Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Computer Science
Cyber Security
Computer Science
Cyber Security
Explore
Books
Related topics
English
close
Most popular
close
Showing 121 - 180 out of 2,000+ books
Implementing SSL / TLS Using Cryptography and PKI
Joshua Davies
2011
Sign up to read
Implementing SSL / TLS Using Cryptography and PKI
Joshua Davies
2011
Information Security Management
Bel G. Raggad
2010
Sign up to read
Information Security Management
Bel G. Raggad
2010
Perfect Passwords
Mark Burnett
2006
Sign up to read
Perfect Passwords
Mark Burnett
2006
Public Key Infrastructure
John R. Vacca
2004
Sign up to read
Public Key Infrastructure
John R. Vacca
2004
Security Supervision and Management
IFPO
2015
Sign up to read
Security Supervision and Management
IFPO
2015
Security Engineering
Ross Anderson
2020
Sign up to read
Security Engineering
Ross Anderson
2020
Digital Forensics and Incident Response
Gerard Johansen
2022
Sign up to read
Digital Forensics and Incident Response
Gerard Johansen
2022
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Sign up to read
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Information Security Policies, Procedures, and Standards
Thomas R. Peltier
2016
Sign up to read
Information Security Policies, Procedures, and Standards
Thomas R. Peltier
2016
The Basics of Digital Forensics
John Sammons
2014
Sign up to read
The Basics of Digital Forensics
John Sammons
2014
Computer Security
Dieter Gollmann
2011
Sign up to read
Computer Security
Dieter Gollmann
2011
Information Security Management Systems
Heru Susanto, Mohammad Nabil Almunawar
2018
Sign up to read
Information Security Management Systems
Heru Susanto, Mohammad Nabil Almunawar
2018
Computer and Information Security Handbook
John R. Vacca
2017
Sign up to read
Computer and Information Security Handbook
John R. Vacca
2017
ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
Mike Wills
2022
Sign up to read
ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
Mike Wills
2022
Private Security and the Law
Charles P. Nemeth
2017
Sign up to read
Private Security and the Law
Charles P. Nemeth
2017
CompTIA Security+ Study Guide with over 500 Practice Test Questions
Mike Chapple, David Seidl
2023
Sign up to read
CompTIA Security+ Study Guide with over 500 Practice Test Questions
Mike Chapple, David Seidl
2023
CISA Certified Information Systems Auditor Study Guide
Peter H. Gregory, Mike Chapple
2024
Sign up to read
CISA Certified Information Systems Auditor Study Guide
Peter H. Gregory, Mike Chapple
2024
Real-World Cryptography
David Wong
2021
Sign up to read
Real-World Cryptography
David Wong
2021
Mastering Windows Server 2019
Jordan Krause
2021
Sign up to read
Mastering Windows Server 2019
Jordan Krause
2021
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Sign up to read
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Sign up to read
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
Sign up to read
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
The Security Risk Assessment Handbook
Douglas Landoll
2021
Sign up to read
The Security Risk Assessment Handbook
Douglas Landoll
2021
Introduction to Security
Robert Fischer, Edward Halibozek
2008
Sign up to read
Introduction to Security
Robert Fischer, Edward Halibozek
2008
A First Course in Systems Biology
Eberhard Voit, Melissa L. Kemp
2025
Sign up to read
A First Course in Systems Biology
Eberhard Voit, Melissa L. Kemp
2025
Adversarial AI Attacks, Mitigations, and Defense Strategies
John Sotiropoulos
2024
Sign up to read
Adversarial AI Attacks, Mitigations, and Defense Strategies
John Sotiropoulos
2024
The Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver
2024
Sign up to read
The Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver
2024
CompTIA® Security+® SY0-701 Certification Guide
Ian Neil, Ian Neil
2024
Sign up to read
CompTIA® Security+® SY0-701 Certification Guide
Ian Neil, Ian Neil
2024
ISACA Certified in Risk and Information Systems Control Exam Guide
Shobhit Mehta
2023
Sign up to read
ISACA Certified in Risk and Information Systems Control Exam Guide
Shobhit Mehta
2023
Application Security Program Handbook
Derek Fisher
2023
Sign up to read
Application Security Program Handbook
Derek Fisher
2023
Solving Identity Management in Modern Applications
Yvonne Wilson, Abhishek Hingnikar
2022
Sign up to read
Solving Identity Management in Modern Applications
Yvonne Wilson, Abhishek Hingnikar
2022
Hunting Cyber Criminals
Vinny Troia
2020
Sign up to read
Hunting Cyber Criminals
Vinny Troia
2020
Building an Effective Cybersecurity Program, 2nd Edition
Tari Schreider
2019
Sign up to read
Building an Effective Cybersecurity Program, 2nd Edition
Tari Schreider
2019
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
Sign up to read
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
Police Use of Force
Michael J. Palmiotto
2016
Sign up to read
Police Use of Force
Michael J. Palmiotto
2016
Risk Analysis and Security Countermeasure Selection
Thomas L. Norman CPP, PSP, CSC
2015
Sign up to read
Risk Analysis and Security Countermeasure Selection
Thomas L. Norman CPP, PSP, CSC
2015
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
2013
Sign up to read
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
2013
Enterprise Security Architecture
Nicholas Sherwood
2005
Sign up to read
Enterprise Security Architecture
Nicholas Sherwood
2005
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Sign up to read
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Hands-On Ethical Hacking Tactics
Shane Hartman
2024
Sign up to read
Hands-On Ethical Hacking Tactics
Shane Hartman
2024
Cloud Forensics Demystified
Ganesh Ramakrishnan, Mansoor Haqanee
2024
Sign up to read
Cloud Forensics Demystified
Ganesh Ramakrishnan, Mansoor Haqanee
2024
CompTIA Security+ Practice Tests
David Seidl
2023
Sign up to read
CompTIA Security+ Practice Tests
David Seidl
2023
The DevSecOps Playbook
Sean D. Mack
2023
Sign up to read
The DevSecOps Playbook
Sean D. Mack
2023
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
2023
Sign up to read
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
2023
Mastering Linux Security and Hardening
Donald A. Tevault
2023
Sign up to read
Mastering Linux Security and Hardening
Donald A. Tevault
2023
Cybersecurity All-in-One For Dummies
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
2022
Sign up to read
Cybersecurity All-in-One For Dummies
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
2022
Windows Server 2022 Administration Fundamentals
Bekim Dauti
2022
Sign up to read
Windows Server 2022 Administration Fundamentals
Bekim Dauti
2022
Taking Intelligence Analysis to the Next Level
Patrick McGlynn
2022
Sign up to read
Taking Intelligence Analysis to the Next Level
Patrick McGlynn
2022
Mastering Defensive Security
Cesar Bravo, Darren Kitchen
2022
Sign up to read
Mastering Defensive Security
Cesar Bravo, Darren Kitchen
2022
Information Risk Management
David Sutton
2021
Sign up to read
Information Risk Management
David Sutton
2021
Designing Secure Systems
Michael Melone
2021
Sign up to read
Designing Secure Systems
Michael Melone
2021
The Art of Attack
Maxie Reynolds
2021
Sign up to read
The Art of Attack
Maxie Reynolds
2021
Adversarial Tradecraft in Cybersecurity
Dan Borges
2021
Sign up to read
Adversarial Tradecraft in Cybersecurity
Dan Borges
2021
Digital Forensics Explained
Greg Gogolin
2021
Sign up to read
Digital Forensics Explained
Greg Gogolin
2021
Information Security Policies, Procedures, and Standards
Douglas J. Landoll
2017
Sign up to read
Information Security Policies, Procedures, and Standards
Douglas J. Landoll
2017
Implementing Cybersecurity
Anne Kohnke, Ken Sigler, Dan Shoemaker
2017
Sign up to read
Implementing Cybersecurity
Anne Kohnke, Ken Sigler, Dan Shoemaker
2017
Advanced Penetration Testing
Wil Allsopp
2017
Sign up to read
Advanced Penetration Testing
Wil Allsopp
2017
Policing Cyber Hate, Cyber Threats and Cyber Terrorism
Brian Blakemore
2016
Sign up to read
Policing Cyber Hate, Cyber Threats and Cyber Terrorism
Brian Blakemore
2016
Information Security Governance Simplified
Todd Fitzgerald
2016
Sign up to read
Information Security Governance Simplified
Todd Fitzgerald
2016
The Process of Investigation
Charles A. Sennewald, John Tsukayama
2014
Sign up to read
The Process of Investigation
Charles A. Sennewald, John Tsukayama
2014
1
2
3
...
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41