Most popular on Perlego
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
Private Security_cover
Private Security
Charles P. Nemeth
2017
Understanding the Digital World_cover
Understanding the Digital World
Brian W. Kernighan
2021
The Attention Merchants_cover
The Attention Merchants
Tim Wu
2017
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Learn Computer Forensics_cover
Learn Computer Forensics
William Oettinger
2020
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Cynthia Brumfield, Brian Haugli
2021
Blockchain and the Law_cover
Blockchain and the Law
Primavera De Filippi, Aaron Wright
2018
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
The Digital Silk Road_cover
The Digital Silk Road
Jonathan E. Hillman
2021
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Crime Prevention_cover
Crime Prevention
Stephen Schneider
2014
CISO COMPASS_cover
CISO COMPASS
Todd Fitzgerald
2018
Private Security and the Law_cover
Private Security and the Law
Charles P. Nemeth
2017
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
The Official (ISC)2 CISSP CBK Reference_cover
The Official (ISC)2 CISSP CBK Reference
Arthur J. Deane, Aaron Kraus
2021
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Cybersecurity Law_cover
Cybersecurity Law
Davide Mula, Alfonso Contaldo
2020
Information Security Governance_cover
Information Security Governance
Andrej Volchkov
2018
Police Use of Force_cover
Police Use of Force
Michael J. Palmiotto
2016
Cyber Security_cover
Cyber Security
Jeremy Swinfen Green
2016
Information Security Governance_cover
Information Security Governance
Krag Brotby
2009
Cybercrime Investigations_cover
Cybercrime Investigations
John Bandler, Antonia Merzon
2020
Practical Mobile Forensics_cover
Practical Mobile Forensics
Rohit Tamma, Oleg Skulkin, Heather Mahalik, Satish Bommisetty
2020
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2019
Cybersecurity Program Development for Business_cover
Cybersecurity Program Development for Business
Chris Moschovitis
2018
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2017
Digital Forensics for Legal Professionals_cover
Digital Forensics for Legal Professionals
Larry Daniel, Lars Daniel
2011
The Gentrification of the Internet_cover
The Gentrification of the Internet
Jessa Lingel
2021
Blockchain Development with Hyperledger_cover
Blockchain Development with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
2019
Computer Security Literacy_cover
Computer Security Literacy
Douglas Jacobson, Joseph Idziorek
2016
Digital Forensics with Open Source Tools_cover
Digital Forensics with Open Source Tools
Harlan Carvey, Cory Altheide
2011
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
Information Security Management Principles_cover
Information Security Management Principles
David Alexander, Amanda Finch, David Sutton, Andy Taylor
2020
Cybersecurity Leadership Demystified_cover
Cybersecurity Leadership Demystified
Dr. Erdal Ozkaya
2022
Security Awareness For Dummies_cover
Security Awareness For Dummies
Ira Winkler
2022
Critical Infrastructure_cover
Critical Infrastructure
Tyson Macaulay
2008
Acquiring Card Payments_cover
Acquiring Card Payments
Ilya Dubinsky
2019
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Secret History_cover
Secret History
Craig Bauer
2021
Cyber Threat Intelligence_cover
Cyber Threat Intelligence
Martin Lee
2023
Spooked_cover
Spooked
Barry Meier
2021
Mastering Windows Security and Hardening_cover
Mastering Windows Security and Hardening
Mark Dunkerley, Matt Tumbarello
2022
iOS Forensics for Investigators_cover
iOS Forensics for Investigators
Gianluca Tiepolo
2022
Incident Response in the Age of Cloud_cover
Incident Response in the Age of Cloud
Dr. Erdal Ozkaya
2021
Soft Target Hardening_cover
Soft Target Hardening
Jennifer Hesterman
2018
Practical Internet of Things Security_cover
Practical Internet of Things Security
Brian Russell, Drew Van Duren
2018
Cyber Wars_cover
Cyber Wars
Charles Arthur
2018
Understanding the Digital World_cover
Understanding the Digital World
Brian Kernighan
2017
Building in Security at Agile Speed_cover
Building in Security at Agile Speed
James Ransome, Brook S.E. Schoenfield
2021
Official2 Guide to the HCISPP CBK_cover
Official2 Guide to the HCISPP CBK
Steven Hernandez
2018
Recently published
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Cyber Threat Intelligence_cover
Cyber Threat Intelligence
Martin Lee
2023
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Practical Threat Detection Engineering_cover
Practical Threat Detection Engineering
Megan Roddie, Jason Deyalsingh, Gary J. Katz
2023
Deep Dive_cover
Deep Dive
Rae L. Baker
2023
Security Orchestration, Automation, and Response for Security Analysts_cover
Security Orchestration, Automation, and Response for Security Analysts
Benjamin Kovacevic, Nicholas DiCola
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Malware Science_cover
Malware Science
Shane Molinari
2023
How I Rob Banks_cover
How I Rob Banks
2023
The DevSecOps Playbook_cover
The DevSecOps Playbook
Sean D. Mack
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
Cognitive Risk_cover
Cognitive Risk
James Bone, Jessie H Lee
2023
Windows APT Warfare_cover
Windows APT Warfare
Sheng-Hao Ma, Ziv Chang, Federico Maggi
2023
The Language of Deception_cover
The Language of Deception
Justin Hutchens
2023
Enhancing IoT Security_cover
Enhancing IoT Security
Vidushi Sharma, Gamini Joshi
2023
The Art of Social Engineering_cover
The Art of Social Engineering
Cesar Bravo, Desilda Toska
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
CYBER SECURITY HANDBOOK Part-1_cover
CYBER SECURITY HANDBOOK Part-1
Poonam Devi
2023
Mobile OS Vulnerabilities_cover
Mobile OS Vulnerabilities
Shivi Garg, Niyati Baliyan
2023
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
J. Morris Chang, Di Zhuang, G. Dumindu Samaraweera
2023
Kubernetes Secrets Management_cover
Kubernetes Secrets Management
Alex Soto Bueno, Andrew Block
2023
Reaching Your New Digital Heights_cover
Reaching Your New Digital Heights
David W. Wang
2023
CompTIA CySA+ Practice Tests_cover
CompTIA CySA+ Practice Tests
Mike Chapple, David Seidl
2023
The AI Wave in Defence Innovation_cover
The AI Wave in Defence Innovation
Michael Raska, Richard A. Bitzinger
2023
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N. Parasram
2023
Azure Security Cookbook_cover
Azure Security Cookbook
Steve Miles
2023
Zed Attack Proxy Cookbook_cover
Zed Attack Proxy Cookbook
Ryan Soper, Nestor N Torres, Ahmed Almoailu
2023
Fighting Phishing_cover
Fighting Phishing
Roger A. Grimes
2024
Becoming a Computational Thinker_cover
Becoming a Computational Thinker
Paul S Wang
2024
CompTIA Security+ Practice Tests_cover
CompTIA Security+ Practice Tests
David Seidl
2023
Cybersecurity Management in Education Technologies_cover
Cybersecurity Management in Education Technologies
Ahmed A. Abd El-Latif, Yassine Maleh, Mohammed A. El-Affendi, Sadique Ahmad
2023
Artificial Intelligence & Blockchain in Cyber Physical Systems_cover
Artificial Intelligence & Blockchain in Cyber Physical Systems
Muhammad Arif, Valentina Emilia Balas, Tabrez Nafis, Nawab Muhammad Faseeh Qureshi, Samar Wazir, Ibrar Hussain
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
ISO 27001/ISO 27002_cover
ISO 27001/ISO 27002
Alan Calder
2023
The Change Agent_cover
The Change Agent
Hernan Murdock
2023
Ethical Hacking Workshop_cover
Ethical Hacking Workshop
Rishalin Pillay, Mohammed Abutheraa
2023
Zero Trust Overview and Playbook Introduction_cover
Zero Trust Overview and Playbook Introduction
Mark Simos, Nikhil Kumar
2023
Windows Forensics Analyst Field Guide_cover
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Pour une souveraineté numérique_cover
Pour une souveraineté numérique
Jean Christophe Schwaab
2023
Ultimate Web Authentication Handbook_cover
Ultimate Web Authentication Handbook
Sambit Dash
2023
The CISO Perspective_cover
The CISO Perspective
Barry Kouns, Jake Kouns
2023
Confident Cyber Security_cover
Confident Cyber Security
Jessica Barker
2023
ETHICAL HACKING GUIDE-Part 3_cover
ETHICAL HACKING GUIDE-Part 3
POONAM DEVI
2023
Python for Cybersecurity Cookbook_cover
Python for Cybersecurity Cookbook
Nishant Krishna
2023
Zero Trust and Third-Party Risk_cover
Zero Trust and Third-Party Risk
Gregory C. Rasner
2023
Recently added
Software Security_cover
Software Security
Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
The Language of Deception_cover
The Language of Deception
Justin Hutchens
2023
Enhancing IoT Security_cover
Enhancing IoT Security
Vidushi Sharma, Gamini Joshi
2023
The Art of Social Engineering_cover
The Art of Social Engineering
Cesar Bravo, Desilda Toska
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
The DevSecOps Playbook_cover
The DevSecOps Playbook
Sean D. Mack
2023
Windows Forensic Analysis DVD Toolkit_cover
Windows Forensic Analysis DVD Toolkit
Harlan Carvey
2009
CYBER SECURITY HANDBOOK Part-1_cover
CYBER SECURITY HANDBOOK Part-1
Poonam Devi
2023
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
The Ultimate Kali Linux Book_cover
The Ultimate Kali Linux Book
Glen D. Singh
2022
OPNsense Beginner to Professional_cover
OPNsense Beginner to Professional
Julio Cesar Bueno de Camargo
2022
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Practical Threat Detection Engineering_cover
Practical Threat Detection Engineering
Megan Roddie, Jason Deyalsingh, Gary J. Katz
2023
Security Orchestration, Automation, and Response for Security Analysts_cover
Security Orchestration, Automation, and Response for Security Analysts
Benjamin Kovacevic, Nicholas DiCola
2023
Mobile OS Vulnerabilities_cover
Mobile OS Vulnerabilities
Shivi Garg, Niyati Baliyan
2023
9/11 and the Future of Transportation Security_cover
9/11 and the Future of Transportation Security
R. William Johnstone
2006
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
How to Measure Anything in Cybersecurity Risk_cover
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard, Richard Seiersen
2016
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2017
Network Security Bible_cover
Network Security Bible
Eric Cole
2009
Cryptography Engineering_cover
Cryptography Engineering
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
2012
Security Engineering_cover
Security Engineering
Ross J. Anderson
2010
Implementing DevSecOps with Docker and Kubernetes_cover
Implementing DevSecOps with Docker and Kubernetes
José Manuel Ortega Candel
2022
Ethically hacking an industrial control system_cover
Ethically hacking an industrial control system
Sharon Ferrone
2022
Providing Sound Foundations for Cryptography_cover
Providing Sound Foundations for Cryptography
Oded Goldreich
2019
Homeland Security and Critical Infrastructure Protection_cover
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
Weaponizing Cyberspace_cover
Weaponizing Cyberspace
Nicholas Michael Sambaluk
2022
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Introduction to Cybercrime_cover
Introduction to Cybercrime
Joshua B. Hill, Nancy E. Marion
2016
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
J. Morris Chang, Di Zhuang, G. Dumindu Samaraweera
2023
Kubernetes Secrets Management_cover
Kubernetes Secrets Management
Alex Soto Bueno, Andrew Block
2023
Application Security Program Handbook_cover
Application Security Program Handbook
Derek Fisher
2023
How I Rob Banks_cover
How I Rob Banks
2023
Penetration Testing for Jobseekers_cover
Penetration Testing for Jobseekers
Debasish Mandal
2022
Cyber Threat Intelligence_cover
Cyber Threat Intelligence
Martin Lee
2023
Cognitive Risk_cover
Cognitive Risk
James Bone, Jessie H Lee
2023
Deep Dive_cover
Deep Dive
Rae L. Baker
2023
IT-Sicherheit_cover
IT-Sicherheit
Roland Hellmann
2022
iOS Forensics for Investigators_cover
iOS Forensics for Investigators
Gianluca Tiepolo
2022
Windows APT Warfare_cover
Windows APT Warfare
Sheng-Hao Ma, Ziv Chang, Federico Maggi
2023
Cybersecurity Threats, Malware Trends, and Strategies_cover
Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains, Timothy Youngblood CISSP
2023
360° Vulnerability Assessment with Nessus and Wireshark_cover
360° Vulnerability Assessment with Nessus and Wireshark
Raphael Hungaro Moretti, Emerson E. Matsukawa
2023
Computer Security_cover
Computer Security
Dieter Gollmann
2011
Darknet_cover
Darknet
Otto Hostettler
2017
Cybersecurity Blue Team Strategies_cover
Cybersecurity Blue Team Strategies
Kunal Sehgal, Nikolaos Thymianis
2023
Mastering Linux Security and Hardening_cover
Mastering Linux Security and Hardening
Donald A. Tevault
2023
Executive's Cybersecurity Program Handbook_cover
Executive's Cybersecurity Program Handbook
Jason Brown
2023