Most popular on Perlego
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
Private Security_cover
Private Security
Charles P. Nemeth
2017
Understanding the Digital World_cover
Understanding the Digital World
Brian W. Kernighan
2021
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
The Attention Merchants_cover
The Attention Merchants
Tim Wu
2017
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
Learn Computer Forensics_cover
Learn Computer Forensics
William Oettinger
2020
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Practical Mobile Forensics_cover
Practical Mobile Forensics
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
2020
The Digital Silk Road_cover
The Digital Silk Road
Jonathan E. Hillman
2021
Acquiring Card Payments_cover
Acquiring Card Payments
Ilya Dubinsky
2019
CPTED and Traditional Security Countermeasures_cover
CPTED and Traditional Security Countermeasures
Lawrence Fennelly, Marianna Perry
2018
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Crime Prevention_cover
Crime Prevention
Stephen Schneider
2014
Research Methods for Cyber Security_cover
Research Methods for Cyber Security
Thomas W. Edgar, David O. Manz
2017
The Official (ISC)2 CISSP CBK Reference_cover
The Official (ISC)2 CISSP CBK Reference
Arthur J. Deane, Aaron Kraus
2021
Information Security Governance_cover
Information Security Governance
Andrej Volchkov
2018
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Cybersecurity Law_cover
Cybersecurity Law
Davide Mula, Alfonso Contaldo
2020
Cyber Security_cover
Cyber Security
Jeremy Swinfen Green
2016
Cybersecurity Program Development for Business_cover
Cybersecurity Program Development for Business
Chris Moschovitis
2018
Data Analytics for Internal Auditors_cover
Data Analytics for Internal Auditors
Richard E. Cascarino
2017
Information Security Governance_cover
Information Security Governance
Krag Brotby
2009
Secret History_cover
Secret History
Craig Bauer
2021
Police Use of Force_cover
Police Use of Force
Michael J. Palmiotto
2016
Digital Forensics for Legal Professionals_cover
Digital Forensics for Legal Professionals
Larry Daniel, Lars Daniel
2011
Digital Forensics with Open Source Tools_cover
Digital Forensics with Open Source Tools
Harlan Carvey, Cory Altheide
2011
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
Cybersecurity Leadership Demystified_cover
Cybersecurity Leadership Demystified
Dr. Erdal Ozkaya
2022
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Critical Infrastructure_cover
Critical Infrastructure
Tyson Macaulay
2008
Cyber Threat Intelligence_cover
Cyber Threat Intelligence
Martin Lee
2023
Mastering Windows Security and Hardening_cover
Mastering Windows Security and Hardening
Mark Dunkerley, Matt Tumbarello
2022
Mastering Defensive Security_cover
Mastering Defensive Security
Cesar Bravo, Darren Kitchen
2022
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Cynthia Brumfield, Brian Haugli
2021
Incident Response in the Age of Cloud_cover
Incident Response in the Age of Cloud
Dr. Erdal Ozkaya
2021
Practical Internet of Things Security_cover
Practical Internet of Things Security
Brian Russell, Drew Van Duren
2018
Official (ISC)2 Guide to the HCISPP CBK_cover
Official (ISC)2 Guide to the HCISPP CBK
Steven Hernandez
2018
Understanding the Digital World_cover
Understanding the Digital World
Brian Kernighan
2017
Soft Target Hardening_cover
Soft Target Hardening
Jennifer Hesterman
2018
Maritime Security_cover
Maritime Security
Ph.D, Daniel J. Benny
2015
Security Engineering_cover
Security Engineering
Ross Anderson
2020
Computer Security_cover
Computer Security
Dieter Gollmann
2011
How to Measure Anything in Cybersecurity Risk_cover
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard, Richard Seiersen
2016
The Practical Guide to HIPAA Privacy and Security Compliance_cover
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
The Art of Memory Forensics_cover
The Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014
Cybersecurity Essentials_cover
Cybersecurity Essentials
Charles J. Brooks, Christopher Grow, Philip A. Craig, Donald Short
2018
Information Security Risk Assessment Toolkit_cover
Information Security Risk Assessment Toolkit
Mark Talabis, Jason Martin
2012
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Data-Driven Security_cover
Data-Driven Security
Jay Jacobs, Bob Rudis
2014
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Recently published
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Practical Threat Detection Engineering_cover
Practical Threat Detection Engineering
Megan Roddie, Jason Deyalsingh, Gary J. Katz
2023
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Deep Dive_cover
Deep Dive
Rae L. Baker
2023
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
Security Orchestration, Automation, and Response for Security Analysts_cover
Security Orchestration, Automation, and Response for Security Analysts
Benjamin Kovacevic, Nicholas DiCola
2023
The DevSecOps Playbook_cover
The DevSecOps Playbook
Sean D. Mack
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
How I Rob Banks_cover
How I Rob Banks
2023
Okta Administration Up and Running_cover
Okta Administration Up and Running
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
2023
Malware Science_cover
Malware Science
Shane Molinari
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
Microsoft Intune Cookbook_cover
Microsoft Intune Cookbook
Andrew Taylor
2024
Cloud Penetration Testing for Red Teamers_cover
Cloud Penetration Testing for Red Teamers
Kim Crawley
2023
The Language of Deception_cover
The Language of Deception
Justin Hutchens
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Enhancing IoT Security_cover
Enhancing IoT Security
Vidushi Sharma, Gamini Joshi
2023
The Art of Social Engineering_cover
The Art of Social Engineering
Cesar Bravo, Desilda Toska
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
CompTIA Network+ Certification Guide_cover
CompTIA Network+ Certification Guide
Eithne Hogan
2023
Software Transparency_cover
Software Transparency
Chris Hughes, Tony Turner
2023
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Ethical Hacking Workshop_cover
Ethical Hacking Workshop
Rishalin Pillay, Mohammed Abutheraa
2023
Zero Trust Overview and Playbook Introduction_cover
Zero Trust Overview and Playbook Introduction
Mark Simos, Nikhil Kumar
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Confident Cyber Security_cover
Confident Cyber Security
Jessica Barker
2023
Implementing Multifactor Authentication_cover
Implementing Multifactor Authentication
Marco Fanti
2023
The Active Defender_cover
The Active Defender
Catherine J. Ullman
2023
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
J. Morris Chang, Di Zhuang, G. Dumindu Samaraweera
2023
Kali Linux Hacking-Tools für Dummies_cover
Kali Linux Hacking-Tools für Dummies
Felix Alexa, Konstantin Goretzki, Tobias Scheible
2023
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Why CISOs Fail_cover
Why CISOs Fail
Barak Engel
2024
Digitale Selbstverteidigung für Dummies_cover
Digitale Selbstverteidigung für Dummies
Christina Czeschik
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Fighting Phishing_cover
Fighting Phishing
Roger A. Grimes
2024
Becoming a Computational Thinker_cover
Becoming a Computational Thinker
Paul S Wang
2024
Ransomware_cover
Ransomware
Ravindra Das
2023
CompTIA Security+ Practice Tests_cover
CompTIA Security+ Practice Tests
David Seidl
2023
Cybersecurity Management in Education Technologies_cover
Cybersecurity Management in Education Technologies
Ahmed A. Abd El-Latif, Yassine Maleh, Mohammed A. El-Affendi, Sadique Ahmad
2023
Artificial Intelligence & Blockchain in Cyber Physical Systems_cover
Artificial Intelligence & Blockchain in Cyber Physical Systems
Muhammad Arif, Valentina Emilia Balas, Tabrez Nafis, Nawab Muhammad Faseeh Qureshi, Samar Wazir, Ibrar Hussain
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Hybrid Threats, Cyberterrorism and Cyberwarfare_cover
Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
2023
The Change Agent_cover
The Change Agent
Hernan Murdock
2023
Windows Forensics Analyst Field Guide_cover
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Recently added
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Microsoft Intune Cookbook_cover
Microsoft Intune Cookbook
Andrew Taylor
2024
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
Agile Audit Transformation and Beyond_cover
Agile Audit Transformation and Beyond
Toby DeRoche
2022
Okta Administration Up and Running_cover
Okta Administration Up and Running
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Malware Science_cover
Malware Science
Shane Molinari
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Cloud Penetration Testing for Red Teamers_cover
Cloud Penetration Testing for Red Teamers
Kim Crawley
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
The Language of Deception_cover
The Language of Deception
Justin Hutchens
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Enhancing IoT Security_cover
Enhancing IoT Security
Vidushi Sharma, Gamini Joshi
2023
Ethical Hacking Workshop_cover
Ethical Hacking Workshop
Rishalin Pillay, Mohammed Abutheraa
2023
The Art of Social Engineering_cover
The Art of Social Engineering
Cesar Bravo, Desilda Toska
2023
Zero Trust Overview and Playbook Introduction_cover
Zero Trust Overview and Playbook Introduction
Mark Simos, Nikhil Kumar
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
The DevSecOps Playbook_cover
The DevSecOps Playbook
Sean D. Mack
2023
Windows Forensic Analysis DVD Toolkit_cover
Windows Forensic Analysis DVD Toolkit
Harlan Carvey
2009
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
The Ultimate Kali Linux Book_cover
The Ultimate Kali Linux Book
Glen D. Singh
2022
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
CompTIA Network+ Certification Guide_cover
CompTIA Network+ Certification Guide
Eithne Hogan
2023
Confident Cyber Security_cover
Confident Cyber Security
Jessica Barker
2023
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Practical Threat Detection Engineering_cover
Practical Threat Detection Engineering
Megan Roddie, Jason Deyalsingh, Gary J. Katz
2023
Security Orchestration, Automation, and Response for Security Analysts_cover
Security Orchestration, Automation, and Response for Security Analysts
Benjamin Kovacevic, Nicholas DiCola
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
Implementing Multifactor Authentication_cover
Implementing Multifactor Authentication
Marco Fanti
2023
9/11 and the Future of Transportation Security_cover
9/11 and the Future of Transportation Security
R. William Johnstone
2006
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
How to Measure Anything in Cybersecurity Risk_cover
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard, Richard Seiersen
2016
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2017
Network Security Bible_cover
Network Security Bible
Eric Cole
2009
Cryptography Engineering_cover
Cryptography Engineering
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
2012
Security Engineering_cover
Security Engineering
Ross J. Anderson
2010
Ethically hacking an industrial control system_cover
Ethically hacking an industrial control system
Sharon Ferrone
2022
Providing Sound Foundations for Cryptography_cover
Providing Sound Foundations for Cryptography
Oded Goldreich
2019
The Active Defender_cover
The Active Defender
Catherine J. Ullman
2023
Homeland Security and Critical Infrastructure Protection_cover
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
Library Patrons' Privacy_cover
Library Patrons' Privacy
Sandra J. Valenti, Brady D. Lund, Matthew A. Beckstrom
2022
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Introduction to Cybercrime_cover
Introduction to Cybercrime
Joshua B. Hill, Nancy E. Marion
2016
How I Rob Banks_cover
How I Rob Banks
2023
Software Transparency_cover
Software Transparency
Chris Hughes, Tony Turner
2023
Penetration Testing for Jobseekers_cover
Penetration Testing for Jobseekers
Debasish Mandal
2022