Skip to main content
Durchsuchen
Hochschulen
Lernende
Anmelden
Registrieren
SPRACHE DER WEBSEITE
Deutsch - DE
selected language
English - EN
Español - ES
Français - FR
Italiano - IT
Deine Auswahl
hat keine Auswirkung auf die Bücher.
Die Auswahl der Website-Sprache wirkt sich nur auf die Menüs und die Navigation aus.
globe icon
close
SPRACHE DER WEBSEITE
Deutsch - DE
selected language
English - EN
Español - ES
Français - FR
Italiano - IT
Deine Auswahl
hat keine Auswirkung auf die Bücher.
Die Auswahl der Website-Sprache wirkt sich nur auf die Menüs und die Navigation aus.
globe icon
Deutsch
close
Nach Themenbereichen durchsuchen
Architektur
Kunst
Biowissenschaften
Betriebswirtschaft
Informatik
Design
Volkswirtschaftslehre
Bildung
Geschichte
Sprachen & Linguistik
Jura
Literatur
Mathematik
Medien & darstellende Kunst
Medizin
Persönliche Entwicklung
Philosophie
Naturwissenschaften
Politik & Internationale Beziehungen
Psychology
Sozialwissenschaften
Studienhilfen
Technik & Ingenieurwissenschaften
Theologie & Religion
Oder suche nach
Unterthemen
Verlage
Index
Lehrbücher durchsuchen
Knowledge Base
Studienführer
Essay Writing Guides
Startseite
Durchsuchen
Informatik
Cybersicherheit
Informatik
Cybersicherheit
Erkunden
Bücher
Zugehörige Themen
Alle Sprachen
close
Am beliebtesten
close
61 - 120 von 1,000+ Büchern werden angezeigt
Digital Forensics and Incident Response
Gerard Johansen
2017
Critical Infrastructure Protection, Risk Management, and Resilience
Kelley A. Pesch-Cronin, Nancy E. Marion
2016
Dark Territory
Fred Kaplan
2016
Threat Modeling
Adam Shostack
2014
Investigating Internet Crimes
Todd G. Shipley, Art Bowker
2013
The Basics of Digital Forensics
John Sammons
2012
Kali Linux 2018: Assuring Security by Penetration Testing
Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali
2018
Combating Human Trafficking
Michael J. Palmiotto
2014
Building an Information Security Awareness Program
Bill Gardner, Valerie Thomas
2014
Police Corruption
Tim Prenzler
2009
Operating System Security
Trent Jaeger
2022
Cybercrime Investigations
John Bandler, Antonia Merzon
2020
Hands-On Machine Learning for Cybersecurity
Soma Halder, Sinan Ozdemir
2018
The Art of Intrusion
Kevin D. Mitnick, William L. Simon
2009
Secure, Resilient, and Agile Software Development
Mark Merkow
2019
Hands-On Artificial Intelligence for Cybersecurity
Alessandro Parisi
2019
Official2® Guide to the CAP® CBK®
Patrick D. Howard
2016
Digital Forensics for Legal Professionals
Larry Daniel, Lars Daniel
2011
Practical Network Automation
Abhishek Ratan
2018
Investigations and the Art of the Interview
Inge Sebyan Black, Lawrence J. Fennelly
2020
Cisco Certified CyberOps Associate 200-201 Certification Guide
Glen D. Singh
2021
Cybersecurity: The Beginner's Guide
Dr. Erdal Ozkaya
2019
Digital Forensics and Incident Response
Gerard Johansen
2022
The Ultimate Kali Linux Book
Glen D. Singh
2022
Official2® Guide to the CISSP®-ISSMP® CBK®
Joseph Steinberg
2015
Symmetric Cryptography, Volume 1
2023
Intelligent Security Systems
Leon Reznik
2021
IT Governance
Alan Calder, Steve Watkins
2019
Security Intelligence
Qing Li, Gregory Clark
2015
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
2023
Artificial Intelligence and the Law
Dennis J. Baker, Paul H. Robinson
2020
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Cyber Risk Management
Christopher J Hodson
2024
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
Deep Dive
Rae L. Baker
2023
Microsoft Defender for Endpoint in Depth
Paul Huijbregts, Joe Anich, Justen Graves
2023
Our Data, Ourselves
Jacqueline D. Lipton
2022
Cybersecurity Career Guide
Alyssa Miller
2022
Data Privacy
Nishant Bhajaria
2022
Python Network Programming Techniques
Marcel Neidinger
2021
Cybersecurity Career Master Plan
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
2021
Operational Auditing
Hernan Murdock
2021
Information Security in Healthcare
Terrell W. Herzig
2020
CISA – Certified Information Systems Auditor Study Guide
Hemang Doshi
2020
GDPR and Cyber Security for Business Information Systems
Antoni Gobeo, Connor Fowler, William J. Buchanan
2018
Security Operations Center Guidebook
Gregory Jarpey, Scott McCoy
2017
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
Kevin Cardwell
2016
Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
2023
Learn Computer Forensics
William Oettinger
2022
Microsoft Information Protection Administrator SC-400 Certification Guide
Shabaz Darr, Viktor Hedberg
2022
Zscaler Cloud Security Essentials
Ravi Devarasetty
2021
Securing Blockchain Networks like Ethereum and Hyperledger Fabric
Alessandro Parisi
2020
Learn Azure Sentinel
Richard Diver, Gary Bushey
2020
Managing Cybersecurity Risk
Jonathan Reuvid
2018
Protocols for Secure Electronic Commerce
Mostafa Hashem Sherif
2017
Learning iOS Penetration Testing
Swaroop Yermalkar
2016
Wiley Pathways Network Security Fundamentals Project Manual
Eric Cole, Ronald L. Krutz, James Conley, Brian Reisman, Mitch Ruebush, Dieter Gollman, Rachelle Reese
2015
ISO/IEC 27001:2022
Steve Watkins
2022
The Cybersecurity Body of Knowledge
Daniel Shoemaker, Anne Kohnke, Ken Sigler
2020
1
2
3
4
5