Más popular en Perlego
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2022
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
The Official2 CISSP CBK Reference_cover
The Official2 CISSP CBK Reference
Arthur J. Deane, Aaron Kraus
2021
Hands-On Machine Learning for Cybersecurity_cover
Hands-On Machine Learning for Cybersecurity
Soma Halder, Sinan Ozdemir
2018
Un fantasma en el sistema_cover
Un fantasma en el sistema
Kevin Mitnick, William L. Simon
2020
Cybersecurity in Smart Homes_cover
Cybersecurity in Smart Homes
Rida Khatoun
2022
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
Learning iOS Penetration Testing_cover
Learning iOS Penetration Testing
Swaroop Yermalkar
2016
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
CASP+ CompTIA Advanced Security Practitioner Study Guide_cover
CASP+ CompTIA Advanced Security Practitioner Study Guide
Jeff T. Parker, Michael Gregg
2019
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg
2023
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
DevOps y seguridad cloud_cover
DevOps y seguridad cloud
Guijarro Olivares, Jordi, Caparrós Ramírez, Joan, Cubero Luque, Lorenzo
2019
Learn Wireshark_cover
Learn Wireshark
Lisa Bock
2022
Cybersecurity Public Policy_cover
Cybersecurity Public Policy
Bradley Fowler, Kennedy Maranga
2022
Practical Cyber Threat Intelligence_cover
Practical Cyber Threat Intelligence
Dr. Erdal Ozkaya
2022
Cybersecurity for Business_cover
Cybersecurity for Business
Larry Clinton
2022
Enterprise Cybersecurity in Digital Business_cover
Enterprise Cybersecurity in Digital Business
Ariel Evans
2022
Social Engineering_cover
Social Engineering
Christopher Hadnagy
2018
Spring Boot in Action_cover
Spring Boot in Action
Craig Walls
2015
Hacking ético_cover
Hacking ético
Luis Herrero
2023
ISO27001/ISO27002: Una guía de bolsillo_cover
ISO27001/ISO27002: Una guía de bolsillo
Alan Calder
2017
Information Security_cover
Information Security
Mark Stamp
2021
CompTIA Security+: SY0-601 Certification Guide_cover
CompTIA Security+: SY0-601 Certification Guide
Ian Neil
2020
Blockchain Technology_cover
Blockchain Technology
E. Golden Julie, J. Jesu Vedha Nayahi, Noor Zaman Jhanjhi
2020
Secure, Resilient, and Agile Software Development_cover
Secure, Resilient, and Agile Software Development
Mark Merkow
2019
Strategic Security Management_cover
Strategic Security Management
Karim Vellani
2019
Blockchain and the Law_cover
Blockchain and the Law
Primavera De Filippi, Aaron Wright
2018
The Decision to Attack_cover
The Decision to Attack
Aaron Franklin Brantly
2016
Measuring and Managing Information Risk_cover
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
Building Robots With Lego Mindstorms_cover
Building Robots With Lego Mindstorms
Mario Ferrari, Guilio Ferrari
2001
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2024
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
ISO 27001/ISO 27002_cover
ISO 27001/ISO 27002
Alan Calder
2023
The Art of Social Engineering_cover
The Art of Social Engineering
Cesar Bravo, Desilda Toska
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
J. Morris Chang, Di Zhuang, G. Dumindu Samaraweera
2023
Deep Dive_cover
Deep Dive
Rae L. Baker
2023
Computational Intelligence for Cybersecurity Management and Applications_cover
Computational Intelligence for Cybersecurity Management and Applications
Yassine Maleh, Mamoun Alazab, Soufyane Mounir
2023
PCI Compliance_cover
PCI Compliance
Branden R Williams, James Adamson
2022
Cybersecurity in Intelligent Networking Systems_cover
Cybersecurity in Intelligent Networking Systems
Shengjie Xu, Yi Qian, Rose Qingyang Hu
2022
Executive's Guide to Cyber Risk_cover
Executive's Guide to Cyber Risk
Siegfried Moyo
2022
Una guía de seguridad cibernética_cover
Una guía de seguridad cibernética
Dr. Scott Mitnick
2022
Practical Industrial Cybersecurity_cover
Practical Industrial Cybersecurity
Charles J. Brooks, Philip A. Craig, Jr.
2022
Mastering Cyber Intelligence_cover
Mastering Cyber Intelligence
Jean Nestor M. Dahj
2022
Cloud Security Handbook_cover
Cloud Security Handbook
Eyal Estrin
2022
Zero Trust Security_cover
Zero Trust Security
Nike Andravous
2022
Publicado recientemente
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2024
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
ISO 27001/ISO 27002_cover
ISO 27001/ISO 27002
Alan Calder
2023
The Art of Social Engineering_cover
The Art of Social Engineering
Cesar Bravo, Desilda Toska
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023
CompTIA Security+ Practice Tests_cover
CompTIA Security+ Practice Tests
David Seidl
2023
Ciberseguridad IoT y su aplicación en ciudades inteligentes_cover
Ciberseguridad IoT y su aplicación en ciudades inteligentes
ENRIQUE VILLA, ISMAEL MORALES
2023
The Shortest Hour_cover
The Shortest Hour
Lee Parrish
2024
Performance Analysis of Cooperative Networking with Multi Channels_cover
Performance Analysis of Cooperative Networking with Multi Channels
Praveen Kumar Devulapalli, Sushanth Babu Maganti, Pardhasaradhi Pokkunuri
2024
Zabbix 7 IT Infrastructure Monitoring Cookbook_cover
Zabbix 7 IT Infrastructure Monitoring Cookbook
Nathan Liefting, Brian van Baekel
2024
Elternratgeber: Sicher im Netz für Dummies_cover
Elternratgeber: Sicher im Netz für Dummies
Markus Widl
2024
Bio-Inspired Computational Paradigms_cover
Bio-Inspired Computational Paradigms
2024
Introduction to Kali Purple_cover
Introduction to Kali Purple
Karl Lane
2024
Bug Bounty from Scratch_cover
Bug Bounty from Scratch
Francisco Javier Santiago Vázquez
2024
API Security for White Hat Hackers_cover
API Security for White Hat Hackers
Confidence Staveley
2024
Spring Security_cover
Spring Security
Badr Nasslahsen
2024
Malware Development for Ethical Hackers_cover
Malware Development for Ethical Hackers
Zhassulan Zhussupov
2024
Automating Security Detection Engineering_cover
Automating Security Detection Engineering
Dennis Chow
2024
Social Engineering in Cybersecurity_cover
Social Engineering in Cybersecurity
2024
Cyber Warfare_cover
Cyber Warfare
Paul J. Springer
2024
CISSP For Dummies_cover
CISSP For Dummies
Lawrence C. Miller, Peter H. Gregory
2024
The Adoption of Fintech_cover
The Adoption of Fintech
2024
Cybersecurity_cover
Cybersecurity
Kevin Lore
2024
Ubiquitous and Transparent Security_cover
Ubiquitous and Transparent Security
2024
The Reign of Botnets_cover
The Reign of Botnets
David Senecal
2024
Feminist Cyberlaw_cover
Feminist Cyberlaw
2024
Cybersecurity Strategies and Best Practices_cover
Cybersecurity Strategies and Best Practices
Milad Aslaner
2024
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
Srinivasa Rao Aravilli
2024
Critical Infrastructure Security_cover
Critical Infrastructure Security
Soledad Antelada Toledano
2024
Endpoint Detection and Response Essentials_cover
Endpoint Detection and Response Essentials
Guven Boyraz
2024
HACKING_cover
HACKING
FERNANDO CASTILLO
2024
Implementing Palo Alto Networks Prisma® Access_cover
Implementing Palo Alto Networks Prisma® Access
Tom Piens Aka 'Reaper'
2024
Hands-On Ethical Hacking Tactics_cover
Hands-On Ethical Hacking Tactics
Shane Hartman
2024
The Comprehensive Guide to Cybersecurity Careers_cover
The Comprehensive Guide to Cybersecurity Careers
Jason Edwards
2024
The Comprehensive Guide to Cybersecurity Hiring_cover
The Comprehensive Guide to Cybersecurity Hiring
Jason Edwards
2024
Ultimate Pentesting for Web Applications_cover
Ultimate Pentesting for Web Applications
Dr. Rohit Gautam, Dr. Shifa Cyclewala
2024
Combatting Cyber Terrorism_cover
Combatting Cyber Terrorism
Richard Bingley
2024
The Code of Honor_cover
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
A CISO Guide to Cyber Resilience_cover
A CISO Guide to Cyber Resilience
Debra Baker
2024
Unveiling the NIST Risk Management Framework_cover
Unveiling the NIST Risk Management Framework
Thomas Marsland
2024
Añadido recientemente
The Shortest Hour_cover
The Shortest Hour
Lee Parrish
2024
Performance Analysis of Cooperative Networking with Multi Channels_cover
Performance Analysis of Cooperative Networking with Multi Channels
Praveen Kumar Devulapalli, Sushanth Babu Maganti, Pardhasaradhi Pokkunuri
2024
Zabbix 7 IT Infrastructure Monitoring Cookbook_cover
Zabbix 7 IT Infrastructure Monitoring Cookbook
Nathan Liefting, Brian van Baekel
2024
Elternratgeber: Sicher im Netz für Dummies_cover
Elternratgeber: Sicher im Netz für Dummies
Markus Widl
2024
Introduction to Security_cover
Introduction to Security
Robert Fischer, Edward Halibozek
2008
Cyber Warfare_cover
Cyber Warfare
Paul J. Springer
2024
Bio-Inspired Computational Paradigms_cover
Bio-Inspired Computational Paradigms
2024
Social Engineering in Cybersecurity_cover
Social Engineering in Cybersecurity
2024
CISSP For Dummies_cover
CISSP For Dummies
Lawrence C. Miller, Peter H. Gregory
2024
The Adoption of Fintech_cover
The Adoption of Fintech
2024
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2024
The Reign of Botnets_cover
The Reign of Botnets
David Senecal
2024
Feminist Cyberlaw_cover
Feminist Cyberlaw
2024
Ubiquitous and Transparent Security_cover
Ubiquitous and Transparent Security
2024
Privacy-Preserving Machine Learning_cover
Privacy-Preserving Machine Learning
Srinivasa Rao Aravilli
2024
Critical Infrastructure Security_cover
Critical Infrastructure Security
Soledad Antelada Toledano
2024
Cybersecurity Strategies and Best Practices_cover
Cybersecurity Strategies and Best Practices
Milad Aslaner
2024
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Criminal Investigation for the Professional Investigator_cover
Criminal Investigation for the Professional Investigator
BCPI, CLI, Warren J. Sonne
2006
Cybersecurity for Industrial Control Systems_cover
Cybersecurity for Industrial Control Systems
Tyson Macaulay, Bryan L. Singer
2016
The Practical Guide to HIPAA Privacy and Security Compliance_cover
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Business Continuity Planning_cover
Business Continuity Planning
Ralph L. Kliem, Gregg D. Richie
2015
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Police Corruption_cover
Police Corruption
Tim Prenzler
2009
Handbook of Applied Cryptography_cover
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Virtuous Policing_cover
Virtuous Policing
David G. Bolgiano, L. Morgan Banks, III, James M. Patterson
2017
Tradecraft Primer_cover
Tradecraft Primer
Paul Charles Topalian
2017
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Counterterrorism_cover
Counterterrorism
Benoît Gomis
2015
Homeland Security and Private Sector Business_cover
Homeland Security and Private Sector Business
Chi-Jen Lee, Cheng-Hsiung Lu, Lucia H. Lee
2014
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
CompTIA Security+ Practice Tests_cover
CompTIA Security+ Practice Tests
David Seidl
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
ISO 27001/ISO 27002_cover
ISO 27001/ISO 27002
Alan Calder
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
The Art of Social Engineering_cover
The Art of Social Engineering
Cesar Bravo, Desilda Toska
2023
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
OPNsense Beginner to Professional_cover
OPNsense Beginner to Professional
Julio Cesar Bueno de Camargo
2022
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg
2023
Cyber Security Using Modern Technologies_cover
Cyber Security Using Modern Technologies
Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam
2023