Skip to main content
Perlego
Browse
Institutions
Pricing
Login
DeutschEnglishEspañolFrançaisItaliano
DeutschEnglishEspañolFrançaisItaliano

Browse by topic

  • Architecture
  • Art
  • Biological Sciences
  • Business
  • Computer Science
  • Design
  • Economics
  • Education
  • History
  • Languages & Linguistics
  • Law
  • Literature
  • Mathematics
  • Media & Performing Arts
  • Medicine
  • Personal Development
  • Philosophy
  • Physical Sciences
  • Politics & International Relations
  • Psychology
  • Social Sciences
  • Study Aids
  • Technology & Engineering
  • Theology & Religion

Or browse by

  • Subtopics
  • Publishers
  • Index

Browse study resources

  • Knowledge Base
  • Study Guides
  • Essay Writing Guides
  1. Home
  2. Browse
  3. Computer Science
  4. Cyber Security
Computer Science

Cyber Security

  • Explore
  • Books
  • Related topics

Find by topic

1 of 14
  1. Application Development
  2. Artificial Intelligence (AI) & Semantics
  3. Bioinformatics
  4. CAD-CAM
  5. Certification Guides in Computer Science
  6. Client-Server Computing
  7. Cloud Computing
  8. Compilers
  9. Computer Engineering
  10. Computer Graphics
  11. Computer Networking
  12. Computer Science General
  13. Computer Vision & Pattern Recognition
  14. Content Management Systems
  15. Cryptography
  16. Data Mining
  17. Data Modelling & Design
  18. Data Processing
  19. Data Transmission Systems
  20. Data Visualisation
  21. Data Warehousing
  22. Databases
  23. Desktop Applications
  24. Digital Media
  25. Entreprise Applications
  26. Hardware
  27. Home Automation
  28. Human-Computer Interaction
  29. Information Technology
  30. MCSE
  31. Microsoft Programming
  32. Natural Language Processing
  33. Neural Networks
  34. Object Oriented Programming
  35. Open Source Programming
  36. Operating Systems
  37. Optical Data Processing
  38. Parallel Programming
  39. Programming
  40. Programming Algorithms
View all

Trending on Perlego

1 of 15
  1. Embedded Systems Handbook
    Embedded Systems Handbook
    Richard Zurawski
    2018
  2. Artificial Intelligence Solutions for Cyber-Physical Systems
    Artificial Intelligence Solutions for Cyber-Physical Systems
    2024
  3. SIP Handbook
    SIP Handbook
    Syed A. Ahson, Mohammad Ilyas
    2018
  4. Handbook of Applied Cryptography
    Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
    2018
  5. Electromagnetic Compatibility
    David Weston
    2017
  6. Turkish Counterterrorism Strategy against the PKK
    2025
  7. AI, Cybersecurity and Data Science for Drone and Unmanned Aerial Vehicles
    2025
  8. Embedded Artificial Intelligence
    2025
  9. Cybersecurity in Healthcare Applications
    2025
  10. Computer System and Network Security
    Gregory B. White, Eric A. Fisch, Udo W. Pooch
    2017
  11. Quantum Shield for AI Security
    2026
  12. Cognitive Cyber Crimes in the Era of Artificial Intelligence
    2025
  13. Securing the Digital Frontier
    2025
  14. Handbook of Digital Innovation, Transformation, and Sustainable Development in a Post-Pandemic Era
    2024
  15. Emerging Threats and Countermeasures in Cybersecurity
    2024
  16. Digital Skill Development for Industry 4.0
    2024
  17. Machine Learning for Cyber Security
    Preeti Malik, Lata Nautiyal, Mangey Ram
    2022
  18. Cyber Security and Network Security
    2022
  19. RFID Handbook
    Syed A. Ahson, Mohammad Ilyas
    2017
  20. Encyclopedia of Information Systems and Technology - Two Volume Set
    Phillip A. Laplante
    2015
  21. IoT Cybersecurity
    2026
  22. Handbook of Security, Quantum Computing and Internet of Things
    2026
  23. Security Paradigms in 6G Smart Cities and IoT Ecosystems
    2025
  24. Applications of Federated Learning in Technological Advancements
    2025
  25. Advancements in Cybersecurity
    2025
  26. Cyberology
    2025
  27. Cloud Computing for Smart Education and Collaborative Learning
    2025
  28. Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities
    2025
  29. Leveraging Artificial Intelligence Competencies for Next-Generation Cybersecurity Solutions
    2024
  30. Internet of Things Vulnerabilities and Recovery Strategies
    Fahim Masoodi, Alwi Bamhdi, Majid Ahmad Charoo, Zubair Masoodi, Arif Lattoo, Gousiya Hussain
    2024
  31. Democratizing Cryptography
    2022
  32. Information Security Management Handbook
    Harold Tipton
    2019
  33. Quantum Systems, Channels, Information
    Alexander S. Holevo
    2019
  34. Digital Video Transcoding for Transmission and Storage
    Huifang Sun, Tihao Chiang, Xuemin Chen
    2018
  35. Wireless Security and Cryptography
    2017
  36. Computer Science and Technology
    2016
  37. Computer Science, Technology And Application - Proceedings Of The 2016 International Conference
    2016
  38. Security and Policy Driven Computing
    Lei Liu
    2016
  39. Network Security and Communication Engineering
    Kennis Chan
    2015
  40. EU Annex 11 Guide to Computer Validation Compliance for the Worldwide Health Agency GMP
    Orlando Lopez
    2015
  41. Computer Risk Manager
    K.R. Pursall
    2014
  42. Honeypots
    2011
  43. Handbook of Algorithms for Wireless Networking and Mobile Computing
    2005
  44. Advances In Intelligent Systems For Defence
    2002
  45. Effective Use of Teams for IT Audits
    Martin Krist
    1999

Most popular on Perlego

1 of 20
  1. ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
    ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
    Mike Chapple, James Michael Stewart, Darril Gibson
    2024
  2. Cybersecurity Law
    Cybersecurity Law
    Jeff Kosseff
    2022
  3. Introduction to Intelligence Studies
    Introduction to Intelligence Studies
    Carl J. Jensen, III, David H. McElreath, Melissa Graves
    2022
  4. Cybersecurity Risk Management
    Cynthia Brumfield, Brian Haugli
    2021
  5. Practical Core Software Security
    James F. Ransome, Anmol Misra, Mark S. Merkow
    2022
  6. Understanding the Digital World
    Brian W. Kernighan
    2021
  7. Information Security
    Mark Stamp
    2021
  8. Cybersecurity Law, Standards and Regulations, 2nd Edition
    Tari Schreider
    2020
  9. The Attention Merchants
    Tim Wu
    2017
  10. Gangs and Organized Crime
    George W. Knox, Gregg Etter, Carter F. Smith, Gregg W. Etter
    2018
  11. Industrial Network Security
    Eric D. Knapp, Joel Thomas Langill
    2014
  12. CompTIA Linux+ Study Guide
    Richard Blum, Christine Bresnahan
    2022
  13. IAPP CIPP / US Certified Information Privacy Professional Study Guide
    Mike Chapple, Joe Shelley
    2024
  14. CompTIA A+ Complete Study Guide, 2-Volume Set
    Quentin Docter, Jon Buhagiar
    2025
  15. CompTIA A+ Complete Study Guide
    Quentin Docter, Jon Buhagiar
    2022
  16. Private Security
    Charles P. Nemeth
    2017
  17. Private Security
    Charles P. Nemeth
    2022
  18. ISC2 CCSP Certified Cloud Security Professional Official Study Guide
    Mike Chapple, David Seidl
    2022
  19. Cybersecurity For Dummies
    Joseph Steinberg
    2025
  20. Cyber Risk Management
    Christopher J Hodson
    2024
  21. Threat Assessment and Management Strategies
    Frederick S. Calhoun, Stephen W. Weston J.D., Stephen W. Weston, J.D.
    2017
  22. Cold Cases
    James M. Adcock, Sarah L. Stein
    2014
  23. The Art of Deception
    Kevin D. Mitnick, William L. Simon
    2011
  24. Investigative Interviewing
    John E. Grimes III
    2021
  25. Cybersecurity Law
    Jeff Kosseff
    2025
  26. The Official2 CISSP CBK Reference
    Arthur J. Deane, Aaron Kraus
    2021
  27. Secure and Resilient Software
    Mark S. Merkow, Lakshmikanth Raghavan
    2011
  28. Crime and Intelligence Analysis
    Glenn Grana, James Windell
    2021
  29. Cybersecurity for Business
    Larry Clinton
    2022
  30. Big Breaches
    Neil Daswani, Moudy Elbayadi
    2021
  31. The Security Culture Playbook
    Perry Carpenter, Kai Roer
    2022
  32. Understanding the Digital World
    Brian Kernighan
    2017
  33. Information Security Management Principles
    Jeremy Green, David Alexander, Amanda Finch, David Sutton, Andy Taylor
    2024
  34. Practical Handbook for Professional Investigators
    Rory J. McMahon CLI CFE, Randy Dickson
    2013
  35. Building a Data Culture
    Gary W. Griffin, David Holcomb
    2023
  36. AWS Certified Security - Specialty Certification Guide
    Nikhil Agarwal
    2024
  37. Combatting Cyber Terrorism
    Richard Bingley
    2024
  38. Cyber Security
    David Sutton
    2022
  39. The Wires of War
    Jacob Helberg
    2021
  40. Cybercrime Investigators Handbook
    Graeme Edwards
    2019
  41. Security for Software Engineers
    James N. Helfrich
    2018
  42. Embedded Systems Handbook
    Richard Zurawski
    2018
  43. Hacking the Human
    Ian Mann
    2017
  44. Access Control, Security, and Trust
    Shiu-Kai Chin, Susan Beth Older
    2010
  45. Cloud Storage Security
    Aaron Wheeler, Michael Winburn
    2015
  46. Technocreep
    Thomas P. Keenan
    2014
  47. CompTIA CySA+ Study Guide
    Mike Chapple, David Seidl
    2023
  48. ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
    Mike Wills
    2022
  49. ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests
    Mike Chapple, David Seidl
    2024
  50. Likewar
    P. W. Singer, Emerson T. Brooking
    2018
  51. The Code of Honor
    Paul J. Maurer, Ed Skoudis
    2024
  52. The Official2 CCSP CBK Reference
    Aaron Kraus
    2022
  53. Cybercrime Investigations
    John Bandler, Antonia Merzon
    2020
  54. Threat Modeling
    Adam Shostack
    2014
  55. Information Technology Control and Audit, Fifth Edition
    Angel R. Otero
    2018
  56. Applied Network Security Monitoring
    Chris Sanders, Jason Smith
    2013
  57. Hands-On Ethical Hacking Tactics
    Shane Hartman
    2024
  58. Data Analytics for Cybersecurity
    Vandana P. Janeja
    2022
  59. CompTIA Security+ Review Guide
    James Michael Stewart
    2021
  60. Core Software Security
    James Ransome, Anmol Misra
    2018
View all

Recently published

1 of 20
  1. CompTIA A+ Complete Study Guide, 2-Volume Set
    CompTIA A+ Complete Study Guide, 2-Volume Set
    Quentin Docter, Jon Buhagiar
    2025
  2. Cybersecurity Law
    Cybersecurity Law
    Jeff Kosseff
    2025
  3. IAPP AIGP Artificial Intelligence Governance Professional Study Guide
    IAPP AIGP Artificial Intelligence Governance Professional Study Guide
    Peter H. Gregory
    2026
  4. Auditing Artificial Intelligence
    Albert J. Marcella
    2025
  5. Ultimate Monorepo and Bazel for Building Apps at Scale
    Javier Antoniucci
    2025
  6. Cybersecurity for 2025
    Azhar ul Haque Sario
    2025
  7. Grey Area
    Vinny Troia
    2025
  8. Defending the Metaverse
    2025
  9. Mastering Network Flow Traffic Analysis
    Gilberto Persico
    2025
  10. CompTIA A+ Complete Practice Tests
    Audrey O'Shea
    2025
  11. Crime Science
    Lisa Stolzenberg, Stewart J. D'Alessio
    2025
  12. Spies, Lies, and Cybercrime
    Eric O'Neill
    2025
  13. Code War
    Allie Mellen
    2026
  14. Becoming Quantum Safe
    Jai Singh Arun, Ray Harishankar, Walid Rjaibi
    2025
  15. CompTIA A+ Complete Review Guide
    Troy McMillan
    2025
  16. Linux Command Line and Shell Scripting Bible
    Richard Blum, Christine Bresnahan
    2025
  17. Governance, Risk and Compliance
    Michael Brass
    2025
  18. Embedded Software Development for Safety-Critical Systems
    Chris Hobbs
    2025
  19. CompTIA Network+ Certification Guide
    Eithne Hogan
    2025
  20. Instagram & Facebook All-in-One For Dummies
    Eric Butow, Amanda Robinson, Carolyn Abram, Amy Karasavas, Stephanie Diamond, John Haydon, Jenn Herman, Corey Walker
    2026
  21. Unveiling the Art of Steganography
    Urmila Pilania, Manoj Kumar
    2026
  22. Cloud Security Fundamentals
    Jason Edwards
    2026
  23. Fundamentals of Software-Defined Networking
    Ali Sadiqui, Moulay Rachid Filali
    2026
  24. Forensic Investigation of Smart Digital Devices
    Farkhund Iqbal
    2026
  25. CompTIA CySA+ CS0-003 Exam Guide
    Flávio Costa
    2026
  26. Practical Approach to Open Source Intelligence
    Akashdeep Bhardwaj
    2025
  27. AWS Security Handbook
    Avik Mukherjee
    2025
  28. Cybercrime and Digital Security
    Mayank Bhushan, Dr. Aatif Jamshed
    2025
  29. Ultimate Terraform for Cloud Security
    Anish Kumar
    2025
  30. Digital Forensics in Next-Generation Internet of Medical Things
    2025
  31. Turkish Counterterrorism Strategy against the PKK
    2025
  32. CompTIA Security Certification Companion
    Kodi A. Cochran, Kyle Reis
    2025
  33. AI Strategy and Security
    Donnie W. Wendt
    2025
  34. Cloud Computing Security
    Neha Agrawal, Rohit Kumar, Shashikala Tapaswi
    2025
  35. Securing Google Cloud Platform
    Deepam Kanjani
    2025
  36. AI, Cybersecurity and Data Science for Drone and Unmanned Aerial Vehicles
    2025
  37. Microsoft Security Operations Analyst Associate Certification Guide
    Aditya Katira
    2025
  38. The Psychology of Cybersecurity
    Tarnveer Singh, Sarah Y. Zheng
    2025
  39. The CISO 3.0
    Walt Powell
    2025
  40. Onlife Criminology
    Janos Mark Szakolczai
    2025
  41. The Future of Hacking
    Laura S. Scherling
    2025
  42. Ultimate Agentic AI with AutoGen for Enterprise Automation
    Shekhar Agrawal, Srinivasa Chippada, Rathish Mohan
    2025
  43. Cyber Risk Management in Practice
    Carlos Morales
    2025
  44. Unleashing AI
    Milan Frankl
    2025
  45. Introduction to Modern Cryptography
    Jonathan Katz, Yehuda Lindell
    2025
  46. Human Factors and Cybersecurity
    Lee Hadlington, Chloe Ryding
    2025
  47. The AI Governance Playbook
    Azhar ul Haque Sario
    2025
  48. Information Technology
    Richard Fox
    2025
  49. Ethical Hacking: Complete Guide to Osint and Real-world Pentesting Labs
    Dwight Smith
    2026
  50. AI Forensics
    Joseph C. Sremack
    2026
  51. CompTIA SecAI+ Study Guide
    Mike Chapple, Fred Nwanganga
    2026
  52. AI-driven Cyber Risk Management
    2026
  53. Handbook of Human Factors in Cybersecurity Systems
    2026
  54. Hacking Hardware
    Tobias Scheible
    2026
  55. Mastering Secure Software
    Garima Bajpai, Orit Golowinski
    2026
  56. Mathematics in Cybersecurity
    Alfred Basta, Stephan Delong, Stavros Basta
    2026
  57. Cybersecurity Risk Management
    Jayet Moon, Jeet Shah
    2026
  58. The Nancy Catherine Scammer Playbook Exposed
    Rae A. Stonehouse
    2026
  59. Quantum Shield for AI Security
    2026
  60. Healthcare 5.0 with Fuzzy Logic
    2026
View all

Recently added

1 of 20
  1. IAPP AIGP Artificial Intelligence Governance Professional Study Guide
    IAPP AIGP Artificial Intelligence Governance Professional Study Guide
    Peter H. Gregory
    2026
  2. Cybersecurity: The Beginner's Guide
    Cybersecurity: The Beginner's Guide
    Dr. Erdal Ozkaya
    2019
  3. Learning Malware Analysis
    Learning Malware Analysis
    Monnappa K A
    2018
  4. Python Penetration Testing Essentials
    Mohit
    2018
  5. Applied Network Security
    Arthur Salmon, Warun Levesque, Michael McLafferty
    2017
  6. Kali Linux 2 – Assuring Security by Penetration Testing - Third Edition
    Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali
    2016
  7. Cyberterrorism
    2014
  8. Cybersecurity for 2025
    Azhar ul Haque Sario
    2025
  9. Adversarial AI Attacks, Mitigations, and Defense Strategies
    John Sotiropoulos
    2024
  10. Artificial Intelligence for Cybersecurity
    Bojan Kolosnjaji, Huang Xiao, Peng Xu, Apostolis Zarras
    2024
  11. Certified Information Systems Security Professional Exam Guide
    Ted Jordan, Ric Daza, Hinne Hettema
    2024
  12. Learn Computer Forensics
    William Oettinger
    2022
  13. Cybersecurity Strategies and Best Practices
    Milad Aslaner
    2024
  14. Windows Forensics Analyst Field Guide
    Muhiballah Mohammed
    2023
  15. Cybersecurity – Attack and Defense Strategies
    Yuri Diogenes, Erdal Ozkaya
    2019
  16. Hands-On Ethical Hacking Tactics
    Shane Hartman
    2024
  17. Crafting Test-Driven Software with Python
    Alessandro Molina
    2021
  18. Digital Forensics and Incident Response
    Gerard Johansen
    2022
  19. Certified Ethical Hacker v12 312-50 Exam Guide
    Dale Meredith, Christopher Rees
    2022
  20. Practical Threat Detection Engineering
    Megan Roddie, Jason Deyalsingh, Gary J. Katz
    2023
  21. Operationalizing Threat Intelligence
    Kyle Wilhoit, Joseph Opacki
    2022
  22. Cybersecurity – Attack and Defense Strategies
    Yuri Diogenes, Dr. Erdal Ozkaya
    2022
  23. Mastering Linux Security and Hardening
    Donald A. Tevault
    2023
  24. Red Hat Enterprise Linux 9 Administration
    Pablo Iranzo Gómez, Pedro Ibañez Requena, Miguel Pérez Colino, Scott McCarty, Pedro Ibáñez Requena
    2022
  25. Learn Computer Forensics
    William Oettinger
    2020
  26. Learn Wireshark
    Lisa Bock
    2022
  27. Mastering Windows Server 2019
    Jordan Krause
    2021
  28. Digital Forensics and Incident Response
    Gerard Johansen
    2020
  29. Security-Driven Software Development
    Aspen Olmsted
    2024
  30. Cloud Forensics Demystified
    Ganesh Ramakrishnan, Mansoor Haqanee
    2024
  31. Malware Analysis Techniques
    Dylan Barker
    2021
  32. Mastering Malware Analysis
    Alexey Kleymenov, Amr Thabet
    2022
  33. Incident Response with Threat Intelligence
    Roberto Martinez
    2022
  34. Cybersecurity Attacks – Red Team Strategies
    Johann Rehberger
    2020
  35. Machine Learning for Cybersecurity Cookbook
    Emmanuel Tsukerman
    2019
  36. CompTIA® Security+® SY0-701 Certification Guide
    Ian Neil, Ian Neil
    2024
  37. Effective Threat Investigation for SOC Analysts
    Mostafa Yahia
    2023
  38. Python for Security and Networking
    Jose Manuel Ortega
    2023
  39. Digital Forensics with Kali Linux
    Shiva V. N. Parasram
    2023
  40. The Ultimate Kali Linux Book
    Glen D. Singh
    2022
  41. Industrial Cybersecurity
    Pascal Ackerman
    2021
  42. Implementing DevSecOps Practices
    Vandana Verma Sehgal
    2023
  43. Windows Server 2022 Administration Fundamentals
    Bekim Dauti
    2022
  44. ISACA Certified in Risk and Information Systems Control Exam Guide
    Shobhit Mehta
    2023
  45. Mastering Defensive Security
    Cesar Bravo, Darren Kitchen
    2022
  46. Cyber Warfare – Truth, Tactics, and Strategies
    Dr. Chase Cunningham
    2020
  47. Auditing Artificial Intelligence
    Albert J. Marcella
    2025
  48. Ethical Password Cracking
    James Leyte-Vidal
    2024
  49. Grey Area
    Vinny Troia
    2025
  50. Ultimate Monorepo and Bazel for Building Apps at Scale
    Javier Antoniucci
    2025
  51. Cybersecurity Law
    Jeff Kosseff
    2025
  52. Crime Science
    Lisa Stolzenberg, Stewart J. D'Alessio
    2025
  53. CompTIA A+ Complete Practice Tests
    Audrey O'Shea
    2025
  54. Mastering Network Flow Traffic Analysis
    Gilberto Persico
    2025
  55. The Secret Life of Data
    Aram Sinnreich, Jesse Gilbert
    2024
  56. CompTIA A+ Complete Study Guide, 2-Volume Set
    Quentin Docter, Jon Buhagiar
    2025
  57. Security Analysis and Portfolio Management
    Shveta Singh, Surendra S. Yadav
    2021
  58. Defending the Metaverse
    2025
  59. Cloud Computing for Everyone
    Rohit Agarwal, Dilip K. Prasad
    2025
  60. Azure Networking
    Jose Moreno, Adam Stuart
    2025
View all

PERLEGO

PricingFAQsContact UsPerlego for InstructorsPerlego for InstitutionsPerlego for PublishersCareersPress

BROWSE

TopicsPublishersIndexKnowledge BaseStudy GuidesHarvard Referencing GuidesAPA Referencing GuidesEssay Writing GuidesResearch Assistant
ArchitectureArtBiological SciencesBusinessComputer ScienceDesignEconomicsEducationHistoryLanguages & LinguisticsLawLiteratureMathematicsMedia & Performing ArtsMedicinePersonal DevelopmentPhilosophyPhysical SciencesPolitics & International RelationsPsychologySocial SciencesStudy AidsTechnology & EngineeringTheology & Religion

Made with ☂︎ in London - © 2026 Perlego Ltd - Perlego HQ, 1 Waterhouse Sq, 138 Holborn, London, EC1N 2ST, United Kingdom - VAT 246681777

PrivacyTermsContent Policy
, (opens in new tab)
BooksSubtopicsPublishersIndexMissionCookiesSmart SearchAccessibility
, (opens in new tab)
Help Centre
, (opens in new tab)
Knowledge Base
, (opens in new tab)

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Instagram
Facebook
LinkedIn
Tiktok
X
DeutschEnglishEspañolFrançaisItaliano