Nice Books Logo
  • Home
  • Books
    • arts books
    • memoirs books
    • business books
    • calendars books
    • children books
    • christian books
    • comics books
    • technology books
    • cookbooks books
    • hobbies books
    • education books
    • engineering books
    • health books
    • history books
    • entertainment books
    • law books
    • lgbtq books
    • literature books
    • medical books
    • mystery books
    • relationships books
    • politics books
    • reference books
    • spirituality books
    • romance books
    • science books
    • fantasy books
    • selfhelp books
    • sports books
    • teen books
    • preparation books
    • travel books
  • Genres
  • New Release

Books Related To Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence

  1. Home
  2. Books Related To Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence
python-crash-course-2nd-edition-a-handson-projectbased-1593279280
View Detail

Python Crash Course, 2nd Edition: A Hands-On, Project-Based…

the-art-of-invisibility-the-worlds-most-famous-hacker-teaches-you-0316380520
View Detail

The Art of Invisibility: The World's Most Famous Hacker Teaches You…

extreme-privacy-what-it-takes-to-disappear-B0898YGR58
View Detail

Extreme Privacy: What It Takes to Disappear

operator-handbook-red-team-osint-blue-team-reference-B085RR67H5
View Detail

Operator Handbook: Red Team + OSINT + Blue Team Reference

how-to-diagnose-and-fix-everything-electronic-second-edition-0071848290
View Detail

How to Diagnose and Fix Everything Electronic, Second Edition

rtfm-red-team-field-manual-1494295504
View Detail

Rtfm: Red Team Field Manual

blue-team-field-manual-btfm-rtfm-154101636X
View Detail

Blue Team Field Manual (BTFM) (RTFM)

hacking-the-art-of-exploitation-2nd-edition-1593271441
View Detail

Hacking: The Art of Exploitation, 2nd Edition

cybersecurity-the-beginners-guide-a-comprehensive-guide-to-getting-started-in-1789616190
View Detail

Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in…

learning-malware-analysis-explore-the-concepts-tools-and-techniques-to-analyze-1788392507
View Detail

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze…

mastering-windows-security-and-hardening-secure-and-protect-your-windows-environment-1839216417
View Detail

Mastering Windows Security and Hardening: Secure and protect your Windows environment…

open-source-intelligence-techniques-resources-for-searching-and-analyzing-online-B08RRDTFF9
View Detail

Open Source Intelligence Techniques: Resources for Searching and Analyzing Online…

the-pentester-blueprint-starting-a-career-as-an-ethical-hacker-1119684307
View Detail

The Pentester BluePrint: Starting a Career as an Ethical Hacker

ptfm-purple-team-field-manual-B08LJV1QCD
View Detail

PTFM: Purple Team Field Manual

the-linux-command-line-2nd-edition-a-complete-introduction-1593279523
View Detail

The Linux Command Line, 2nd Edition: A Complete Introduction

social-engineering-the-science-of-human-hacking-111943338X
View Detail

Social Engineering: The Science of Human Hacking

computers-made-easy-from-dummy-to-geek-1983154830
View Detail

Computers Made Easy: From Dummy To Geek

linux-quick-study-computer-1572224487
View Detail

Linux (Quick Study Computer)

serious-cryptography-a-practical-introduction-to-modern-encryption-1593278268
View Detail

Serious Cryptography: A Practical Introduction to Modern Encryption

blue-team-handbook-incident-response-edition-a-condensed-field-guide-for-the-1500734756
View Detail

Blue Team Handbook: Incident Response Edition: A condensed field guide for the…

cyber-warfare-truth-tactics-and-strategies-strategic-concepts-and-truths-to-help-you-and-1839216999
View Detail

Cyber Warfare – Truth, Tactics, and Strategies: Strategic concepts and truths to help you and…

the-computer-programming-bible-a-step-by-step-guide-on-how-to-master-from-1661846289
View Detail

The Computer Programming Bible: A Step by Step Guide On How To Master From…

malware-analysis-and-detection-engineering-a-comprehensive-approach-to-detect-1484261925
View Detail

Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect…

mastering-windows-group-policy-control-and-secure-your-active-directory-environment-1789347394
View Detail

Mastering Windows Group Policy: Control and secure your Active Directory environment…

the-ghidra-book-the-definitive-guide-1718501021
View Detail

The Ghidra Book: The Definitive Guide

mindhunter-inside-the-fbis-elite-serial-crime-unit-1501191969
View Detail

Mindhunter: Inside the FBI's Elite Serial Crime Unit

the-basics-of-digital-forensics-the-primer-for-getting-started-in-digital-forensics-0128016353
View Detail

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

handbook-of-digital-forensics-and-investigation-0123742676
View Detail

Handbook of Digital Forensics and Investigation

comptia-security-sy0601-certification-guide-complete-coverage-of-the-new-comptia-1800564244
View Detail

CompTIA Security+: SY0-601 Certification Guide: Complete coverage of the new CompTIA…

learn-kali-linux-2019-perform-powerful-penetration-testing-using-kali-linux-metasploit-1789611806
View Detail

Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit,…

cybersecurity-attack-and-defense-strategies-counter-modern-threats-and-employ-stateof-183882779X
View Detail

Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of…

hunting-cyber-criminals-a-hackers-guide-to-online-intelligence-gathering-tools-and-1119540925
View Detail

Hunting Cyber Criminals: A Hacker's Guide to Online Intelligence Gathering Tools and…

forensics-for-dummies-1119608961
View Detail

Forensics For Dummies

digital-forensics-and-incident-response-incident-response-techniques-and-183864900X
View Detail

Digital Forensics and Incident Response: Incident response techniques and…

practical-mobile-forensics-forensically-investigate-and-analyze-ios-android-and-183864752X
View Detail

Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and…

fbi-handbook-of-crime-scene-forensics-the-authoritative-guide-to-navigating-crime-scenes-1632203227
View Detail

FBI Handbook of Crime Scene Forensics: The Authoritative Guide to Navigating Crime Scenes

mastering-kali-linux-for-advanced-penetration-testing-secure-your-network-with-kali-linux-20191-the-ultimate-white-hat-hackers-toolkit-3rd-edition-178934056X
View Detail

Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition

tor-and-the-deep-web-bitcoin-darknet-cryptocurrency-2-in-1-book-201718-nsa-1549727621
View Detail

Tor and the Deep Web: Bitcoin, DarkNet & Cryptocurrency (2 in 1 Book) 2017-18: NSA…

learn-wireshark-confidently-navigate-the-wireshark-interface-and-solve-realworld-1789134501
View Detail

Learn Wireshark: Confidently navigate the Wireshark interface and solve real-world…

hands-on-hacking-become-an-expert-at-next-gen-penetration-testing-and-purple-1119561450
View Detail

Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple…

incident-response-computer-forensics-third-edition-0071798684
View Detail

Incident Response & Computer Forensics, Third Edition

mastering-linux-security-and-hardening-protect-your-linux-systems-from-intruders-malware-1838981772
View Detail

Mastering Linux Security and Hardening: Protect your Linux systems from intruders, malware…

burners-black-markets-how-to-be-invisible-1532986084
View Detail

Burners & Black Markets - How to Be Invisible

handson-network-forensics-investigate-network-attacks-and-find-evidence-using-1789344522
View Detail

Hands-On Network Forensics: Investigate network attacks and find evidence using…

comptia-cysa-cybersecurity-analyst-certification-allinone-exam-guide-second-126046430X
View Detail

CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second…

digital-forensics-with-kali-linux-perform-data-acquisition-data-recovery-network-1838640800
View Detail

Digital Forensics with Kali Linux: Perform data acquisition, data recovery, network…

metasploit-50-for-beginners-perform-penetration-testing-to-secure-your-it-1838982663
View Detail

Metasploit 5.0 for Beginners: Perform penetration testing to secure your IT…

computer-forensics-for-dummies-0470371919
View Detail

Computer Forensics For Dummies

practical-threat-intelligence-and-datadriven-threat-hunting-a-handson-guide-to-1838556370
View Detail

Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to…

information-technology-essentials-volume-1-introduction-to-information-systems-1708175148
View Detail

Information Technology Essentials Volume 1: Introduction to Information Systems

cybersecurity-blue-team-toolkit-1119552931
View Detail

Cybersecurity Blue Team Toolkit

digital-forensics-with-open-source-tools-1597495867
View Detail

Digital Forensics with Open Source Tools

aws-penetration-testing-beginners-guide-to-hacking-aws-with-tools-such-as-kali-linux-1839216921
View Detail

AWS Penetration Testing: Beginner's guide to hacking AWS with tools such as Kali Linux,…

electronics-for-beginners-a-practical-introduction-to-schematics-circuits-and-microcontrollers-1484259785
View Detail

Electronics for Beginners: A Practical Introduction to Schematics, Circuits, and Microcontrollers

networking-allinone-for-dummies-for-dummies-computertech-1119471605
View Detail

Networking All-in-One For Dummies (For Dummies (Computer/Tech))

mastering-python-networking-your-onestop-solution-to-using-python-for-network-1839214678
View Detail

Mastering Python Networking: Your one-stop solution to using Python for network…

modern-computer-architecture-and-organization-learn-x86-arm-and-riscv-1838984399
View Detail

Modern Computer Architecture and Organization: Learn x86, ARM, and RISC-V…

wireless-networking-introduction-to-bluetooth-and-wifi-1973252112
View Detail

Wireless Networking: Introduction to Bluetooth and WiFi

cybersecurity-attacks-red-team-strategies-a-practical-guide-to-building-a-penetration-testing-1838828869
View Detail

Cybersecurity Attacks – Red Team Strategies: A practical guide to building a penetration testing…

practical-cybersecurity-architecture-a-guide-to-creating-and-implementing-robust-1838989927
View Detail

Practical Cybersecurity Architecture: A guide to creating and implementing robust…

ethical-hacking-3-in-1-beginners-guide-tips-and-tricks-advanced-and-effective-B08DC69J99
View Detail

Ethical Hacking: 3 in 1- Beginner's Guide+ Tips and Tricks+ Advanced and Effective…

cybersecurity-for-dummies-1119560322
View Detail

Cybersecurity For Dummies

the-hacker-playbook-3-practical-guide-to-penetration-testing-1980901759
View Detail

The Hacker Playbook 3: Practical Guide To Penetration Testing

digital-forensics-workbook-handson-activities-in-digital-forensics-1517713609
View Detail

Digital Forensics Workbook: Hands-on Activities in Digital Forensics

computer-programming-and-cyber-security-for-beginners-this-book-includes-python-1671532902
View Detail

Computer Programming And Cyber Security for Beginners: This Book Includes: Python…

the-art-of-memory-forensics-detecting-malware-and-threats-in-windows-linux-and-1118825098
View Detail

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and…

computer-forensics-cybercriminals-laws-and-evidence-1449692222
View Detail

Computer Forensics: Cybercriminals, Laws, and Evidence

industrial-cybersecurity-efficiently-secure-critical-infrastructure-systems-1788395158
View Detail

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

python-automation-cookbook-75-python-automation-ideas-for-web-scraping-data-1800207085
View Detail

Python Automation Cookbook: 75 Python automation ideas for web scraping, data…

banner

Popular Genres

  • children books 339
  • literature books 256
  • arts books 211
  • christian books 192
  • hobbies books 144
  • teen books 141
  • business books 137
  • spirituality books 132
  • cookbooks books 119

Follow Us

  • FACEBOOK
  • TWITTER
  • LINKEDIN
  • PINTEREST
  • INSTAGRAM
  • YOUTUBE

Trending Books

healing-kitchen-1628600942
Healing Kitchen
( 209 Reviews )
hans-christian-andersens-complete-fairy-tales-B076X7872Z
Hans Christian Andersen's Complete Fairy Tales
( 210 Reviews )
song-of-the-stars-a-christmas-story-0310722918
Song of the Stars: A Christmas Story
( 200 Reviews )
the-united-states-constitution-B00GJZ70LC
The United States Constitution
( 869 Reviews )
Footer Logo

The RIGHT book in the RIGHT hands at the RIGHT time can let you make RIGHT decision in your life.

About Us

  • 242 W 41st St, New York City, NY 10011, USA
  • contact@nicebooks.net
  • Contact Us
  • Privacy Policy

Copyright Ⓒ 2025 Nice Books Inc. All Rights Reserved.

  • Home
  • Books
    • arts books
    • memoirs books
    • business books
    • calendars books
    • children books
    • christian books
    • comics books
    • technology books
    • cookbooks books
    • hobbies books
    • education books
    • engineering books
    • health books
    • history books
    • entertainment books
    • law books
    • lgbtq books
    • literature books
    • medical books
    • mystery books
    • relationships books
    • politics books
    • reference books
    • spirituality books
    • romance books
    • science books
    • fantasy books
    • selfhelp books
    • sports books
    • teen books
    • preparation books
    • travel books
  • Genres
  • New Release