Más popular en Perlego
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2022
Hands-On Machine Learning for Cybersecurity_cover
Hands-On Machine Learning for Cybersecurity
Soma Halder, Sinan Ozdemir
2018
Official2® Guide to the CISSP®-ISSMP® CBK®_cover
Official2® Guide to the CISSP®-ISSMP® CBK®
Joseph Steinberg
2015
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
Learning iOS Penetration Testing_cover
Learning iOS Penetration Testing
Swaroop Yermalkar
2016
CASP+ CompTIA Advanced Security Practitioner Study Guide_cover
CASP+ CompTIA Advanced Security Practitioner Study Guide
Jeff T. Parker, Michael Gregg
2019
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Python Ethical Hacking from Scratch_cover
Python Ethical Hacking from Scratch
Fahad Ali Sarwar
2021
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
IoT_cover
IoT
Souvik Pal, Vicente García Díaz, Dac-Nhuong Le
2020
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Cyber-Security Threats, Actors, and Dynamic Mitigation_cover
Cyber-Security Threats, Actors, and Dynamic Mitigation
Nicholas Kolokotronis, Stavros Shiaeles
2021
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Cyber Threat Intelligence_cover
Cyber Threat Intelligence
Martin Lee
2023
Cybersecurity Public Policy_cover
Cybersecurity Public Policy
Bradley Fowler, Kennedy Maranga
2022
Penetration Testing for Jobseekers_cover
Penetration Testing for Jobseekers
Debasish Mandal
2022
Cybersecurity for Business_cover
Cybersecurity for Business
Larry Clinton
2022
Enterprise Cybersecurity in Digital Business_cover
Enterprise Cybersecurity in Digital Business
Ariel Evans
2022
DevOps y seguridad cloud_cover
DevOps y seguridad cloud
Guijarro Olivares, Jordi, Caparrós Ramírez, Joan, Cubero Luque, Lorenzo
2019
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Examining Political Violence_cover
Examining Political Violence
David Lowe, Austin Turk, Dilip K. Das
2013
The Web Application Hacker's Handbook_cover
The Web Application Hacker's Handbook
Dafydd Stuttard, Marcus Pinto
2011
Understanding the Digital World_cover
Understanding the Digital World
Brian W. Kernighan
2021
FinTech_cover
FinTech
Parag Y Arjunwadkar
2018
Social Engineering_cover
Social Engineering
Christopher Hadnagy
2018
Information Security_cover
Information Security
Mark Stamp
2021
The Decision to Attack_cover
The Decision to Attack
Aaron Franklin Brantly
2016
Spring Boot in Action_cover
Spring Boot in Action
Craig Walls
2015
Measuring and Managing Information Risk_cover
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
J. Morris Chang, Di Zhuang, G. Dumindu Samaraweera
2023
Computational Intelligence for Cybersecurity Management and Applications_cover
Computational Intelligence for Cybersecurity Management and Applications
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
2023
Cloud Auditing Best Practices_cover
Cloud Auditing Best Practices
Shinesa Cambric, Michael Ratemo
2023
Cybersecurity in Intelligent Networking Systems_cover
Cybersecurity in Intelligent Networking Systems
Shengjie Xu, Yi Qian, Rose Qingyang Hu
2022
Security and Privacy Trends in Cloud Computing and Big Data_cover
Security and Privacy Trends in Cloud Computing and Big Data
Muhammad Imran Tariq, Valentina Emilia Balas, Shahzadi Tayyaba
2022
Practical Industrial Cybersecurity_cover
Practical Industrial Cybersecurity
Charles J. Brooks, Philip A. Craig
2022
Cloud Security Handbook_cover
Cloud Security Handbook
Eyal Estrin
2022
Cyber Security and Network Security_cover
Cyber Security and Network Security
Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha
2022
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Cynthia Brumfield, Brian Haugli
2021
Industrial Cybersecurity_cover
Industrial Cybersecurity
Pascal Ackerman
2021
Ransomware Protection Playbook_cover
Ransomware Protection Playbook
Roger A. Grimes
2021
Distributed Denial of Service Attacks_cover
Distributed Denial of Service Attacks
Rajeev Singh, Mangey Ram
2021
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests_cover
OCP Oracle Certified Professional Java SE 11 Developer Practice Tests
Scott Selikoff, Jeanne Boyarsky
2021
Nuevos espacios de seguridad nacional_cover
Nuevos espacios de seguridad nacional
Dr. Cristian Barria Huidobro
2020
Social Network Analysis and Law Enforcement_cover
Social Network Analysis and Law Enforcement
Morgan Burcher
2020
Learning Android Forensics_cover
Learning Android Forensics
Oleg Skulkin, Donnie Tindall, Rohit Tamma
2018
Hands-On Security in DevOps_cover
Hands-On Security in DevOps
Tony Hsu
2018
Publicado recientemente
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
J. Morris Chang, Di Zhuang, G. Dumindu Samaraweera
2023
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Multi-Cloud Administration Guide_cover
Multi-Cloud Administration Guide
Jeroen Mulder
2023
Reaching Your New Digital Heights_cover
Reaching Your New Digital Heights
David W. Wang
2023
Kali Linux Hacking-Tools für Dummies_cover
Kali Linux Hacking-Tools für Dummies
Felix Alexa, Konstantin Goretzki, Tobias Scheible
2023
Deep Dive_cover
Deep Dive
Rae L. Baker
2023
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Riding the Wave_cover
Riding the Wave
Andrew Boyarsky
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Microsoft 365 Security and Compliance for Administrators_cover
Microsoft 365 Security and Compliance for Administrators
Sasha Kranjac, Omar Kudović
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Europrivacy™/®_cover
Europrivacy™/®
Alice Turley
2024
Artificial Intelligence for Cyber Defense and Smart Policing_cover
Artificial Intelligence for Cyber Defense and Smart Policing
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
2024
Security-Driven Software Development_cover
Security-Driven Software Development
Aspen Olmsted
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Stepping Through Cybersecurity Risk Management_cover
Stepping Through Cybersecurity Risk Management
Jennifer L. Bayuk
2024
Why CISOs Fail_cover
Why CISOs Fail
Barak Engel
2024
The Cybersecurity Guide to Governance, Risk, and Compliance_cover
The Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver
2024
Personal Identification_cover
Personal Identification
David J. Haas
2024
Understand the Cyber Attacker Mindset_cover
Understand the Cyber Attacker Mindset
Sarah Armstrong-Smith
2024
Mastering Network Forensics_cover
Mastering Network Forensics
Nipun Jaswal
2024
PCI DSS Version 4.0_cover
PCI DSS Version 4.0
Stephen Hancock
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Digital Dreams Have Become Nightmares_cover
Digital Dreams Have Become Nightmares
Ronald M. Baecker
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cloud Forensics Demystified_cover
Cloud Forensics Demystified
Ganesh Ramakrishnan, Mansoor Haqanee
2024
Digitale Selbstverteidigung für Dummies_cover
Digitale Selbstverteidigung für Dummies
Christina Czeschik
2024
ISC2 Certified Cloud Security Professional Exam Guide_cover
ISC2 Certified Cloud Security Professional Exam Guide
Kim van Lavieren
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Blockchain and Machine Learning for IoT Security_cover
Blockchain and Machine Learning for IoT Security
Mourade Azrour, Jamal Mabrouki, Azidine Guezzaz, Said Benkirane
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Nichts gegen eine Million – die wahre Geschichte eines Online-Betrugs_cover
Nichts gegen eine Million – die wahre Geschichte eines Online-Betrugs
Ruth Van de Gaer Sturzenegger
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Meine digitale Sicherheit für Dummies_cover
Meine digitale Sicherheit für Dummies
Matteo Grosse-Kampmann, Chris Wojzechowski
2024
Deterrence in the 21st Century_cover
Deterrence in the 21st Century
Eric Ouellet, Madeleine D'Agata, Keith Stewart
2024
Global Digital Data Governance_cover
Global Digital Data Governance
Carolina Aguerre, Malcolm Campbell-Verduyn, Jan Aart Scholte
2024
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
Fighting Phishing_cover
Fighting Phishing
Roger A. Grimes
2024
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Ethical Hacking and Network Analysis with Wireshark_cover
Ethical Hacking and Network Analysis with Wireshark
Manish Sharma
2024
See Yourself in Cyber_cover
See Yourself in Cyber
Ed Adams
2024
Añadido recientemente
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Microsoft 365 Security and Compliance for Administrators_cover
Microsoft 365 Security and Compliance for Administrators
Sasha Kranjac, Omar Kudović
2024
Riding the Wave_cover
Riding the Wave
Andrew Boyarsky
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Europrivacy™/®_cover
Europrivacy™/®
Alice Turley
2024
Security-Driven Software Development_cover
Security-Driven Software Development
Aspen Olmsted
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Artificial Intelligence for Cyber Defense and Smart Policing_cover
Artificial Intelligence for Cyber Defense and Smart Policing
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Stepping Through Cybersecurity Risk Management_cover
Stepping Through Cybersecurity Risk Management
Jennifer L. Bayuk
2024
Mastering Network Forensics_cover
Mastering Network Forensics
Nipun Jaswal
2024
ISC2 Certified Cloud Security Professional Exam Guide_cover
ISC2 Certified Cloud Security Professional Exam Guide
Kim van Lavieren
2024
The Cybersecurity Guide to Governance, Risk, and Compliance_cover
The Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver
2024
Understand the Cyber Attacker Mindset_cover
Understand the Cyber Attacker Mindset
Sarah Armstrong-Smith
2024
Cloud Forensics Demystified_cover
Cloud Forensics Demystified
Ganesh Ramakrishnan, Mansoor Haqanee
2024
Why CISOs Fail_cover
Why CISOs Fail
Barak Engel
2024
Personal Identification_cover
Personal Identification
David J. Haas
2024
PCI DSS Version 4.0_cover
PCI DSS Version 4.0
Stephen Hancock
2024
Digitale Selbstverteidigung für Dummies_cover
Digitale Selbstverteidigung für Dummies
Christina Czeschik
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Digital Dreams Have Become Nightmares_cover
Digital Dreams Have Become Nightmares
Ronald M. Baecker
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Multi-Cloud Administration Guide_cover
Multi-Cloud Administration Guide
Jeroen Mulder
2023
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
Reaching Your New Digital Heights_cover
Reaching Your New Digital Heights
David W. Wang
2023
How to Measure Anything in Cybersecurity Risk_cover
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard, Richard Seiersen
2016
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2017
CASP CompTIA Advanced Security Practitioner Study Guide_cover
CASP CompTIA Advanced Security Practitioner Study Guide
Michael Gregg
2014
Network Security Bible_cover
Network Security Bible
Eric Cole
2009
Cryptography Engineering_cover
Cryptography Engineering
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
2012
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
Security Engineering_cover
Security Engineering
Ross J. Anderson
2010
Homeland Security and Critical Infrastructure Protection_cover
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Introduction to Cybercrime_cover
Introduction to Cybercrime
Joshua B. Hill, Nancy E. Marion
2016
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
J. Morris Chang, Di Zhuang, G. Dumindu Samaraweera
2023
Kali Linux Hacking-Tools für Dummies_cover
Kali Linux Hacking-Tools für Dummies
Felix Alexa, Konstantin Goretzki, Tobias Scheible
2023
Computational Intelligence for Cybersecurity Management and Applications_cover
Computational Intelligence for Cybersecurity Management and Applications
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
2023