Más popular en Perlego
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2022
Hands-On Machine Learning for Cybersecurity_cover
Hands-On Machine Learning for Cybersecurity
Soma Halder, Sinan Ozdemir
2018
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
The Official2 CISSP CBK Reference_cover
The Official2 CISSP CBK Reference
Arthur J. Deane, Aaron Kraus
2021
Learning iOS Penetration Testing_cover
Learning iOS Penetration Testing
Swaroop Yermalkar
2016
CASP+ CompTIA Advanced Security Practitioner Study Guide_cover
CASP+ CompTIA Advanced Security Practitioner Study Guide
Jeff T. Parker, Michael Gregg
2019
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
IoT_cover
IoT
Souvik Pal, Vicente García Díaz, Dac-Nhuong Le
2020
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Cyber Threat Intelligence_cover
Cyber Threat Intelligence
Martin Lee
2023
Cybersecurity Public Policy_cover
Cybersecurity Public Policy
Bradley Fowler, Kennedy Maranga
2022
Penetration Testing for Jobseekers_cover
Penetration Testing for Jobseekers
Debasish Mandal
2022
Cybersecurity for Business_cover
Cybersecurity for Business
Larry Clinton
2022
Enterprise Cybersecurity in Digital Business_cover
Enterprise Cybersecurity in Digital Business
Ariel Evans
2022
DevOps y seguridad cloud_cover
DevOps y seguridad cloud
Guijarro Olivares, Jordi, Caparrós Ramírez, Joan, Cubero Luque, Lorenzo
2019
Cyber-Security Threats, Actors, and Dynamic Mitigation_cover
Cyber-Security Threats, Actors, and Dynamic Mitigation
Nicholas Kolokotronis, Stavros Shiaeles
2021
Measuring and Managing Information Risk_cover
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
Cloud Auditing Best Practices_cover
Cloud Auditing Best Practices
Shinesa Cambric, Michael Ratemo
2023
Cybersecurity in Intelligent Networking Systems_cover
Cybersecurity in Intelligent Networking Systems
Shengjie Xu, Yi Qian, Rose Qingyang Hu
2022
Practical Industrial Cybersecurity_cover
Practical Industrial Cybersecurity
Charles J. Brooks, Philip A. Craig, Jr.
2022
Mastering Cyber Intelligence_cover
Mastering Cyber Intelligence
Jean Nestor M. Dahj
2022
Cloud Security Handbook_cover
Cloud Security Handbook
Eyal Estrin
2022
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Cynthia Brumfield, Brian Haugli
2021
Privacy, Regulations, and Cybersecurity_cover
Privacy, Regulations, and Cybersecurity
Chris Moschovitis
2021
Nuevos espacios de seguridad nacional_cover
Nuevos espacios de seguridad nacional
Dr. Cristian Barria Huidobro
2020
Network Security Strategies_cover
Network Security Strategies
Aditya Mukherjee
2020
Learning Android Forensics_cover
Learning Android Forensics
Oleg Skulkin, Donnie Tindall, Rohit Tamma
2018
Hands-On Security in DevOps_cover
Hands-On Security in DevOps
Tony Hsu
2018
FinTech_cover
FinTech
Parag Y Arjunwadkar
2018
Windows Security Monitoring_cover
Windows Security Monitoring
Andrei Miroshnikov
2018
Social Engineering_cover
Social Engineering
Christopher Hadnagy
2018
Un fantasma en el sistema_cover
Un fantasma en el sistema
Kevin Mitnick, William L. Simon
2020
ISO27001/ISO27002: Una guía de bolsillo_cover
ISO27001/ISO27002: Una guía de bolsillo
Alan Calder
2017
Information Security_cover
Information Security
Mark Stamp
2021
Crafting Test-Driven Software with Python_cover
Crafting Test-Driven Software with Python
Alessandro Molina
2021
CompTIA Security+: SY0-601 Certification Guide_cover
CompTIA Security+: SY0-601 Certification Guide
Ian Neil
2020
Blockchain Technology_cover
Blockchain Technology
E. Golden Julie, J. Jesu Vedha Nayahi, Noor Zaman Jhanjhi
2020
Learn Computer Forensics_cover
Learn Computer Forensics
William Oettinger
2020
Secure, Resilient, and Agile Software Development_cover
Secure, Resilient, and Agile Software Development
Mark Merkow
2019
Strategic Security Management_cover
Strategic Security Management
Karim Vellani
2019
Blockchain and the Law_cover
Blockchain and the Law
Primavera De Filippi, Aaron Wright
2018
The Decision to Attack_cover
The Decision to Attack
Aaron Franklin Brantly
2016
Spring Boot in Action_cover
Spring Boot in Action
Craig Walls
2015
Building Robots With Lego Mindstorms_cover
Building Robots With Lego Mindstorms
Mario Ferrari, Guilio Ferrari
2001
Publicado recientemente
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Combatting Cyber Terrorism_cover
Combatting Cyber Terrorism
Richard Bingley
2024
The Code of Honor_cover
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
A CISO Guide to Cyber Resilience_cover
A CISO Guide to Cyber Resilience
Debra Baker
2024
Unveiling the NIST Risk Management Framework (RMF)_cover
Unveiling the NIST Risk Management Framework (RMF)
Thomas Marsland
2024
Blockchain-based Cyber Security_cover
Blockchain-based Cyber Security
2024
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Riding the Wave_cover
Riding the Wave
Andrew Boyarsky
2024
Ultimate Penetration Testing with Nmap_cover
Ultimate Penetration Testing with Nmap
Travis DeForge
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Microsoft 365 Security and Compliance for Administrators_cover
Microsoft 365 Security and Compliance for Administrators
Sasha Kranjac, Omar Kudović
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Cyber Safety for Everyone - 3rd Edition_cover
Cyber Safety for Everyone - 3rd Edition
JaagoTeens
2024
Security for Cloud Native Applications_cover
Security for Cloud Native Applications
Eyal Estrin
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Europrivacy™/®_cover
Europrivacy™/®
Alice Turley
2024
From Exposed to Secure_cover
From Exposed to Secure
Featuring Cybersecurity And Compliance Experts From Around The World Featuring Cybersecurity And Compliance Experts From Around The World
2024
Artificial Intelligence for Cyber Defense and Smart Policing_cover
Artificial Intelligence for Cyber Defense and Smart Policing
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
2024
Security-Driven Software Development_cover
Security-Driven Software Development
Aspen Olmsted
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Stepping Through Cybersecurity Risk Management_cover
Stepping Through Cybersecurity Risk Management
Jennifer L. Bayuk
2024
Why CISOs Fail_cover
Why CISOs Fail
Barak Engel
2024
The Cybersecurity Guide to Governance, Risk, and Compliance_cover
The Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver
2024
Mastering Secure Java Applications_cover
Mastering Secure Java Applications
Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar
2024
Infrastructure Attack Strategies for Ethical Hacking_cover
Infrastructure Attack Strategies for Ethical Hacking
Himanshu Sharma, Harpreet Singh
2024
Personal Identification_cover
Personal Identification
David J. Haas
2024
Killer Tech and the Drive to Save Humanity_cover
Killer Tech and the Drive to Save Humanity
Mark Stross
2024
Mastering Network Forensics_cover
Mastering Network Forensics
Nipun Jaswal
2024
PCI DSS Version 4.0_cover
PCI DSS Version 4.0
Stephen Hancock
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Digital Dreams Have Become Nightmares_cover
Digital Dreams Have Become Nightmares
Ronald M. Baecker
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cloud Forensics Demystified_cover
Cloud Forensics Demystified
Ganesh Ramakrishnan, Mansoor Haqanee
2024
Digitale Selbstverteidigung für Dummies_cover
Digitale Selbstverteidigung für Dummies
Christina Czeschik
2024
ISC2 Certified Cloud Security Professional Exam Guide_cover
ISC2 Certified Cloud Security Professional Exam Guide
Kim van Lavieren
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Blockchain and Machine Learning for IoT Security_cover
Blockchain and Machine Learning for IoT Security
Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, Said Benkirane
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Nichts gegen eine Million – die wahre Geschichte eines Online-Betrugs_cover
Nichts gegen eine Million – die wahre Geschichte eines Online-Betrugs
Ruth Van de Gaer Sturzenegger
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Meine digitale Sicherheit für Dummies_cover
Meine digitale Sicherheit für Dummies
Matteo Grosse-Kampmann, Chris Wojzechowski
2024
Añadido recientemente
The Code of Honor_cover
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
Blockchain-based Cyber Security_cover
Blockchain-based Cyber Security
2024
From Exposed to Secure_cover
From Exposed to Secure
Featuring Cybersecurity And Compliance Experts From Around The World Featuring Cybersecurity And Compliance Experts From Around The World
2024
Ultimate Penetration Testing with Nmap_cover
Ultimate Penetration Testing with Nmap
Travis DeForge
2024
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Microsoft 365 Security and Compliance for Administrators_cover
Microsoft 365 Security and Compliance for Administrators
Sasha Kranjac, Omar Kudović
2024
Riding the Wave_cover
Riding the Wave
Andrew Boyarsky
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Criminal Investigation for the Professional Investigator_cover
Criminal Investigation for the Professional Investigator
BCPI, CLI, Warren J. Sonne
2006
Cybersecurity for Industrial Control Systems_cover
Cybersecurity for Industrial Control Systems
Tyson Macaulay, Bryan L. Singer
2016
The Practical Guide to HIPAA Privacy and Security Compliance_cover
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Business Continuity Planning_cover
Business Continuity Planning
Ralph L. Kliem, Gregg D. Richie
2015
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Police Corruption_cover
Police Corruption
Tim Prenzler
2009
Handbook of Applied Cryptography_cover
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Virtuous Policing_cover
Virtuous Policing
David G. Bolgiano, L. Morgan Banks, III, James M. Patterson
2017
Tradecraft Primer_cover
Tradecraft Primer
Paul Charles Topalian
2017
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Counterterrorism_cover
Counterterrorism
Benoît Gomis
2015
Homeland Security and Private Sector Business_cover
Homeland Security and Private Sector Business
Chi-Jen Lee, Cheng-Hsiung Lu, Lucia H. Lee
2014
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Europrivacy™/®_cover
Europrivacy™/®
Alice Turley
2024
Security-Driven Software Development_cover
Security-Driven Software Development
Aspen Olmsted
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Artificial Intelligence for Cyber Defense and Smart Policing_cover
Artificial Intelligence for Cyber Defense and Smart Policing
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Stepping Through Cybersecurity Risk Management_cover
Stepping Through Cybersecurity Risk Management
Jennifer L. Bayuk
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
Network Security Bible_cover
Network Security Bible
Eric Cole
2009
Cryptography Engineering_cover
Cryptography Engineering
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
2012
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
Homeland Security and Critical Infrastructure Protection_cover
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Introduction to Cybercrime_cover
Introduction to Cybercrime
Joshua B. Hill, Nancy E. Marion
2016