Nice Books Logo
  • Home
  • Books
    • arts books
    • memoirs books
    • business books
    • calendars books
    • children books
    • christian books
    • comics books
    • technology books
    • cookbooks books
    • hobbies books
    • education books
    • engineering books
    • health books
    • history books
    • entertainment books
    • law books
    • lgbtq books
    • literature books
    • medical books
    • mystery books
    • relationships books
    • politics books
    • reference books
    • spirituality books
    • romance books
    • science books
    • fantasy books
    • selfhelp books
    • sports books
    • teen books
    • preparation books
    • travel books
  • Genres
  • New Release

Books Related To The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity

  1. Home
  2. Books Related To The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity
the-security-culture-playbook-an-executive-guide-to-reducing-risk-and-developing-your-human-defense-layer-B09V6VWW42
View Detail

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer

sandworm-a-new-era-of-cyberwar-and-the-hunt-for-the-kremlins-most-dangerous-hackers-B07GD4MFW2
View Detail

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

how-cybersecurity-really-works-a-hands-on-guide-for-total-beginners-B08FH9BW5V
View Detail

How Cybersecurity Really Works: A Hands-On Guide for Total Beginners

cybersecurity-essentials-B07H1MX971
View Detail

Cybersecurity Essentials

hackable-how-to-do-application-security-right-B08MFTQ7Q4
View Detail

Hackable: How to Do Application Security Right

cybersecurity-career-master-plan-proven-techniques-and-effective-tips-to-help-you-advance-in-your-cybersecurity-career-B097HSV755
View Detail

Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career

cybersecurity-the-beginners-guide-a-comprehensive-guide-to-getting-started-in-cybersecurity-B07SB5DYM4
View Detail

Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity

the-three-laws-of-cybersecurity-the-ultimate-guide-with-checklists-tables-diagrams-and-with-new-strategies-to-protect-your-assets-B09QGR5642
View Detail

The Three Laws of Cybersecurity: The Ultimate Guide with Checklists, Tables, Diagrams and with new Strategies to Protect Your Assets

next-level-cybersecurity-detect-the-signals-stop-the-hack-B07N67D4BV
View Detail

Next Level Cybersecurity: Detect the Signals, Stop the Hack

social-engineering-the-science-of-human-hacking-B07F24YV2M
View Detail

Social Engineering: The Science of Human Hacking

the-art-of-deception-controlling-the-human-element-of-security-B006BBZHAK
View Detail

The Art of Deception: Controlling the Human Element of Security

how-to-measure-anything-in-cybersecurity-risk-B01J4XYM16
View Detail

How to Measure Anything in Cybersecurity Risk

computer-programming-and-cyber-security-for-beginners-this-book-includes-python-machine-learning-sql-linux-hacking-with-kali-linux-ethical-hacking-coding-and-cybersecurity-fundamentals-B082D492H8
View Detail

Computer Programming And Cyber Security for Beginners: This Book Includes: Python Machine Learning, SQL, Linux, Hacking with Kali Linux, Ethical Hacking. Coding and Cybersecurity Fundamentals

cybersecurity-for-business-organization-wide-strategies-to-ensure-cyber-risk-is-not-just-an-it-issue-B09Q6B3BNN
View Detail

Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue

nist-cybersecurity-framework-a-pocket-guide-B07HKLSP82
View Detail

NIST Cybersecurity Framework: A pocket guide

countdown-to-zero-day-stuxnet-and-the-launch-of-the-worlds-first-digital-weapon-B00KEPLC08
View Detail

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

the-laymans-guide-to-cybersecurity-an-essential-begginers-guide-to-keeping-your-home-office-or-computer-safe-from-viruses-online-attacks-and-more-B0B7CRV3YZ
View Detail

The Layman’s Guide to Cybersecurity: An essential begginers guide to keeping your home office or computer safe from viruses, online attacks and more!

hacking-the-art-of-exploitation-2nd-edition-B004OEJN3I
View Detail

Hacking: The Art of Exploitation, 2nd Edition

big-breaches-cybersecurity-lessons-for-everyone-B08XK21PSY
View Detail

Big Breaches: Cybersecurity Lessons for Everyone

the-fifth-domain-defending-our-country-our-companies-and-ourselves-in-the-age-of-cyber-threats-B07JKHF7VM
View Detail

The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats

the-art-of-attack-attacker-mindset-for-security-professionals-B0992XZR3M
View Detail

The Art of Attack: Attacker Mindset for Security Professionals

the-ciso-evolution-business-knowledge-for-cybersecurity-executives-B09QHC1LMW
View Detail

The CISO Evolution: Business Knowledge for Cybersecurity Executives

a-vulnerable-system-the-history-of-information-security-in-the-computer-age-B08YP9XH84
View Detail

A Vulnerable System: The History of Information Security in the Computer Age

how-to-hack-like-a-pornstar-a-step-by-step-process-for-breaking-into-a-bank-hacking-the-planet-book-1-B01MTDLGQQ
View Detail

How to Hack Like a PORNSTAR: A step by step process for breaking into a BANK (Hacking the planet Book 1)

how-to-hack-like-a-god-master-the-secrets-of-hacking-through-real-life-scenarios-hacking-the-planet-book-2-B06Y4HWHXC
View Detail

How to Hack Like a GOD: Master the secrets of hacking through real life scenarios (Hacking the planet Book 2)

cybersecurity-for-executives-in-the-age-of-cloud-B0852M2XBJ
View Detail

Cybersecurity for Executives in the Age of Cloud

human-hacking-win-friends-influence-people-and-leave-them-better-off-for-having-met-you-B087287Y3M
View Detail

Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You

the-lowlife-labs-cybersecurity-cookbook-quick-steps-for-git-terraform-digital-ocean-aws-elasticsearch-suricata-and-automated-c2-setup-B087X1MCZW
View Detail

The Lowlife Labs Cybersecurity Cookbook: Quick Steps For: Git, Terraform, Digital Ocean, AWS, Elasticsearch, Suricata and Automated C2 Setup

the-cybersecurity-mindset-a-virtual-and-transformational-thinking-mode-B09NQN17BZ
View Detail

The Cybersecurity Mindset: A Virtual and Transformational Thinking Mode

how-to-hack-like-a-ghost-breaching-the-cloud-B08FH9SQNG
View Detail

How to Hack Like a Ghost: Breaching the Cloud

threat-modeling-designing-for-security-B00IG71FAS
View Detail

Threat Modeling: Designing for Security

adversarial-tradecraft-in-cybersecurity-offense-versus-defense-in-real-time-computer-conflict-B0957LV496
View Detail

Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict

cybersecurity-the-insights-you-need-from-harvard-business-review-hbr-insights-B07MXNKBQY
View Detail

Cybersecurity: The Insights You Need from Harvard Business Review (HBR Insights)

industrial-cybersecurity-efficiently-monitor-the-cybersecurity-posture-of-your-ics-environment-2nd-edition-B0997HDH5P
View Detail

Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment, 2nd Edition

coding-for-absolute-beginners-and-cybersecurity-5-books-in-1-the-programming-bible-learn-well-the-fundamental-functions-of-python-java-c-and-how-to-protect-your-data-from-hacker-attacks-B096VML5KT
View Detail

Coding for Absolute Beginners and Cybersecurity: 5 BOOKS IN 1 THE PROGRAMMING BIBLE: Learn Well the Fundamental Functions of Python, Java, C++ and How to Protect Your Data from Hacker Attacks

cybersecurity-a-comprehensive-beginners-guide-to-learn-the-realms-of-cybersecurity-from-a-z-B083RY9K4C
View Detail

Cybersecurity: A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z

cyber-crisis-protecting-your-business-from-real-threats-in-the-virtual-world-B08JQLWDQK
View Detail

Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World

click-here-to-kill-everybody-security-and-survival-in-a-hyper-connected-world-B07BLMQKZK
View Detail

Click Here to Kill Everybody: Security and Survival in a Hyper-connected World

cybersecurity-and-cyberwar-what-everyone-needs-to-know-B00GJG6ZB2
View Detail

Cybersecurity and Cyberwar: What Everyone Needs to Know®

the-art-of-intrusion-the-real-stories-behind-the-exploits-of-hackers-intruders-and-deceivers-B000S1M0DG
View Detail

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers

blue-team-field-manual-btfm-rtfm-B077WF4WYV
View Detail

Blue Team Field Manual (BTFM) (RTFM)

cybersecurity-for-beginners-B06WGTKN21
View Detail

Cybersecurity for Beginners

dark-territory-the-secret-history-of-cyber-war-B010MHABUY
View Detail

Dark Territory: The Secret History of Cyber War

the-art-of-invisibility-the-worlds-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-big-brother-and-big-data-B01KX5G01Y
View Detail

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

tracers-in-the-dark-the-global-hunt-for-the-crime-lords-of-cryptocurrency-B09SKW8WRV
View Detail

Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

the-linux-command-line-beginners-guide-B007CD3SOI
View Detail

The Linux Command Line Beginner's Guide

cybersecurity-leadership-powering-the-modern-organization-B00J3PSSV6
View Detail

Cybersecurity Leadership: Powering the Modern Organization

cybersecurity-and-third-party-risk-third-party-threat-hunting-B09757TKCW
View Detail

Cybersecurity and Third-Party Risk: Third Party Threat Hunting

the-simulation-hypothesis-an-mit-computer-scientist-shows-why-ai-quantum-physics-and-eastern-mystics-all-agree-we-are-in-a-video-game-B07M81F1KG
View Detail

The Simulation Hypothesis: An MIT Computer Scientist Shows Why AI, Quantum Physics and Eastern Mystics All Agree We Are In a Video Game

banner

Popular Genres

  • children books 339
  • literature books 256
  • arts books 211
  • christian books 192
  • hobbies books 144
  • teen books 141
  • business books 137
  • spirituality books 132
  • cookbooks books 119

Follow Us

  • FACEBOOK
  • TWITTER
  • LINKEDIN
  • PINTEREST
  • INSTAGRAM
  • YOUTUBE

Trending Books

healing-kitchen-1628600942
Healing Kitchen
( 209 Reviews )
hans-christian-andersens-complete-fairy-tales-B076X7872Z
Hans Christian Andersen's Complete Fairy Tales
( 210 Reviews )
song-of-the-stars-a-christmas-story-0310722918
Song of the Stars: A Christmas Story
( 200 Reviews )
the-united-states-constitution-B00GJZ70LC
The United States Constitution
( 869 Reviews )
Footer Logo

The RIGHT book in the RIGHT hands at the RIGHT time can let you make RIGHT decision in your life.

About Us

  • 242 W 41st St, New York City, NY 10011, USA
  • contact@nicebooks.net
  • Contact Us
  • Privacy Policy

Copyright Ⓒ 2025 Nice Books Inc. All Rights Reserved.

  • Home
  • Books
    • arts books
    • memoirs books
    • business books
    • calendars books
    • children books
    • christian books
    • comics books
    • technology books
    • cookbooks books
    • hobbies books
    • education books
    • engineering books
    • health books
    • history books
    • entertainment books
    • law books
    • lgbtq books
    • literature books
    • medical books
    • mystery books
    • relationships books
    • politics books
    • reference books
    • spirituality books
    • romance books
    • science books
    • fantasy books
    • selfhelp books
    • sports books
    • teen books
    • preparation books
    • travel books
  • Genres
  • New Release