Más popular en Perlego
Cybersecurity Public Policy_cover
Cybersecurity Public Policy
Bradley Fowler, Kennedy Maranga
2022
Penetration Testing for Jobseekers_cover
Penetration Testing for Jobseekers
Debasish Mandal
2022
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Quantum Computing_cover
Quantum Computing
Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Anupam Baliyan, Shalli Rani
2023
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2023
Cryptography and Network Security_cover
Cryptography and Network Security
Bhushan Trivedi, Savita Gandhi, Dhiren Pandit
2021
Cybersecurity_cover
Cybersecurity
Gautam Kumar, Om Prakash Singh, Hemraj Saini
2021
Cloud Computing Simplified_cover
Cloud Computing Simplified
Surbhi Rastogi
2021
Inside Blockchain, Bitcoin, and Cryptocurrencies_cover
Inside Blockchain, Bitcoin, and Cryptocurrencies
Niaz Chowdhury
2019
Introduction to Modern Cryptography_cover
Introduction to Modern Cryptography
Jonathan Katz, Yehuda Lindell
2020
DeFi and the Future of Finance_cover
DeFi and the Future of Finance
Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
2021
IAPP CIPM Certified Information Privacy Manager Study Guide_cover
IAPP CIPM Certified Information Privacy Manager Study Guide
Mike Chapple, Joe Shelley
2023
PCI Compliance_cover
PCI Compliance
Branden R Williams, James Adamson
2022
Cybersecurity_cover
Cybersecurity
Henrique M. D. Santos
2022
The CISO Evolution_cover
The CISO Evolution
Matthew K. Sharp, Kyriakos Lambros
2022
Privacy, Regulations, and Cybersecurity_cover
Privacy, Regulations, and Cybersecurity
Chris Moschovitis
2021
Tribe of Hackers_cover
Tribe of Hackers
Marcus J. Carey, Jennifer Jin
2019
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
Cryptography_cover
Cryptography
Douglas Robert Stinson, Maura Paterson
2018
Applied Cryptography_cover
Applied Cryptography
Bruce Schneier
2017
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N Parasram
2020
The Art of Memory Forensics_cover
The Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014
An In-Depth Guide to Mobile Device Forensics_cover
An In-Depth Guide to Mobile Device Forensics
Chuck Easttom
2021
Real-World Cryptography_cover
Real-World Cryptography
David Wong
2021
Alice and Bob Learn Application Security_cover
Alice and Bob Learn Application Security
Tanya Janca
2020
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2020
Cybersecurity Law_cover
Cybersecurity Law
Davide Mula, Alfonso Contaldo
2020
Cybersecurity Fundamentals_cover
Cybersecurity Fundamentals
Kutub Thakur, Al-Sakib Khan Pathan
2020
Tribe of Hackers Security Leaders_cover
Tribe of Hackers Security Leaders
Marcus J. Carey, Jennifer Jin
2020
Cyber Warfare – Truth, Tactics, and Strategies_cover
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
2020
Cybersecurity Blue Team Toolkit_cover
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
2019
Blockchain Development with Hyperledger_cover
Blockchain Development with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
2019
Blockchain for Distributed Systems Security_cover
Blockchain for Distributed Systems Security
Sachin Shetty, Charles A. Kamhoua, Laurent L. Njilla
2019
Hands-On Cryptography with Python_cover
Hands-On Cryptography with Python
Samuel Bowne
2018
Hands-On Blockchain with Hyperledger_cover
Hands-On Blockchain with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna
2018
Investigating Cryptocurrencies_cover
Investigating Cryptocurrencies
Nick Furneaux
2018
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2018
Practical Cyber Intelligence_cover
Practical Cyber Intelligence
Wilson Bautista
2018
An Introduction to Number Theory with Cryptography_cover
An Introduction to Number Theory with Cryptography
James Kraft, Lawrence Washington
2018
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N Parasram
2017
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2017
Computer Security Literacy_cover
Computer Security Literacy
Douglas Jacobson, Joseph Idziorek
2016
Cyber Security and IT Infrastructure Protection_cover
Cyber Security and IT Infrastructure Protection
John R. Vacca
2013
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Meine digitale Sicherheit für Dummies_cover
Meine digitale Sicherheit für Dummies
Matteo Grosse-Kampmann, Chris Wojzechowski
2024
TLS Cryptography In-Depth_cover
TLS Cryptography In-Depth
Dr. Paul Duplys, Dr. Roland Schmitz
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
See Yourself in Cyber_cover
See Yourself in Cyber
Ed Adams
2024
Ultimate Splunk for Cybersecurity_cover
Ultimate Splunk for Cybersecurity
Jit Sinha
2024
Decentralizing Finance_cover
Decentralizing Finance
Kenneth Bok
2024
Publicado recientemente
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Quantum Computing_cover
Quantum Computing
Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Anupam Baliyan, Shalli Rani
2023
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Meine digitale Sicherheit für Dummies_cover
Meine digitale Sicherheit für Dummies
Matteo Grosse-Kampmann, Chris Wojzechowski
2024
TLS Cryptography In-Depth_cover
TLS Cryptography In-Depth
Dr. Paul Duplys, Dr. Roland Schmitz
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
See Yourself in Cyber_cover
See Yourself in Cyber
Ed Adams
2024
Ultimate Splunk for Cybersecurity_cover
Ultimate Splunk for Cybersecurity
Jit Sinha
2024
Decentralizing Finance_cover
Decentralizing Finance
Kenneth Bok
2024
x86 Software Reverse-Engineering, Cracking, and Counter-Measures_cover
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie Domas, Christopher Domas
2024
Ransomware_cover
Ransomware
Ravindra Das
2023
Deploying the Zero Trust Framework in MSFT Azure_cover
Deploying the Zero Trust Framework in MSFT Azure
Ravindra Das
2023
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
Christina Boura, Maria Naya-Plasencia
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Dark World_cover
Dark World
Atif Ali, Muhammad Qasim
2023
Symmetric Cryptography, Volume 2_cover
Symmetric Cryptography, Volume 2
Christina Boura, Maria Naya-Plasencia
2023
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Symmetric Cryptography, Volume 2_cover
Symmetric Cryptography, Volume 2
Christina Boura, Maria Naya-Plasencia
2023
Automated Secure Computing for Next-Generation Systems_cover
Automated Secure Computing for Next-Generation Systems
Amit Kumar Tyagi
2023
Cyber Resilience in Critical Infrastructure_cover
Cyber Resilience in Critical Infrastructure
Sinan Küfeoğlu, Abdullah Talip Akgün
2023
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things_cover
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng-Chi Lee, Mohammad S. Obaidat
2023
Cybersecurity Operations and Fusion Centers_cover
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Attribute-based Encryption (ABE)_cover
Attribute-based Encryption (ABE)
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Crypto Taxation in USA_cover
Crypto Taxation in USA
Prashant Thakur
2023
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasiński
2023
Handbook of Formal Analysis and Verification in Cryptography_cover
Handbook of Formal Analysis and Verification in Cryptography
Sedat Akleylek, Besik Dundua
2023
Learn Ethereum._cover
Learn Ethereum.
Xun (Brian) Wu, Zhihong Zou, Dongying Song
2023
Mobile OS Vulnerabilities_cover
Mobile OS Vulnerabilities
Shivi Garg, Niyati Baliyan
2023
Security-First Compliance for Small Businesses_cover
Security-First Compliance for Small Businesses
Karen Walsh
2023
AI-Based Metaheuristics for Information Security and Digital Media_cover
AI-Based Metaheuristics for Information Security and Digital Media
Apoorva S Shastri, Mangal Singh, Anand J. Kulkarni, Patrick Siarry
2023
Convergence of Blockchain, AI and IoT_cover
Convergence of Blockchain, AI and IoT
B Balamurugan, T Poongodi, M R Manu, S Karthikeyan, Yogesh Sharma
2023
Empirical Cloud Security_cover
Empirical Cloud Security
Aditya K. Sood
2023
Responsible Graph Neural Networks_cover
Responsible Graph Neural Networks
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Zahir Tari
2023
Kryptografie in der Praxis_cover
Kryptografie in der Praxis
David Wong
2023
The Zero Trust Framework_cover
The Zero Trust Framework
Ravindra Das
2023
Build Your Own Blockchain In JS_cover
Build Your Own Blockchain In JS
Sankar Srinivasan
2023
Ciberseguridad para niños con minecraft_cover
Ciberseguridad para niños con minecraft
30600
2023
Ingeniería inversa. Curso práctico_cover
Ingeniería inversa. Curso práctico
Cayetano de Juan
2023
Cryptography for Payment Professionals_cover
Cryptography for Payment Professionals
Ilya Dubinsky
2023
Añadido recientemente
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Meine digitale Sicherheit für Dummies_cover
Meine digitale Sicherheit für Dummies
Matteo Grosse-Kampmann, Chris Wojzechowski
2024
TLS Cryptography In-Depth_cover
TLS Cryptography In-Depth
Dr. Paul Duplys, Dr. Roland Schmitz
2024
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Ingeniería inversa. Curso práctico_cover
Ingeniería inversa. Curso práctico
Cayetano de Juan
2023
Ciberseguridad para niños con minecraft_cover
Ciberseguridad para niños con minecraft
30600
2023
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Decentralizing Finance_cover
Decentralizing Finance
Kenneth Bok
2024
See Yourself in Cyber_cover
See Yourself in Cyber
Ed Adams
2024
Ultimate Splunk for Cybersecurity_cover
Ultimate Splunk for Cybersecurity
Jit Sinha
2024
x86 Software Reverse-Engineering, Cracking, and Counter-Measures_cover
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie Domas, Christopher Domas
2024
Kryptografie in der Praxis_cover
Kryptografie in der Praxis
David Wong
2023
Cryptography for Payment Professionals_cover
Cryptography for Payment Professionals
Ilya Dubinsky
2023
Handbook of Formal Analysis and Verification in Cryptography_cover
Handbook of Formal Analysis and Verification in Cryptography
Sedat Akleylek, Besik Dundua
2023
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasiński
2023
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
The Zero Trust Framework_cover
The Zero Trust Framework
Ravindra Das
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Cybersecurity_cover
Cybersecurity
Gautam Kumar, Om Prakash Singh, Hemraj Saini
2021
Ransomware_cover
Ransomware
Ravindra Das
2023
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
Christina Boura, Maria Naya-Plasencia
2023
Symmetric Cryptography, Volume 2_cover
Symmetric Cryptography, Volume 2
Christina Boura, Maria Naya-Plasencia
2023
Deploying the Zero Trust Framework in MSFT Azure_cover
Deploying the Zero Trust Framework in MSFT Azure
Ravindra Das
2023
Automated Secure Computing for Next-Generation Systems_cover
Automated Secure Computing for Next-Generation Systems
Amit Kumar Tyagi
2023
Dark World_cover
Dark World
Atif Ali, Muhammad Qasim
2023
Learn Ethereum._cover
Learn Ethereum.
Xun (Brian) Wu, Zhihong Zou, Dongying Song
2023
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
Symmetric Cryptography, Volume 2_cover
Symmetric Cryptography, Volume 2
Christina Boura, Maria Naya-Plasencia
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Cyber Resilience in Critical Infrastructure_cover
Cyber Resilience in Critical Infrastructure
Sinan Küfeoğlu, Abdullah Talip Akgün
2023
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things_cover
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng-Chi Lee, Mohammad S. Obaidat
2023
Attribute-based Encryption (ABE)_cover
Attribute-based Encryption (ABE)
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Cybersecurity Operations and Fusion Centers_cover
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin
2023
Crypto Taxation in USA_cover
Crypto Taxation in USA
Prashant Thakur
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
DeFi and the Future of Finance_cover
DeFi and the Future of Finance
Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
2021
Security-First Compliance for Small Businesses_cover
Security-First Compliance for Small Businesses
Karen Walsh
2023
Empirical Cloud Security_cover
Empirical Cloud Security
Aditya K. Sood
2023
Mobile OS Vulnerabilities_cover
Mobile OS Vulnerabilities
Shivi Garg, Niyati Baliyan
2023
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
Quantum Computing_cover
Quantum Computing
Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Anupam Baliyan, Shalli Rani
2023
AI-Based Metaheuristics for Information Security and Digital Media_cover
AI-Based Metaheuristics for Information Security and Digital Media
Apoorva S Shastri, Mangal Singh, Anand J. Kulkarni, Patrick Siarry
2023
Convergence of Blockchain, AI and IoT_cover
Convergence of Blockchain, AI and IoT
B Balamurugan, T Poongodi, M R Manu, S Karthikeyan, Yogesh Sharma
2023
Cloud Computing Simplified_cover
Cloud Computing Simplified
Surbhi Rastogi
2021
Responsible Graph Neural Networks_cover
Responsible Graph Neural Networks
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Zahir Tari
2023
Build Your Own Blockchain In JS_cover
Build Your Own Blockchain In JS
Sankar Srinivasan
2023
Understanding Blockchain_cover
Understanding Blockchain
Sankar Srinivasan
2023
Mettiti al sicuro_cover
Mettiti al sicuro
Gianluca Maggi
2023