Most popular on Perlego
Cryptography_cover
Cryptography
Douglas Robert Stinson, Maura Paterson
2018
Cyber Defense Mechanisms_cover
Cyber Defense Mechanisms
2020
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2023
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
Breaking Ransomware_cover
Breaking Ransomware
Jitender Narula, Atul Narula
2023
Cybersecurity Blue Team Strategies_cover
Cybersecurity Blue Team Strategies
Kunal Sehgal, Nikolaos Thymianis
2023
The Vulnerability Researcher's Handbook_cover
The Vulnerability Researcher's Handbook
Benjamin Strout
2023
IAPP CIPM Certified Information Privacy Manager Study Guide_cover
IAPP CIPM Certified Information Privacy Manager Study Guide
Mike Chapple, Joe Shelley
2023
PCI Compliance_cover
PCI Compliance
Branden R Williams, James Adamson
2022
Hack the Cybersecurity Interview_cover
Hack the Cybersecurity Interview
Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
2022
Cybersecurity Public Policy_cover
Cybersecurity Public Policy
Bradley Fowler, Kennedy Maranga
2022
Cybersecurity_cover
Cybersecurity
Henrique M. D. Santos
2022
Penetration Testing for Jobseekers_cover
Penetration Testing for Jobseekers
Debasish Mandal
2022
Zero Trust Security_cover
Zero Trust Security
Nike Andravous
2022
IT-Sicherheit für Dummies_cover
IT-Sicherheit für Dummies
Rainer W. Gerling, Sebastian R. Gerling
2022
Essential Cryptography for JavaScript Developers_cover
Essential Cryptography for JavaScript Developers
Alessandro Segala
2022
Python for Cybersecurity_cover
Python for Cybersecurity
Howard E. Poston
2022
The CISO Evolution_cover
The CISO Evolution
Matthew K. Sharp, Kyriakos Lambros
2022
Advanced Cybersecurity Technologies_cover
Advanced Cybersecurity Technologies
Ralph Moseley
2021
Cybersecurity Issues in Emerging Technologies_cover
Cybersecurity Issues in Emerging Technologies
Leandros Maglaras, Ioanna Kantzavelou
2021
Stuxnet to Sunburst_cover
Stuxnet to Sunburst
Andrew Jenkinson
2021
Cryptography, Information Theory, and Error-Correction_cover
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan
2021
Cryptography and Network Security_cover
Cryptography and Network Security
Bhushan Trivedi, Savita Gandhi, Dhiren Pandit
2021
Threat Hunting in the Cloud_cover
Threat Hunting in the Cloud
Chris Peiris, Binil Pillai, Abbas Kudrati
2021
DeFi and the Future of Finance_cover
DeFi and the Future of Finance
Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
2021
Archives in the Digital Age_cover
Archives in the Digital Age
Abderrazak Mkadmi
2021
Building Secure Cars_cover
Building Secure Cars
Dennis Kengo Oka
2021
Privacy, Regulations, and Cybersecurity_cover
Privacy, Regulations, and Cybersecurity
Chris Moschovitis
2021
SSL/TLS Under Lock and Key_cover
SSL/TLS Under Lock and Key
Paul Baka, Jeremy Schatten
2020
Blockchain with Hyperledger Fabric_cover
Blockchain with Hyperledger Fabric
Nitin Gaur, Anthony O'Dowd, Petr Novotny, Luc Desrosiers, Venkatraman Ramakrishna, Salman Baset
2020
Practical Cybersecurity Architecture_cover
Practical Cybersecurity Architecture
Ed Moyle, Diana Kelley
2020
Alice and Bob Learn Application Security_cover
Alice and Bob Learn Application Security
Tanya Janca
2020
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2020
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Cybersecurity Law_cover
Cybersecurity Law
Davide Mula, Alfonso Contaldo
2020
Practical Artificial Intelligence and Blockchain_cover
Practical Artificial Intelligence and Blockchain
Ganesh Prasad Kumble
2020
Fundamentals of Cyber Security_cover
Fundamentals of Cyber Security
Mayank Bhushan
2018
Data Hiding Techniques in Windows OS_cover
Data Hiding Techniques in Windows OS
Nihad Ahmad Hassan, Rami Hijazi
2016
Persone in rete_cover
Persone in rete
Antonello Soro
Recently published
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2023
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
Breaking Ransomware_cover
Breaking Ransomware
Jitender Narula, Atul Narula
2023
Cybersecurity Blue Team Strategies_cover
Cybersecurity Blue Team Strategies
Kunal Sehgal, Nikolaos Thymianis
2023
The Vulnerability Researcher's Handbook_cover
The Vulnerability Researcher's Handbook
Benjamin Strout
2023
IAPP CIPM Certified Information Privacy Manager Study Guide_cover
IAPP CIPM Certified Information Privacy Manager Study Guide
Mike Chapple, Joe Shelley
2023
PCI Compliance_cover
PCI Compliance
Branden R Williams, James Adamson
2022
Hack the Cybersecurity Interview_cover
Hack the Cybersecurity Interview
Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
2022
Cybersecurity Public Policy_cover
Cybersecurity Public Policy
Bradley Fowler, Kennedy Maranga
2022
Cybersecurity_cover
Cybersecurity
Henrique M. D. Santos
2022
Penetration Testing for Jobseekers_cover
Penetration Testing for Jobseekers
Debasish Mandal
2022
Zero Trust Security_cover
Zero Trust Security
Nike Andravous
2022
IT-Sicherheit für Dummies_cover
IT-Sicherheit für Dummies
Rainer W. Gerling, Sebastian R. Gerling
2022
Essential Cryptography for JavaScript Developers_cover
Essential Cryptography for JavaScript Developers
Alessandro Segala
2022
Python for Cybersecurity_cover
Python for Cybersecurity
Howard E. Poston
2022
Recently added
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
DeFi and the Future of Finance_cover
DeFi and the Future of Finance
Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
2021
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020