Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Computer Science
Cyber Security
Computer Science
Cyber Security
Explore
Books
Related topics
English
close
Most popular
close
Showing 121 - 180 out of 2,000+ books
Public Key Infrastructure
John R. Vacca
2004
Sign up to read
Public Key Infrastructure
John R. Vacca
2004
Change the Box
John Spencer-Taylor
2025
Sign up to read
Change the Box
John Spencer-Taylor
2025
Digital Dreams Have Become Nightmares
Ronald M. Baecker
2024
Sign up to read
Digital Dreams Have Become Nightmares
Ronald M. Baecker
2024
The CISO Evolution
Matthew K. Sharp, Kyriakos Lambros
2022
Sign up to read
The CISO Evolution
Matthew K. Sharp, Kyriakos Lambros
2022
The Gentrification of the Internet
Jessa Lingel
2021
Sign up to read
The Gentrification of the Internet
Jessa Lingel
2021
SIP Handbook
Syed A. Ahson, Mohammad Ilyas
2018
Sign up to read
SIP Handbook
Syed A. Ahson, Mohammad Ilyas
2018
Official2 Guide to the CAP CBK
Patrick D. Howard
2016
Sign up to read
Official2 Guide to the CAP CBK
Patrick D. Howard
2016
Security Supervision and Management
IFPO
2015
Sign up to read
Security Supervision and Management
IFPO
2015
Security Engineering
Ross Anderson
2020
Sign up to read
Security Engineering
Ross Anderson
2020
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Sign up to read
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Digital Forensics and Incident Response
Gerard Johansen
2022
Sign up to read
Digital Forensics and Incident Response
Gerard Johansen
2022
Computer Security
Dieter Gollmann
2011
Sign up to read
Computer Security
Dieter Gollmann
2011
Information Security Management Systems
Heru Susanto, Mohammad Nabil Almunawar
2018
Sign up to read
Information Security Management Systems
Heru Susanto, Mohammad Nabil Almunawar
2018
Information Security Policies, Procedures, and Standards
Thomas R. Peltier
2016
Sign up to read
Information Security Policies, Procedures, and Standards
Thomas R. Peltier
2016
The Basics of Digital Forensics
John Sammons
2014
Sign up to read
The Basics of Digital Forensics
John Sammons
2014
Computer and Information Security Handbook
John R. Vacca
2017
Sign up to read
Computer and Information Security Handbook
John R. Vacca
2017
CompTIA Security+ Study Guide with over 500 Practice Test Questions
Mike Chapple, David Seidl
2023
Sign up to read
CompTIA Security+ Study Guide with over 500 Practice Test Questions
Mike Chapple, David Seidl
2023
Real-World Cryptography
David Wong
2021
Sign up to read
Real-World Cryptography
David Wong
2021
CompTIA Security+ Practice Tests
David Seidl
2023
Sign up to read
CompTIA Security+ Practice Tests
David Seidl
2023
CISA Certified Information Systems Auditor Study Guide
Peter H. Gregory, Mike Chapple
2024
Sign up to read
CISA Certified Information Systems Auditor Study Guide
Peter H. Gregory, Mike Chapple
2024
Cyberpredators and Their Prey
Lauren R. Shapiro
2022
Sign up to read
Cyberpredators and Their Prey
Lauren R. Shapiro
2022
Digital Forensics Explained
Greg Gogolin
2021
Sign up to read
Digital Forensics Explained
Greg Gogolin
2021
The Basics of Hacking and Penetration Testing
Patrick Engebretson
2013
Sign up to read
The Basics of Hacking and Penetration Testing
Patrick Engebretson
2013
The Security Risk Assessment Handbook
Douglas Landoll
2021
Sign up to read
The Security Risk Assessment Handbook
Douglas Landoll
2021
Solving Identity Management in Modern Applications
Yvonne Wilson, Abhishek Hingnikar
2022
Sign up to read
Solving Identity Management in Modern Applications
Yvonne Wilson, Abhishek Hingnikar
2022
Hunting Cyber Criminals
Vinny Troia
2020
Sign up to read
Hunting Cyber Criminals
Vinny Troia
2020
Building an Effective Cybersecurity Program, 2nd Edition
Tari Schreider
2019
Sign up to read
Building an Effective Cybersecurity Program, 2nd Edition
Tari Schreider
2019
CISO COMPASS
Todd Fitzgerald
2018
Sign up to read
CISO COMPASS
Todd Fitzgerald
2018
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
Sign up to read
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
Risk Analysis and Security Countermeasure Selection
Thomas L. Norman CPP, PSP, CSC
2015
Sign up to read
Risk Analysis and Security Countermeasure Selection
Thomas L. Norman CPP, PSP, CSC
2015
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Sign up to read
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
Sign up to read
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
2013
Sign up to read
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
2013
Enterprise Security Architecture
Nicholas Sherwood
2005
Sign up to read
Enterprise Security Architecture
Nicholas Sherwood
2005
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Sign up to read
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
CompTIA A+ Complete Practice Tests
Audrey O'Shea
2025
Sign up to read
CompTIA A+ Complete Practice Tests
Audrey O'Shea
2025
Cyber Security Foundations
Keith Martin, Konstantinos Mersinas, Guido Schmitz, Jassim Happa
2025
Sign up to read
Cyber Security Foundations
Keith Martin, Konstantinos Mersinas, Guido Schmitz, Jassim Happa
2025
Adversarial AI Attacks, Mitigations, and Defense Strategies
John Sotiropoulos
2024
Sign up to read
Adversarial AI Attacks, Mitigations, and Defense Strategies
John Sotiropoulos
2024
Cloud Forensics Demystified
Ganesh Ramakrishnan, Mansoor Haqanee
2024
Sign up to read
Cloud Forensics Demystified
Ganesh Ramakrishnan, Mansoor Haqanee
2024
CompTIA® Security+® SY0-701 Certification Guide
Ian Neil, Ian Neil
2024
Sign up to read
CompTIA® Security+® SY0-701 Certification Guide
Ian Neil, Ian Neil
2024
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Sign up to read
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
The DevSecOps Playbook
Sean D. Mack
2023
Sign up to read
The DevSecOps Playbook
Sean D. Mack
2023
ISACA Certified in Risk and Information Systems Control Exam Guide
Shobhit Mehta
2023
Sign up to read
ISACA Certified in Risk and Information Systems Control Exam Guide
Shobhit Mehta
2023
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
2023
Sign up to read
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
2023
Mastering Linux Security and Hardening
Donald A. Tevault
2023
Sign up to read
Mastering Linux Security and Hardening
Donald A. Tevault
2023
Application Security Program Handbook
Derek Fisher
2023
Sign up to read
Application Security Program Handbook
Derek Fisher
2023
Cybersecurity All-in-One For Dummies
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
2022
Sign up to read
Cybersecurity All-in-One For Dummies
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
2022
Taking Intelligence Analysis to the Next Level
Patrick McGlynn
2022
Sign up to read
Taking Intelligence Analysis to the Next Level
Patrick McGlynn
2022
Industrial Cybersecurity
Pascal Ackerman
2021
Sign up to read
Industrial Cybersecurity
Pascal Ackerman
2021
Information Risk Management
David Sutton
2021
Sign up to read
Information Risk Management
David Sutton
2021
Designing Secure Systems
Michael Melone
2021
Sign up to read
Designing Secure Systems
Michael Melone
2021
Mastering Windows Server 2019
Jordan Krause
2021
Sign up to read
Mastering Windows Server 2019
Jordan Krause
2021
The Art of Attack
Maxie Reynolds
2021
Sign up to read
The Art of Attack
Maxie Reynolds
2021
Kali Linux Penetration Testing Bible
Gus Khawaja
2021
Sign up to read
Kali Linux Penetration Testing Bible
Gus Khawaja
2021
Cybersecurity: The Beginner's Guide
Dr. Erdal Ozkaya
2019
Sign up to read
Cybersecurity: The Beginner's Guide
Dr. Erdal Ozkaya
2019
Managing Cyber Risk
Ariel Evans
2019
Sign up to read
Managing Cyber Risk
Ariel Evans
2019
Soft Target Hardening
Jennifer Hesterman
2018
Sign up to read
Soft Target Hardening
Jennifer Hesterman
2018
Private Security and the Law
Charles P. Nemeth
2017
Sign up to read
Private Security and the Law
Charles P. Nemeth
2017
Advanced Penetration Testing
Wil Allsopp
2017
Sign up to read
Advanced Penetration Testing
Wil Allsopp
2017
Police Use of Force
Michael J. Palmiotto
2016
Sign up to read
Police Use of Force
Michael J. Palmiotto
2016
1
2
3
...
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44