Más popular en Perlego
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2022
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
Hands-On Machine Learning for Cybersecurity_cover
Hands-On Machine Learning for Cybersecurity
Soma Halder, Sinan Ozdemir
2018
Official2® Guide to the CISSP®-ISSMP® CBK®_cover
Official2® Guide to the CISSP®-ISSMP® CBK®
Joseph Steinberg
2015
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
Learning iOS Penetration Testing_cover
Learning iOS Penetration Testing
Swaroop Yermalkar
2016
CASP+ CompTIA Advanced Security Practitioner Study Guide_cover
CASP+ CompTIA Advanced Security Practitioner Study Guide
Jeff T. Parker, Michael Gregg
2019
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
IoT_cover
IoT
Souvik Pal, Vicente García Díaz, Dac-Nhuong Le
2020
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Cyber-Security Threats, Actors, and Dynamic Mitigation_cover
Cyber-Security Threats, Actors, and Dynamic Mitigation
Nicholas Kolokotronis, Stavros Shiaeles
2021
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Cybersecurity Public Policy_cover
Cybersecurity Public Policy
Bradley Fowler, Kennedy Maranga
2022
Penetration Testing for Jobseekers_cover
Penetration Testing for Jobseekers
Debasish Mandal
2022
Cybersecurity for Business_cover
Cybersecurity for Business
Larry Clinton
2022
Enterprise Cybersecurity in Digital Business_cover
Enterprise Cybersecurity in Digital Business
Ariel Evans
2022
DevOps y seguridad cloud_cover
DevOps y seguridad cloud
Guijarro Olivares, Jordi, Caparrós Ramírez, Joan, Cubero Luque, Lorenzo
2019
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Cyber Threat Intelligence_cover
Cyber Threat Intelligence
Martin Lee
2023
The Web Application Hacker's Handbook_cover
The Web Application Hacker's Handbook
Dafydd Stuttard, Marcus Pinto
2011
Social Engineering_cover
Social Engineering
Christopher Hadnagy
2018
The Decision to Attack_cover
The Decision to Attack
Aaron Franklin Brantly
2016
Spring Boot in Action_cover
Spring Boot in Action
Craig Walls
2015
Measuring and Managing Information Risk_cover
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
J. Morris Chang, Di Zhuang, G. Dumindu Samaraweera
2023
Computational Intelligence for Cybersecurity Management and Applications_cover
Computational Intelligence for Cybersecurity Management and Applications
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
2023
Cloud Auditing Best Practices_cover
Cloud Auditing Best Practices
Shinesa Cambric, Michael Ratemo
2023
Cybersecurity in Intelligent Networking Systems_cover
Cybersecurity in Intelligent Networking Systems
Shengjie Xu, Yi Qian, Rose Qingyang Hu
2022
Security and Privacy Trends in Cloud Computing and Big Data_cover
Security and Privacy Trends in Cloud Computing and Big Data
Muhammad Imran Tariq, Valentina Emilia Balas, Shahzadi Tayyaba
2022
Practical Industrial Cybersecurity_cover
Practical Industrial Cybersecurity
Charles J. Brooks, Philip A. Craig
2022
Cloud Security Handbook_cover
Cloud Security Handbook
Eyal Estrin
2022
Cyber Security and Network Security_cover
Cyber Security and Network Security
Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha
2022
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Cynthia Brumfield, Brian Haugli
2021
Industrial Cybersecurity_cover
Industrial Cybersecurity
Pascal Ackerman
2021
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests_cover
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests
Scott Selikoff, Jeanne Boyarsky
2021
Nuevos espacios de seguridad nacional_cover
Nuevos espacios de seguridad nacional
Dr. Cristian Barria Huidobro
2020
Social Network Analysis and Law Enforcement_cover
Social Network Analysis and Law Enforcement
Morgan Burcher
2020
Learning Android Forensics_cover
Learning Android Forensics
Oleg Skulkin, Donnie Tindall, Rohit Tamma
2018
Hands-On Security in DevOps_cover
Hands-On Security in DevOps
Tony Hsu
2018
GuíaBurros: Ciberseguridad_cover
GuíaBurros: Ciberseguridad
Mónica Valle
2018
FinTech_cover
FinTech
Parag Y Arjunwadkar
2018
Windows Security Monitoring_cover
Windows Security Monitoring
Andrei Miroshnikov
2018
Mastering Windows Network Forensics and Investigation_cover
Mastering Windows Network Forensics and Investigation
Steve Anson, Steve Bunting, Ryan Johnson, Scott Pearson
2012
Un fantasma en el sistema_cover
Un fantasma en el sistema
Kevin Mitnick, William L. Simon
2020
Hackeado_cover
Hackeado
Alan T. Norman
2019
ISO27001/ISO27002: Una guía de bolsillo_cover
ISO27001/ISO27002: Una guía de bolsillo
Alan Calder
2017
Information Security_cover
Information Security
Mark Stamp
2021
Understanding the Digital World_cover
Understanding the Digital World
Brian W. Kernighan
2021
Publicado recientemente
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
J. Morris Chang, Di Zhuang, G. Dumindu Samaraweera
2023
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Multi-Cloud Administration Guide_cover
Multi-Cloud Administration Guide
Jeroen Mulder
2023
Reaching Your New Digital Heights_cover
Reaching Your New Digital Heights
David W. Wang
2023
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Riding the Wave_cover
Riding the Wave
Andrew Boyarsky
2024
Ultimate Penetration Testing with Nmap_cover
Ultimate Penetration Testing with Nmap
Travis DeForge
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Microsoft 365 Security and Compliance for Administrators_cover
Microsoft 365 Security and Compliance for Administrators
Sasha Kranjac, Omar Kudović
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Cyber Safety for Everyone - 3rd Edition_cover
Cyber Safety for Everyone - 3rd Edition
JaagoTeens
2024
Security for Cloud Native Applications_cover
Security for Cloud Native Applications
Eyal Estrin
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Europrivacy™/®_cover
Europrivacy™/®
Alice Turley
2024
From Exposed to Secure_cover
From Exposed to Secure
Featuring Cybersecurity And Compliance Experts From Around The World Featuring Cybersecurity And Compliance Experts From Around The World
2024
Artificial Intelligence for Cyber Defense and Smart Policing_cover
Artificial Intelligence for Cyber Defense and Smart Policing
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
2024
Security-Driven Software Development_cover
Security-Driven Software Development
Aspen Olmsted
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Stepping Through Cybersecurity Risk Management_cover
Stepping Through Cybersecurity Risk Management
Jennifer L. Bayuk
2024
Why CISOs Fail_cover
Why CISOs Fail
Barak Engel
2024
The Cybersecurity Guide to Governance, Risk, and Compliance_cover
The Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver
2024
Mastering Secure Java Applications_cover
Mastering Secure Java Applications
Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar
2024
Infrastructure Attack Strategies for Ethical Hacking_cover
Infrastructure Attack Strategies for Ethical Hacking
Himanshu Sharma, Harpreet Singh
2024
Personal Identification_cover
Personal Identification
David J. Haas
2024
Understand the Cyber Attacker Mindset_cover
Understand the Cyber Attacker Mindset
Sarah Armstrong-Smith
2024
Killer Tech and the Drive to Save Humanity_cover
Killer Tech and the Drive to Save Humanity
Mark Stross
2024
Mastering Network Forensics_cover
Mastering Network Forensics
Nipun Jaswal
2024
PCI DSS Version 4.0_cover
PCI DSS Version 4.0
Stephen Hancock
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Digital Dreams Have Become Nightmares_cover
Digital Dreams Have Become Nightmares
Ronald M. Baecker
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cloud Forensics Demystified_cover
Cloud Forensics Demystified
Ganesh Ramakrishnan, Mansoor Haqanee
2024
Digitale Selbstverteidigung für Dummies_cover
Digitale Selbstverteidigung für Dummies
Christina Czeschik
2024
ISC2 Certified Cloud Security Professional Exam Guide_cover
ISC2 Certified Cloud Security Professional Exam Guide
Kim van Lavieren
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Blockchain and Machine Learning for IoT Security_cover
Blockchain and Machine Learning for IoT Security
Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, Said Benkirane
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Nichts gegen eine Million – die wahre Geschichte eines Online-Betrugs_cover
Nichts gegen eine Million – die wahre Geschichte eines Online-Betrugs
Ruth Van de Gaer Sturzenegger
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Meine digitale Sicherheit für Dummies_cover
Meine digitale Sicherheit für Dummies
Matteo Grosse-Kampmann, Chris Wojzechowski
2024
Deterrence in the 21st Century_cover
Deterrence in the 21st Century
Eric Ouellet, Madeleine D'Agata, Keith Stewart
2024
Global Digital Data Governance_cover
Global Digital Data Governance
Carolina Aguerre, Malcolm Campbell-Verduyn, Jan Aart Scholte
2024
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
Añadido recientemente
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Microsoft 365 Security and Compliance for Administrators_cover
Microsoft 365 Security and Compliance for Administrators
Sasha Kranjac, Omar Kudović
2024
Riding the Wave_cover
Riding the Wave
Andrew Boyarsky
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Cybersecurity for Industrial Control Systems_cover
Cybersecurity for Industrial Control Systems
Tyson Macaulay, Bryan L. Singer
2016
The Practical Guide to HIPAA Privacy and Security Compliance_cover
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Business Continuity Planning_cover
Business Continuity Planning
Ralph L. Kliem, Gregg D. Richie
2015
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Police Corruption_cover
Police Corruption
Tim Prenzler
2009
Handbook of Applied Cryptography_cover
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Virtuous Policing_cover
Virtuous Policing
David G. Bolgiano, L. Morgan Banks, III, James M. Patterson
2017
Tradecraft Primer_cover
Tradecraft Primer
Paul Charles Topalian
2017
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Counterterrorism_cover
Counterterrorism
Benoît Gomis
2015
Homeland Security and Private Sector Business_cover
Homeland Security and Private Sector Business
Chi-Jen Lee, Cheng-Hsiung Lu, Lucia H. Lee
2014
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Europrivacy™/®_cover
Europrivacy™/®
Alice Turley
2024
Security-Driven Software Development_cover
Security-Driven Software Development
Aspen Olmsted
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Artificial Intelligence for Cyber Defense and Smart Policing_cover
Artificial Intelligence for Cyber Defense and Smart Policing
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Stepping Through Cybersecurity Risk Management_cover
Stepping Through Cybersecurity Risk Management
Jennifer L. Bayuk
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Multi-Cloud Administration Guide_cover
Multi-Cloud Administration Guide
Jeroen Mulder
2023
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
Reaching Your New Digital Heights_cover
Reaching Your New Digital Heights
David W. Wang
2023
How to Measure Anything in Cybersecurity Risk_cover
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard, Richard Seiersen
2016
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2017
CASP CompTIA Advanced Security Practitioner Study Guide_cover
CASP CompTIA Advanced Security Practitioner Study Guide
Michael Gregg
2014
Network Security Bible_cover
Network Security Bible
Eric Cole
2009
Cryptography Engineering_cover
Cryptography Engineering
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
2012
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
Security Engineering_cover
Security Engineering
Ross J. Anderson
2010
Homeland Security and Critical Infrastructure Protection_cover
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Introduction to Cybercrime_cover
Introduction to Cybercrime
Joshua B. Hill, Nancy E. Marion
2016
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
J. Morris Chang, Di Zhuang, G. Dumindu Samaraweera
2023
Kali Linux Hacking-Tools für Dummies_cover
Kali Linux Hacking-Tools für Dummies
Felix Alexa, Konstantin Goretzki, Tobias Scheible
2023