Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Computer Science
Cyber Security
Computer Science
Cyber Security
Explore
Books
Related topics
English
close
Most popular
close
Showing 121 - 180 out of 2,000+ books
Information Security Policy Development for Compliance
Barry L. Williams
2016
Sign up to read
Information Security Policy Development for Compliance
Barry L. Williams
2016
Access Control, Security, and Trust
Shiu-Kai Chin, Susan Beth Older
2010
Sign up to read
Access Control, Security, and Trust
Shiu-Kai Chin, Susan Beth Older
2010
CISSP Study Guide
Eric Conrad, Seth Misenar, Joshua Feldman
2012
Sign up to read
CISSP Study Guide
Eric Conrad, Seth Misenar, Joshua Feldman
2012
Building a Data Culture
Gary W. Griffin, David Holcomb
2023
Sign up to read
Building a Data Culture
Gary W. Griffin, David Holcomb
2023
Security Awareness For Dummies
Ira Winkler
2022
Sign up to read
Security Awareness For Dummies
Ira Winkler
2022
You CAN Stop Stupid
Ira Winkler, Tracy Celaya Brown
2020
Sign up to read
You CAN Stop Stupid
Ira Winkler, Tracy Celaya Brown
2020
Cybercrime Investigators Handbook
Graeme Edwards
2019
Sign up to read
Cybercrime Investigators Handbook
Graeme Edwards
2019
Security for Software Engineers
James N. Helfrich
2018
Sign up to read
Security for Software Engineers
James N. Helfrich
2018
Federal Cloud Computing
Matthew Metheny
2017
Sign up to read
Federal Cloud Computing
Matthew Metheny
2017
Cloud Storage Security
Aaron Wheeler, Michael Winburn
2015
Sign up to read
Cloud Storage Security
Aaron Wheeler, Michael Winburn
2015
Digital Identity Management
Maryline Laurent, Samia Bouzefrane
2015
Sign up to read
Digital Identity Management
Maryline Laurent, Samia Bouzefrane
2015
Information Governance and Security
John G. Iannarelli, Michael O’Shaughnessy, Michael O'Shaughnessy
2014
Sign up to read
Information Governance and Security
John G. Iannarelli, Michael O’Shaughnessy, Michael O'Shaughnessy
2014
Security without Obscurity
J.J. Stapleton
2014
Sign up to read
Security without Obscurity
J.J. Stapleton
2014
Cisco Router and Switch Forensics
Dale Liu
2009
Sign up to read
Cisco Router and Switch Forensics
Dale Liu
2009
Security Engineering
Ross Anderson
2020
Sign up to read
Security Engineering
Ross Anderson
2020
Computer Security
Dieter Gollmann
2011
Sign up to read
Computer Security
Dieter Gollmann
2011
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Sign up to read
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Information Technology Control and Audit, Fifth Edition
Angel R. Otero
2018
Sign up to read
Information Technology Control and Audit, Fifth Edition
Angel R. Otero
2018
The Basics of Digital Forensics
John Sammons
2014
Sign up to read
The Basics of Digital Forensics
John Sammons
2014
The Web Application Hacker's Handbook
Dafydd Stuttard, Marcus Pinto
2011
Sign up to read
The Web Application Hacker's Handbook
Dafydd Stuttard, Marcus Pinto
2011
Social Engineering
Christopher Hadnagy
2018
Sign up to read
Social Engineering
Christopher Hadnagy
2018
Information Security Management Systems
Heru Susanto, Mohammad Nabil Almunawar
2018
Sign up to read
Information Security Management Systems
Heru Susanto, Mohammad Nabil Almunawar
2018
Information Security Policies, Procedures, and Standards
Thomas R. Peltier
2016
Sign up to read
Information Security Policies, Procedures, and Standards
Thomas R. Peltier
2016
Applied Network Security Monitoring
Chris Sanders, Jason Smith
2013
Sign up to read
Applied Network Security Monitoring
Chris Sanders, Jason Smith
2013
Applied Combinatorics
Fred Roberts, Barry Tesman
2009
Sign up to read
Applied Combinatorics
Fred Roberts, Barry Tesman
2009
Computer and Information Security Handbook
John R. Vacca
2017
Sign up to read
Computer and Information Security Handbook
John R. Vacca
2017
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
Sign up to read
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
Private Security and the Law
Charles P. Nemeth
2017
Sign up to read
Private Security and the Law
Charles P. Nemeth
2017
CompTIA Security+ Study Guide with over 500 Practice Test Questions
Mike Chapple, David Seidl
2023
Sign up to read
CompTIA Security+ Study Guide with over 500 Practice Test Questions
Mike Chapple, David Seidl
2023
Hunting Cyber Criminals
Vinny Troia
2020
Sign up to read
Hunting Cyber Criminals
Vinny Troia
2020
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
Sign up to read
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
CompTIA CySA+ Practice Tests
Mike Chapple, David Seidl
2023
Sign up to read
CompTIA CySA+ Practice Tests
Mike Chapple, David Seidl
2023
Cyber Threat Intelligence
Martin Lee
2023
Sign up to read
Cyber Threat Intelligence
Martin Lee
2023
Cybersecurity Blue Team Strategies
Kunal Sehgal, Nikolaos Thymianis
2023
Sign up to read
Cybersecurity Blue Team Strategies
Kunal Sehgal, Nikolaos Thymianis
2023
Mastering Windows Server 2019
Jordan Krause
2021
Sign up to read
Mastering Windows Server 2019
Jordan Krause
2021
The Pentester BluePrint
Phillip L. Wylie, Kim Crawley
2020
Sign up to read
The Pentester BluePrint
Phillip L. Wylie, Kim Crawley
2020
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
2013
Sign up to read
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
2013
The Security Risk Assessment Handbook
Douglas Landoll
2021
Sign up to read
The Security Risk Assessment Handbook
Douglas Landoll
2021
Crime Prevention
Stephen Schneider
2014
Sign up to read
Crime Prevention
Stephen Schneider
2014
Real-World Cryptography
David Wong
2021
Sign up to read
Real-World Cryptography
David Wong
2021
Industrial Network Security
Eric D. Knapp, Joel Thomas Langill
2014
Sign up to read
Industrial Network Security
Eric D. Knapp, Joel Thomas Langill
2014
Introduction to Security
Robert Fischer, Edward Halibozek
2008
Sign up to read
Introduction to Security
Robert Fischer, Edward Halibozek
2008
Debugging
David J. AGANS
2002
Sign up to read
Debugging
David J. AGANS
2002
RHCSA Red Hat Enterprise Linux 9
Asghar Ghori
2024
Sign up to read
RHCSA Red Hat Enterprise Linux 9
Asghar Ghori
2024
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
Sign up to read
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
The Secret Life of Data
Aram Sinnreich, Jesse Gilbert
2024
Sign up to read
The Secret Life of Data
Aram Sinnreich, Jesse Gilbert
2024
Digital Forensics and Incident Response
Gerard Johansen
2022
Sign up to read
Digital Forensics and Incident Response
Gerard Johansen
2022
ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
Mike Wills
2022
Sign up to read
ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
Mike Wills
2022
Digital Forensics Explained
Greg Gogolin
2021
Sign up to read
Digital Forensics Explained
Greg Gogolin
2021
Building an Effective Cybersecurity Program, 2nd Edition
Tari Schreider
2019
Sign up to read
Building an Effective Cybersecurity Program, 2nd Edition
Tari Schreider
2019
CISO COMPASS
Todd Fitzgerald
2018
Sign up to read
CISO COMPASS
Todd Fitzgerald
2018
Police Use of Force
Michael J. Palmiotto
2016
Sign up to read
Police Use of Force
Michael J. Palmiotto
2016
Security Risk Management
Evan Wheeler
2011
Sign up to read
Security Risk Management
Evan Wheeler
2011
Secure and Resilient Software Development
Mark S. Merkow, Lakshmikanth Raghavan
2010
Sign up to read
Secure and Resilient Software Development
Mark S. Merkow, Lakshmikanth Raghavan
2010
Enhancing Your Cloud Security with a CNAPP Solution
Yuri Diogenes
2024
Sign up to read
Enhancing Your Cloud Security with a CNAPP Solution
Yuri Diogenes
2024
Unveiling NIST Cybersecurity Framework 2.0
Jason Brown
2024
Sign up to read
Unveiling NIST Cybersecurity Framework 2.0
Jason Brown
2024
CompTIA® Security+® SY0-701 Certification Guide
Ian Neil, Ian Neil
2024
Sign up to read
CompTIA® Security+® SY0-701 Certification Guide
Ian Neil, Ian Neil
2024
CompTIA Security+ Practice Tests
David Seidl
2023
Sign up to read
CompTIA Security+ Practice Tests
David Seidl
2023
Security Risk Management - The Driving Force for Operational Resilience
Jim Seaman, Michael Gioia
2023
Sign up to read
Security Risk Management - The Driving Force for Operational Resilience
Jim Seaman, Michael Gioia
2023
Mastering Linux Security and Hardening
Donald A. Tevault
2023
Sign up to read
Mastering Linux Security and Hardening
Donald A. Tevault
2023
1
2
3
...
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41