24
Icon image Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
Operationalizing Threat Intelligence: A guide to developing and operationalizing cyber threat intelligence programs
€30.51€21.36
Google Play

Play Pass

Play Points

Gift cards

Redeem

Refund policy

Children and family

Parent guide

Family sharing

Terms of Service

Privacy

About Google Play

Developers

Google Store

All prices include VAT.