Am beliebtesten
Understanding the Digital World_cover
Understanding the Digital World
Brian W. Kernighan
2021
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
The Attention Merchants_cover
The Attention Merchants
Tim Wu
2017
Private Security_cover
Private Security
Charles P. Nemeth
2017
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Learn Computer Forensics_cover
Learn Computer Forensics
William Oettinger
2020
Information Security Governance_cover
Information Security Governance
Krag Brotby
2009
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Crime Prevention_cover
Crime Prevention
Stephen Schneider
2014
Information Security Governance_cover
Information Security Governance
Andrej Volchkov
2018
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Critical Infrastructure_cover
Critical Infrastructure
Robert S. Radvanovsky, Allan McDougall
2018
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Data-Driven Security_cover
Data-Driven Security
Jay Jacobs, Bob Rudis
2014
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2017
Data Analytics for Internal Auditors_cover
Data Analytics for Internal Auditors
Richard E. Cascarino
2017
Cybersecurity Program Development for Business_cover
Cybersecurity Program Development for Business
Chris Moschovitis
2018
Critical Infrastructure Protection, Risk Management, and Resilience_cover
Critical Infrastructure Protection, Risk Management, and Resilience
Kelley A. Pesch-Cronin, Nancy E. Marion
2016
Police Use of Force_cover
Police Use of Force
Michael J. Palmiotto
2016
Cyber Security_cover
Cyber Security
Jeremy Swinfen Green
2016
Secret History_cover
Secret History
Craig Bauer
2021
The Manager's Handbook for Corporate Security_cover
The Manager's Handbook for Corporate Security
Edward Halibozek, Gerald L. Kovacich
2017
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
Cybersecurity Leadership Demystified_cover
Cybersecurity Leadership Demystified
Dr. Erdal Ozkaya
2022
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Acquiring Card Payments_cover
Acquiring Card Payments
Ilya Dubinsky
2019
Soft Target Hardening_cover
Soft Target Hardening
Jennifer Hesterman
2018
Cybersecurity for Business_cover
Cybersecurity for Business
Larry Clinton
2022
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Cynthia Brumfield, Brian Haugli
2021
Practical Internet of Things Security_cover
Practical Internet of Things Security
Brian Russell, Drew Van Duren
2018
Understanding the Digital World_cover
Understanding the Digital World
Brian Kernighan
2017
Mastering Defensive Security_cover
Mastering Defensive Security
Cesar Bravo, Darren Kitchen
2022
Critical Infrastructure_cover
Critical Infrastructure
Tyson Macaulay
2008
The Digital Silk Road_cover
The Digital Silk Road
Jonathan E. Hillman
2021
Incident Response in the Age of Cloud_cover
Incident Response in the Age of Cloud
Dr. Erdal Ozkaya
2021
Computer Security_cover
Computer Security
Dieter Gollmann
2011
Cybersecurity Essentials_cover
Cybersecurity Essentials
Charles J. Brooks, Christopher Grow, Philip A. Craig, Donald Short
2018
The Art of Memory Forensics_cover
The Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014
The Official2 CISSP CBK Reference_cover
The Official2 CISSP CBK Reference
Arthur J. Deane, Aaron Kraus
2021
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Gangs and Organized Crime_cover
Gangs and Organized Crime
George W. Knox, Gregg Etter, Carter F. Smith
2018
Information Security_cover
Information Security
Mark Stamp
2021
Implementing Information Security in Healthcare_cover
Implementing Information Security in Healthcare
Terrell Herzig, Tom Walsh
2020
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2020
Learn Kali Linux 2019_cover
Learn Kali Linux 2019
Glen D. Singh
2019
Kali Linux - An Ethical Hacker's Cookbook_cover
Kali Linux - An Ethical Hacker's Cookbook
Himanshu Sharma
2019
Hands-On Machine Learning for Cybersecurity_cover
Hands-On Machine Learning for Cybersecurity
Soma Halder, Sinan Ozdemir
2018
Blockchain and the Law_cover
Blockchain and the Law
Primavera De Filippi, Aaron Wright
2018
Research Methods for Cyber Security_cover
Research Methods for Cyber Security
Thomas W. Edgar, David O. Manz
2017
Threat Modeling_cover
Threat Modeling
Adam Shostack
2014
Investigating Internet Crimes_cover
Investigating Internet Crimes
Todd G. Shipley, Art Bowker
2013
The Basics of Digital Forensics_cover
The Basics of Digital Forensics
John Sammons
2012
The Art of Intrusion_cover
The Art of Intrusion
Kevin D. Mitnick, William L. Simon
2009
Kürzlich veröffentlicht
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
Hybrid Threats, Cyberterrorism and Cyberwarfare_cover
Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
2023
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2024
The DevSecOps Playbook_cover
The DevSecOps Playbook
Sean D. Mack
2023
Okta Administration Up and Running_cover
Okta Administration Up and Running
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
A CISO Guide to Cyber Resilience_cover
A CISO Guide to Cyber Resilience
Debra Baker
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Security for Cloud Native Applications_cover
Security for Cloud Native Applications
Eyal Estrin
2024
Artificial Intelligence for Cyber Defense and Smart Policing_cover
Artificial Intelligence for Cyber Defense and Smart Policing
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
The Language of Deception_cover
The Language of Deception
Justin Hutchens
2023
Windows Forensics Analyst Field Guide_cover
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasiński
2023
Confident Cyber Security_cover
Confident Cyber Security
Jessica Barker
2023
Spring Security_cover
Spring Security
Badr Nasslahsen
2024
CISSP For Dummies_cover
CISSP For Dummies
Lawrence C. Miller, Peter H. Gregory
2024
Cybersecurity_cover
Cybersecurity
Kevin Lore
2024
Cybersecurity Strategies and Best Practices_cover
Cybersecurity Strategies and Best Practices
Milad Aslaner
2024
Hands-On Ethical Hacking Tactics_cover
Hands-On Ethical Hacking Tactics
Shane Hartman
2024
Combatting Cyber Terrorism_cover
Combatting Cyber Terrorism
Richard Bingley
2024
Unveiling the NIST Risk Management Framework_cover
Unveiling the NIST Risk Management Framework
Thomas Marsland
2024
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Ultimate Penetration Testing with Nmap_cover
Ultimate Penetration Testing with Nmap
Travis DeForge
2024
Cyber Safety for Everyone - 3rd Edition_cover
Cyber Safety for Everyone - 3rd Edition
JaagoTeens
2024
From Exposed to Secure_cover
From Exposed to Secure
Featuring Cybersecurity And Compliance Experts From Around The World Featuring Cybersecurity And Compliance Experts From Around The World
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Why CISOs Fail_cover
Why CISOs Fail
Barak Engel
2024
The Cybersecurity Guide to Governance, Risk, and Compliance_cover
The Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver
2024
Mastering Secure Java Applications_cover
Mastering Secure Java Applications
Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar
2024
Personal Identification_cover
Personal Identification
David J. Haas
2024
PCI DSS Version 4.0_cover
PCI DSS Version 4.0
Stephen Hancock
2024
Digitale Selbstverteidigung für Dummies_cover
Digitale Selbstverteidigung für Dummies
Christina Czeschik
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Deterrence in the 21st Century_cover
Deterrence in the 21st Century
Eric Ouellet, Madeleine D'Agata, Keith Stewart
2024
Global Digital Data Governance_cover
Global Digital Data Governance
Carolina Aguerre, Malcolm Campbell-Verduyn, Jan Aart Scholte
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Il Dark Web_cover
Il Dark Web
Bolakale Aremu
2023
Malware Science_cover
Malware Science
Shane Molinari
2023
Vor kurzem hinzugefügt
Introduction to Security_cover
Introduction to Security
Robert Fischer, Edward Halibozek
2008
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2024
CompTIA Security+_cover
CompTIA Security+
Mike Chapple, David Seidl
A CISO Guide to Cyber Resilience_cover
A CISO Guide to Cyber Resilience
Debra Baker
2024
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Criminal Investigation for the Professional Investigator_cover
Criminal Investigation for the Professional Investigator
BCPI, CLI, Warren J. Sonne
2006
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Police Corruption_cover
Police Corruption
Tim Prenzler
2009
The Practical Guide to HIPAA Privacy and Security Compliance_cover
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Business Continuity Planning_cover
Business Continuity Planning
Ralph L. Kliem, Gregg D. Richie
2015
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Handbook of Applied Cryptography_cover
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Tradecraft Primer_cover
Tradecraft Primer
Paul Charles Topalian
2017
Counterterrorism_cover
Counterterrorism
Benoît Gomis
2015
Virtuous Policing_cover
Virtuous Policing
David G. Bolgiano, L. Morgan Banks, III, James M. Patterson
2017
Homeland Security and Private Sector Business_cover
Homeland Security and Private Sector Business
Chi-Jen Lee, Cheng-Hsiung Lu, Lucia H. Lee
2014
Artificial Intelligence for Cyber Defense and Smart Policing_cover
Artificial Intelligence for Cyber Defense and Smart Policing
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasiński
2023
Okta Administration Up and Running_cover
Okta Administration Up and Running
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
The Security Risk Assessment Handbook_cover
The Security Risk Assessment Handbook
Douglas Landoll
2021
The Language of Deception_cover
The Language of Deception
Justin Hutchens
2023
Hybrid Threats, Cyberterrorism and Cyberwarfare_cover
Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Windows Forensics Analyst Field Guide_cover
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
The DevSecOps Playbook_cover
The DevSecOps Playbook
Sean D. Mack
2023
Windows Forensic Analysis DVD Toolkit_cover
Windows Forensic Analysis DVD Toolkit
Harlan Carvey
2009
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
The Ultimate Kali Linux Book_cover
The Ultimate Kali Linux Book
Glen D. Singh
2022
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
OPNsense Beginner to Professional_cover
OPNsense Beginner to Professional
Julio Cesar Bueno de Camargo
2022
Confident Cyber Security_cover
Confident Cyber Security
Jessica Barker
2023
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Practical Threat Detection Engineering_cover
Practical Threat Detection Engineering
Megan Roddie, Jason Deyalsingh, Gary J. Katz
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg
2023
Python for Security and Networking_cover
Python for Security and Networking
José Ortega
2023