Most popular on Perlego
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Information Security Risk Analysis_cover
Information Security Risk Analysis
Thomas R. Peltier
2010
Kali Linux Cookbook - Second Edition_cover
Kali Linux Cookbook - Second Edition
Corey P. Schultz, Bob Perciaccante
2017
Network Attacks and Exploitation_cover
Network Attacks and Exploitation
Matthew Monte
2015
Hacking und Bug Hunting_cover
Hacking und Bug Hunting
Peter Yaworski
2020
Financial Investigation and Forensic Accounting_cover
Financial Investigation and Forensic Accounting
George A. Manning Ph.D CFE EA
2010
Cyber Defense Mechanisms_cover
Cyber Defense Mechanisms
2020
Deep Dive_cover
Deep Dive
Rae L. Baker
2023
Software Transparency_cover
Software Transparency
Chris Hughes, Tony Turner
2023
The AI Wave in Defence Innovation_cover
The AI Wave in Defence Innovation
Michael Raska, Richard A. Bitzinger
2023
5G Cyber Risks and Mitigation_cover
5G Cyber Risks and Mitigation
Sabhyata Soni
2023
Cyber Threat Intelligence_cover
Cyber Threat Intelligence
Martin Lee
2023
Breaking Ransomware_cover
Breaking Ransomware
Jitender Narula, Atul Narula
2023
Windows Ransomware Detection and Protection_cover
Windows Ransomware Detection and Protection
Marius Sandbu
2023
Risk Management and ISO 31000_cover
Risk Management and ISO 31000
Alan Field
2023
Windows APT Warfare_cover
Windows APT Warfare
Sheng-Hao Ma, Ziv Chang, Federico Maggi
2023
Cybersecurity Blue Team Strategies_cover
Cybersecurity Blue Team Strategies
Kunal Sehgal, Nikolaos Thymianis
2023
Executive's Cybersecurity Program Handbook_cover
Executive's Cybersecurity Program Handbook
Jason Brown
2023
The Vulnerability Researcher's Handbook_cover
The Vulnerability Researcher's Handbook
Benjamin Strout
2023
Combating Crime on the Dark Web_cover
Combating Crime on the Dark Web
Nearchos Nearchou
2023
Cybersecurity Threats, Malware Trends, and Strategies_cover
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains, Timothy Youngblood CISSP
2023
IAPP CIPM Certified Information Privacy Manager Study Guide_cover
IAPP CIPM Certified Information Privacy Manager Study Guide
Mike Chapple, Joe Shelley
2023
Cloud Auditing Best Practices_cover
Cloud Auditing Best Practices
Shinesa Cambric, Michael Ratemo
2023
Microsoft Cybersecurity Architect Exam Ref SC-100_cover
Microsoft Cybersecurity Architect Exam Ref SC-100
Dwayne Natwick, Rod Trent
2023
Cybersecurity All-in-One For Dummies_cover
Cybersecurity All-in-One For Dummies
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
2023
Advance Cyber Security_cover
Advance Cyber Security
Manmohan Singh, Priyanka Sharma, Rahul Sharma
2023
Cloud Identity Patterns and Strategies_cover
Cloud Identity Patterns and Strategies
Giuseppe Di Federico, Fabrizio Barcaroli
2022
PCI Compliance_cover
PCI Compliance
Branden R Williams, James Adamson
2022
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2022
An Ethical Guide to Cyber Anonymity_cover
An Ethical Guide to Cyber Anonymity
Kushantha Gunawardana
2022
Machine Learning for Cyber Security_cover
Machine Learning for Cyber Security
Preeti Malik, Lata Nautiyal, Mangey Ram
2022
Managing the Insider Threat_cover
Managing the Insider Threat
Nick Catrantzos
2022
Red Hat Enterprise Linux 9 Administration_cover
Red Hat Enterprise Linux 9 Administration
Pablo Iranzo Gomez, Pedro Ibanez Requena, Miguel Perez Colino, Scott McCarty
2022
Hybrid Cloud Security Patterns_cover
Hybrid Cloud Security Patterns
Sreekanth Iyer, Dr. Nataraj Nagaratnam
2022
CompTIA Network+ N10-008 Certification Guide_cover
CompTIA Network+ N10-008 Certification Guide
Glen D. Singh
2022
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
Diving into Secure Access Service Edge_cover
Diving into Secure Access Service Edge
Jeremiah Ginn, David H. Brown
2022
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
Network Protocols for Security Professionals_cover
Network Protocols for Security Professionals
Yoram Orzach, Deepanshu Khanna
2022
Cybersecurity – Attack and Defense Strategies_cover
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes, Dr. Erdal Ozkaya
2022
MCA Microsoft Certified Associate Azure Network Engineer Study Guide_cover
MCA Microsoft Certified Associate Azure Network Engineer Study Guide
Puthiyavan Udayakumar, Kathiravan Udayakumar
2022
The Official2 CCSP CBK Reference_cover
The Official2 CCSP CBK Reference
Aaron Kraus
2022
How to Find a Needle in a Haystack_cover
How to Find a Needle in a Haystack
Yair Neuman
2022
Cyber Security Threats and Challenges Facing Human Life_cover
Cyber Security Threats and Challenges Facing Human Life
Narendra M Shekokar, Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, Monika Mangla
2022
Security Engineering for Embedded and Cyber-Physical Systems_cover
Security Engineering for Embedded and Cyber-Physical Systems
Saad Motahhir, Yassine Maleh
2022
Modern Cybersecurity Strategies for Enterprises_cover
Modern Cybersecurity Strategies for Enterprises
Ashish Mishra
2022
Learn Wireshark_cover
Learn Wireshark
Lisa Bock
2022
Practical Core Software Security_cover
Practical Core Software Security
James F. Ransome, Anmol Misra, Mark S. Merkow
2022
Hack the Cybersecurity Interview_cover
Hack the Cybersecurity Interview
Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
2022
Certified Ethical Hacker v12 312-50 Exam Guide_cover
Certified Ethical Hacker v12 312-50 Exam Guide
Dale Meredith, Christopher Rees
2022
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
Trust, Security and Privacy for Big Data_cover
Trust, Security and Privacy for Big Data
Mamoun Alazab, Maanak Gupta
2022
Cybersecurity Public Policy_cover
Cybersecurity Public Policy
Bradley Fowler, Kennedy Maranga
2022
Ransomware and Cybercrime_cover
Ransomware and Cybercrime
Andrew Jenkinson
2022
Cybercrime_cover
Cybercrime
Todd Wade
2022
Recently published
Deep Dive_cover
Deep Dive
Rae L. Baker
2023
Software Transparency_cover
Software Transparency
Chris Hughes, Tony Turner
2023
The AI Wave in Defence Innovation_cover
The AI Wave in Defence Innovation
Michael Raska, Richard A. Bitzinger
2023
5G Cyber Risks and Mitigation_cover
5G Cyber Risks and Mitigation
Sabhyata Soni
2023
Cyber Threat Intelligence_cover
Cyber Threat Intelligence
Martin Lee
2023
Breaking Ransomware_cover
Breaking Ransomware
Jitender Narula, Atul Narula
2023
Windows Ransomware Detection and Protection_cover
Windows Ransomware Detection and Protection
Marius Sandbu
2023
Risk Management and ISO 31000_cover
Risk Management and ISO 31000
Alan Field
2023
Windows APT Warfare_cover
Windows APT Warfare
Sheng-Hao Ma, Ziv Chang, Federico Maggi
2023
Cybersecurity Blue Team Strategies_cover
Cybersecurity Blue Team Strategies
Kunal Sehgal, Nikolaos Thymianis
2023
Executive's Cybersecurity Program Handbook_cover
Executive's Cybersecurity Program Handbook
Jason Brown
2023
The Vulnerability Researcher's Handbook_cover
The Vulnerability Researcher's Handbook
Benjamin Strout
2023
Combating Crime on the Dark Web_cover
Combating Crime on the Dark Web
Nearchos Nearchou
2023
Cybersecurity Threats, Malware Trends, and Strategies_cover
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains, Timothy Youngblood CISSP
2023
IAPP CIPM Certified Information Privacy Manager Study Guide_cover
IAPP CIPM Certified Information Privacy Manager Study Guide
Mike Chapple, Joe Shelley
2023
Cloud Auditing Best Practices_cover
Cloud Auditing Best Practices
Shinesa Cambric, Michael Ratemo
2023
Microsoft Cybersecurity Architect Exam Ref SC-100_cover
Microsoft Cybersecurity Architect Exam Ref SC-100
Dwayne Natwick, Rod Trent
2023
Cybersecurity All-in-One For Dummies_cover
Cybersecurity All-in-One For Dummies
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
2023
Advance Cyber Security_cover
Advance Cyber Security
Manmohan Singh, Priyanka Sharma, Rahul Sharma
2023
Cloud Identity Patterns and Strategies_cover
Cloud Identity Patterns and Strategies
Giuseppe Di Federico, Fabrizio Barcaroli
2022
PCI Compliance_cover
PCI Compliance
Branden R Williams, James Adamson
2022
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2022
An Ethical Guide to Cyber Anonymity_cover
An Ethical Guide to Cyber Anonymity
Kushantha Gunawardana
2022
Machine Learning for Cyber Security_cover
Machine Learning for Cyber Security
Preeti Malik, Lata Nautiyal, Mangey Ram
2022
Managing the Insider Threat_cover
Managing the Insider Threat
Nick Catrantzos
2022
Red Hat Enterprise Linux 9 Administration_cover
Red Hat Enterprise Linux 9 Administration
Pablo Iranzo Gomez, Pedro Ibanez Requena, Miguel Perez Colino, Scott McCarty
2022
Hybrid Cloud Security Patterns_cover
Hybrid Cloud Security Patterns
Sreekanth Iyer, Dr. Nataraj Nagaratnam
2022
CompTIA Network+ N10-008 Certification Guide_cover
CompTIA Network+ N10-008 Certification Guide
Glen D. Singh
2022
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
Diving into Secure Access Service Edge_cover
Diving into Secure Access Service Edge
Jeremiah Ginn, David H. Brown
2022
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
Network Protocols for Security Professionals_cover
Network Protocols for Security Professionals
Yoram Orzach, Deepanshu Khanna
2022
Cybersecurity – Attack and Defense Strategies_cover
Cybersecurity – Attack and Defense Strategies
Yuri Diogenes, Dr. Erdal Ozkaya
2022
MCA Microsoft Certified Associate Azure Network Engineer Study Guide_cover
MCA Microsoft Certified Associate Azure Network Engineer Study Guide
Puthiyavan Udayakumar, Kathiravan Udayakumar
2022
The Official2 CCSP CBK Reference_cover
The Official2 CCSP CBK Reference
Aaron Kraus
2022
How to Find a Needle in a Haystack_cover
How to Find a Needle in a Haystack
Yair Neuman
2022
Cyber Security Threats and Challenges Facing Human Life_cover
Cyber Security Threats and Challenges Facing Human Life
Narendra M Shekokar, Hari Vasudevan, Surya S Durbha, Antonis Michalas, Tatwadarshi P Nagarhalli, Ramchandra Sharad Mangrulkar, Monika Mangla
2022
Security Engineering for Embedded and Cyber-Physical Systems_cover
Security Engineering for Embedded and Cyber-Physical Systems
Saad Motahhir, Yassine Maleh
2022
Modern Cybersecurity Strategies for Enterprises_cover
Modern Cybersecurity Strategies for Enterprises
Ashish Mishra
2022
Learn Wireshark_cover
Learn Wireshark
Lisa Bock
2022
Practical Core Software Security_cover
Practical Core Software Security
James F. Ransome, Anmol Misra, Mark S. Merkow
2022
Hack the Cybersecurity Interview_cover
Hack the Cybersecurity Interview
Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
2022
Certified Ethical Hacker v12 312-50 Exam Guide_cover
Certified Ethical Hacker v12 312-50 Exam Guide
Dale Meredith, Christopher Rees
2022
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
Trust, Security and Privacy for Big Data_cover
Trust, Security and Privacy for Big Data
Mamoun Alazab, Maanak Gupta
2022
Cybersecurity Public Policy_cover
Cybersecurity Public Policy
Bradley Fowler, Kennedy Maranga
2022
Ransomware and Cybercrime_cover
Ransomware and Cybercrime
Andrew Jenkinson
2022
Cybercrime_cover
Cybercrime
Todd Wade
2022
Security and Privacy Trends in Cloud Computing and Big Data_cover
Security and Privacy Trends in Cloud Computing and Big Data
Muhammad Imran Tariq, Valentina Emilia Balas, Shahzadi Tayyaba
2022
Mobile Platform Security_cover
Mobile Platform Security
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena Reshetova, Ahmad-Reza Sadeghi
2022
Practical Cyber Threat Intelligence_cover
Practical Cyber Threat Intelligence
Dr. Erdal Ozkaya
2022
Mobile App Reverse Engineering_cover
Mobile App Reverse Engineering
Abhinav Mishra
2022
MS-700 Managing Microsoft Teams Exam Guide_cover
MS-700 Managing Microsoft Teams Exam Guide
Peter Rising, Nate Chamberlain
2022
Ethical Hacker's Penetration Testing Guide_cover
Ethical Hacker's Penetration Testing Guide
Samir Kumar Rakshit
2022
Recently added
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
Mobile App Reverse Engineering_cover
Mobile App Reverse Engineering
Abhinav Mishra
2022
The Ultimate Kali Linux Book_cover
The Ultimate Kali Linux Book
Glen D. Singh
2022
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2021
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
The Pentester BluePrint_cover
The Pentester BluePrint
Phillip L. Wylie, Kim Crawley
2020
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020