Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Computer Science
Cyber Security
Computer Science
Cyber Security
Explore
Books
Related topics
English
close
Most popular
close
Showing 2,341 - 2,400 out of 2,000+ books
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide
Glen D. Singh
2020
Sign up to read
Implementing and Administering Cisco Solutions: 200-301 CCNA Exam Guide
Glen D. Singh
2020
Python Testing with Selenium
Sujay Raghavendra
2020
Sign up to read
Python Testing with Selenium
Sujay Raghavendra
2020
Information Security in Healthcare
Terrell W. Herzig
2020
Sign up to read
Information Security in Healthcare
Terrell W. Herzig
2020
Seguridad y ciberseguridad
Nelson Javier Pulido Daza
2020
Sign up to read
Seguridad y ciberseguridad
Nelson Javier Pulido Daza
2020
Distributed Denial of Service Attacks
Richard Brooks, İlker Özçelik
2020
Sign up to read
Distributed Denial of Service Attacks
Richard Brooks, İlker Özçelik
2020
Cybersecurity and Resilience in the Arctic
2020
Sign up to read
Cybersecurity and Resilience in the Arctic
2020
Cyber Arms
Stanislav Abaimov, Maurizio Martellini
2020
Sign up to read
Cyber Arms
Stanislav Abaimov, Maurizio Martellini
2020
Transforming Information Security
Kathleen M. Moriarty
2020
Sign up to read
Transforming Information Security
Kathleen M. Moriarty
2020
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
2020
Sign up to read
Microsoft 365 Security Administration: MS-500 Exam Guide
Peter Rising
2020
UNHACKABLE : Your Online Security Playbook
George Mansour
2020
Sign up to read
UNHACKABLE : Your Online Security Playbook
George Mansour
2020
Digital Forensics with Kali Linux
Shiva V. N. Parasram
2020
Sign up to read
Digital Forensics with Kali Linux
Shiva V. N. Parasram
2020
IBM i Security Administration and Compliance
Carol Woodbury
2020
Sign up to read
IBM i Security Administration and Compliance
Carol Woodbury
2020
Attribute-Based Encryption and Access Control
Dijiang Huang, Qiuxiang Dong, Yan Zhu
2020
Sign up to read
Attribute-Based Encryption and Access Control
Dijiang Huang, Qiuxiang Dong, Yan Zhu
2020
Cross-Site Scripting Attacks
B. B. Gupta, Pooja Chaudhary, Brij B. Gupta
2020
Sign up to read
Cross-Site Scripting Attacks
B. B. Gupta, Pooja Chaudhary, Brij B. Gupta
2020
CompTIA Security+ Practice Tests SY0-501
Ian Neil
2020
Sign up to read
CompTIA Security+ Practice Tests SY0-501
Ian Neil
2020
Home Security Systems. Intrusion Detection with GSM
Washington Mutwiri
2019
Sign up to read
Home Security Systems. Intrusion Detection with GSM
Washington Mutwiri
2019
Resilience and Hybrid Threats
2019
Sign up to read
Resilience and Hybrid Threats
2019
Cybersecurity Discourse in the United States
Sean T. Lawson
2019
Sign up to read
Cybersecurity Discourse in the United States
Sean T. Lawson
2019
Human Dimensions of Cybersecurity
Terry Bossomaier, Steven D'Alessandro, Roger Bradbury
2019
Sign up to read
Human Dimensions of Cybersecurity
Terry Bossomaier, Steven D'Alessandro, Roger Bradbury
2019
Security+® Practice Tests
Mike Chapple
2019
Sign up to read
Security+® Practice Tests
Mike Chapple
2019
Botnets
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
2019
Sign up to read
Botnets
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
2019
Why Don't We Defend Better?
Robert Sloan, Richard Warner
2019
Sign up to read
Why Don't We Defend Better?
Robert Sloan, Richard Warner
2019
Cyber Enigma
E. Dilipraj
2019
Sign up to read
Cyber Enigma
E. Dilipraj
2019
Cybersecurity and Privacy in Cyber Physical Systems
Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq
2019
Sign up to read
Cybersecurity and Privacy in Cyber Physical Systems
Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq
2019
Call Center Continuity Planning
Jim Rowan
2019
Sign up to read
Call Center Continuity Planning
Jim Rowan
2019
Concurrency Control and Recovery in OLTP Systems
Peng Cai, Jinwei Guo;Aoying Zhou
2019
Sign up to read
Concurrency Control and Recovery in OLTP Systems
Peng Cai, Jinwei Guo;Aoying Zhou
2019
How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
Haitham Ismail
2019
Sign up to read
How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East
Haitham Ismail
2019
Hands-On Penetration Testing with Python
Furqan Khan
2019
Sign up to read
Hands-On Penetration Testing with Python
Furqan Khan
2019
Becoming the Hacker
Adrian Pruteanu
2019
Sign up to read
Becoming the Hacker
Adrian Pruteanu
2019
Learn Microsoft Azure
Mohamed Wali
2018
Sign up to read
Learn Microsoft Azure
Mohamed Wali
2018
Understanding Security Issues
Scott Donaldson, Chris Williams, Stanley Siegel
2018
Sign up to read
Understanding Security Issues
Scott Donaldson, Chris Williams, Stanley Siegel
2018
The Insider Threat
Eleanor E. Thompson
2018
Sign up to read
The Insider Threat
Eleanor E. Thompson
2018
Mobile Apps Engineering
Ghita K. Mostefaoui, Faisal Tariq
2018
Sign up to read
Mobile Apps Engineering
Ghita K. Mostefaoui, Faisal Tariq
2018
IT Application Security and Control
Dileep Keshava Narayana
2018
Sign up to read
IT Application Security and Control
Dileep Keshava Narayana
2018
Computer and Cyber Security
Brij B. Gupta
2018
Sign up to read
Computer and Cyber Security
Brij B. Gupta
2018
Data Protection and the Cloud - Are you really managing the risks?
Paul Ticher
2018
Sign up to read
Data Protection and the Cloud - Are you really managing the risks?
Paul Ticher
2018
Mastering Reverse Engineering
Reginald Wong
2018
Sign up to read
Mastering Reverse Engineering
Reginald Wong
2018
Recent Advances in Cryptography and Network Security
2018
Sign up to read
Recent Advances in Cryptography and Network Security
2018
Software Defined-WAN for the Digital Age
David Wang, David W. Wang
2018
Sign up to read
Software Defined-WAN for the Digital Age
David Wang, David W. Wang
2018
Survey on Network Security Threats and Attacks
Santosh Malhotra, Amit Kumar
2018
Sign up to read
Survey on Network Security Threats and Attacks
Santosh Malhotra, Amit Kumar
2018
Der Cyber Survival Guide
Nick Selby, Heather Vescent
2018
Sign up to read
Der Cyber Survival Guide
Nick Selby, Heather Vescent
2018
Internet of Things Security
Chintan Patel, Nishant Doshi
2018
Sign up to read
Internet of Things Security
Chintan Patel, Nishant Doshi
2018
Hands-On Penetration Testing on Windows
Phil Bramwell
2018
Sign up to read
Hands-On Penetration Testing on Windows
Phil Bramwell
2018
Exploding Data
Michael Chertoff
2018
Sign up to read
Exploding Data
Michael Chertoff
2018
The Science of Biometrics
Ravindra Das
2018
Sign up to read
The Science of Biometrics
Ravindra Das
2018
Learning Python Web Penetration Testing
Christian Martorella
2018
Sign up to read
Learning Python Web Penetration Testing
Christian Martorella
2018
Data Loss Prevention und Incident Response
Mathias Fuchs, Carsten Eilers
2018
Sign up to read
Data Loss Prevention und Incident Response
Mathias Fuchs, Carsten Eilers
2018
CCNA Security 210-260 Certification Guide
Glen D. Singh, Michael Vinod, Vijay Anandh
2018
Sign up to read
CCNA Security 210-260 Certification Guide
Glen D. Singh, Michael Vinod, Vijay Anandh
2018
Wireless Network Security
Wolfgang Osterhage
2018
Sign up to read
Wireless Network Security
Wolfgang Osterhage
2018
Privacy’s Blueprint
Woodrow Hartzog
2018
Sign up to read
Privacy’s Blueprint
Woodrow Hartzog
2018
The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications
Rocky Termanini
2018
Sign up to read
The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications
Rocky Termanini
2018
IT Security
Pasquale Alfieri
2018
Sign up to read
IT Security
Pasquale Alfieri
2018
Research Agenda The Human Factor in Cybercrime and Cybersecurity
2018
Sign up to read
Research Agenda The Human Factor in Cybercrime and Cybersecurity
2018
Digital and Document Examination
2018
Sign up to read
Digital and Document Examination
2018
WLAN Hacking
Tim Philipp Schäfers, Rico Walde
2018
Sign up to read
WLAN Hacking
Tim Philipp Schäfers, Rico Walde
2018
Enterprise Cloud Security and Governance
Zeal Vora
2017
Sign up to read
Enterprise Cloud Security and Governance
Zeal Vora
2017
Multimedia Security
2017
Sign up to read
Multimedia Security
2017
A Socio-Legal Study of Hacking
Michael Anthony C. Dizon
2017
Sign up to read
A Socio-Legal Study of Hacking
Michael Anthony C. Dizon
2017
Security in Network Functions Virtualization
Zonghua Zhang, Ahmed Meddahi
2017
Sign up to read
Security in Network Functions Virtualization
Zonghua Zhang, Ahmed Meddahi
2017
Fraud Hotlines
Chelsea A. Binns
2017
Sign up to read
Fraud Hotlines
Chelsea A. Binns
2017
1
...
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
...
41
42
43
44