Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Computer Science
Cryptography
Computer Science
Cryptography
Explore
Books
Related topics
English
close
Recently published
close
Showing 1 - 59 out of 59 books
Cyber Security Foundations
Keith Martin, Konstantinos Mersinas, Guido Schmitz, Jassim Happa
2025
Sign up to read
Cyber Security Foundations
Keith Martin, Konstantinos Mersinas, Guido Schmitz, Jassim Happa
2025
Cybersecurity for 2025
Azhar ul Haque Sario
2025
Sign up to read
Cybersecurity for 2025
Azhar ul Haque Sario
2025
Spies, Lies, and Cybercrime
Eric O'Neill
2025
Sign up to read
Spies, Lies, and Cybercrime
Eric O'Neill
2025
Turkish Counterterrorism Strategy against the PKK
2025
Sign up to read
Turkish Counterterrorism Strategy against the PKK
2025
Cloud Computing Security
Neha Agrawal, Rohit Kumar, Shashikala Tapaswi
2025
Sign up to read
Cloud Computing Security
Neha Agrawal, Rohit Kumar, Shashikala Tapaswi
2025
Elliptic Curve Cryptography for Developers
Michael Rosing
2025
Sign up to read
Elliptic Curve Cryptography for Developers
Michael Rosing
2025
Hands-on Penetration Testing for Web Applications - 2nd Edition
Richa Gupta
2025
Sign up to read
Hands-on Penetration Testing for Web Applications - 2nd Edition
Richa Gupta
2025
Mastering Cybersecurity
Akashdeep Bhardwaj
2025
Sign up to read
Mastering Cybersecurity
Akashdeep Bhardwaj
2025
Edge Intelligence and Analytics for Internet of Things
2025
Sign up to read
Edge Intelligence and Analytics for Internet of Things
2025
Traditional vs Generative AI Pentesting
Yassine Maleh
2025
Sign up to read
Traditional vs Generative AI Pentesting
Yassine Maleh
2025
Becoming Quantum Safe
Jai Singh Arun, Ray Harishankar, Walid Rjaibi
2025
Sign up to read
Becoming Quantum Safe
Jai Singh Arun, Ray Harishankar, Walid Rjaibi
2025
Quantum Unmanned Aerial Vehicle
2025
Sign up to read
Quantum Unmanned Aerial Vehicle
2025
Analysis of Threat Perceptions
Mehmet Emin Erendor
2025
Sign up to read
Analysis of Threat Perceptions
Mehmet Emin Erendor
2025
The CISO 3.0
Walt Powell
2025
Sign up to read
The CISO 3.0
Walt Powell
2025
Digital Twin Technology for Better Health
2025
Sign up to read
Digital Twin Technology for Better Health
2025
Systematic Security
Timur Qader
2025
Sign up to read
Systematic Security
Timur Qader
2025
Cyber Risk Management in Practice
Carlos Morales
2025
Sign up to read
Cyber Risk Management in Practice
Carlos Morales
2025
Dynamical Systems
2025
Sign up to read
Dynamical Systems
2025
Indistinguishability Obfuscation from Well-Studied Assumptions
Aayush Jain
2025
Sign up to read
Indistinguishability Obfuscation from Well-Studied Assumptions
Aayush Jain
2025
Completely Regular Codes in Distance Regular Graphs
2025
Sign up to read
Completely Regular Codes in Distance Regular Graphs
2025
Forensic Investigation of Smart Digital Devices
Farkhund Iqbal
2026
Sign up to read
Forensic Investigation of Smart Digital Devices
Farkhund Iqbal
2026
Adversarial Machine Learning
Jason Edwards
2026
Sign up to read
Adversarial Machine Learning
Jason Edwards
2026
Transforming Cybersecurity with Machine Learning
Kutub Thakur, Al-Sakib Khan Pathan
2025
Sign up to read
Transforming Cybersecurity with Machine Learning
Kutub Thakur, Al-Sakib Khan Pathan
2025
Zero Trust Security Engineering
Mahesh Patil
2025
Sign up to read
Zero Trust Security Engineering
Mahesh Patil
2025
Security Engineering
Harvinder Singh Gill
2025
Sign up to read
Security Engineering
Harvinder Singh Gill
2025
Mathematics for the Digital Systems Engineer
Chris J. Mitchell
2025
Sign up to read
Mathematics for the Digital Systems Engineer
Chris J. Mitchell
2025
Cybercrime and Digital Security
Mayank Bhushan, Dr. Aatif Jamshed
2025
Sign up to read
Cybercrime and Digital Security
Mayank Bhushan, Dr. Aatif Jamshed
2025
Identity Security for Software Development
Aiyan Ma
2025
Sign up to read
Identity Security for Software Development
Aiyan Ma
2025
Generative AI for Cybersecurity and Privacy
2025
Sign up to read
Generative AI for Cybersecurity and Privacy
2025
Digital Forensics in Next-Generation Internet of Medical Things
2025
Sign up to read
Digital Forensics in Next-Generation Internet of Medical Things
2025
Internet of Things Security
2025
Sign up to read
Internet of Things Security
2025
Safeguarding Satellite Communications
Jianping An, Shuai Wang, Pingyue Yue, Gaofeng Pan
2025
Sign up to read
Safeguarding Satellite Communications
Jianping An, Shuai Wang, Pingyue Yue, Gaofeng Pan
2025
Cyber Security, Forensics and National Security
2025
Sign up to read
Cyber Security, Forensics and National Security
2025
Certified Penetration Testing Professional Exam Guide
Rahul Deshmukh
2025
Sign up to read
Certified Penetration Testing Professional Exam Guide
Rahul Deshmukh
2025
Behavioral Insights in Cybersecurity
Dustin S. Sachs
2025
Sign up to read
Behavioral Insights in Cybersecurity
Dustin S. Sachs
2025
Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare
2025
Sign up to read
Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare
2025
Ultimate Microsoft XDR for Full Spectrum Cyber Defence
Ian David Hanley
2025
Sign up to read
Ultimate Microsoft XDR for Full Spectrum Cyber Defence
Ian David Hanley
2025
Guardians of the Digital Age
Elçin Biren
2025
Sign up to read
Guardians of the Digital Age
Elçin Biren
2025
Ultimate Event-Driven Architecture with Python and Apache Kafka
Gopal Sharma
2025
Sign up to read
Ultimate Event-Driven Architecture with Python and Apache Kafka
Gopal Sharma
2025
Cybersecurity in Knowledge Management
2025
Sign up to read
Cybersecurity in Knowledge Management
2025
Securing Talent
Kevin Lynn McLaughlin
2025
Sign up to read
Securing Talent
Kevin Lynn McLaughlin
2025
Next Generation Data Science and Blockchain Technology for Industry 5.0
2025
Sign up to read
Next Generation Data Science and Blockchain Technology for Industry 5.0
2025
Multimedia Security
2025
Sign up to read
Multimedia Security
2025
Security Technologies for Law Enforcement Agencies
Kazım Duraklar
2025
Sign up to read
Security Technologies for Law Enforcement Agencies
Kazım Duraklar
2025
Biometric Technology and Authentication
Ravi Das
2025
Sign up to read
Biometric Technology and Authentication
Ravi Das
2025
Hacking Cryptography
Kamran Khan, Bill Cox
2025
Sign up to read
Hacking Cryptography
Kamran Khan, Bill Cox
2025
Advanced Machine Learning for Cyber-Attack Detection in IoT Networks
2025
Sign up to read
Advanced Machine Learning for Cyber-Attack Detection in IoT Networks
2025
Security Issues in Communication Devices, Networks and Computing Models
2025
Sign up to read
Security Issues in Communication Devices, Networks and Computing Models
2025
Security Issues in Communication Devices, Networks and Computing Models
2025
Sign up to read
Security Issues in Communication Devices, Networks and Computing Models
2025
Quantum Communication and Quantum Internet Applications
Daniel Minoli, Benedict Occhiogrosso
2025
Sign up to read
Quantum Communication and Quantum Internet Applications
Daniel Minoli, Benedict Occhiogrosso
2025
Artificial Intelligence for Cyber Security and Industry 4.0
2025
Sign up to read
Artificial Intelligence for Cyber Security and Industry 4.0
2025
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2025
Sign up to read
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2025
Taming the Hacking Storm
Roger A. Grimes
2025
Sign up to read
Taming the Hacking Storm
Roger A. Grimes
2025
CyberMedics
2025
Sign up to read
CyberMedics
2025
Cyber Defense
Jason Edwards
2025
Sign up to read
Cyber Defense
Jason Edwards
2025
From Street-smart to Web-wise®
Al Marcella, Brian Moore, Madeline Parisi
2025
Sign up to read
From Street-smart to Web-wise®
Al Marcella, Brian Moore, Madeline Parisi
2025
Enterprise Fortress
Alex Stevens
2025
Sign up to read
Enterprise Fortress
Alex Stevens
2025
Navigating the Cyber Maze
Matthias Muhlert
2025
Sign up to read
Navigating the Cyber Maze
Matthias Muhlert
2025
Red Team Evaluation Framework
Matthias Muhlert
2026
Sign up to read
Red Team Evaluation Framework
Matthias Muhlert
2026