Les plus populaires sur Perlego
Introduction to Modern Cryptography_cover
Introduction to Modern Cryptography
Jonathan Katz, Yehuda Lindell
2020
DeFi and the Future of Finance_cover
DeFi and the Future of Finance
Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
2021
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
IAPP CIPP / US Certified Information Privacy Professional Study Guide_cover
IAPP CIPP / US Certified Information Privacy Professional Study Guide
Mike Chapple, Joe Shelley
2021
The Art of Memory Forensics_cover
The Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014
Alice and Bob Learn Application Security_cover
Alice and Bob Learn Application Security
Tanya Janca
2020
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2020
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2023
Building Secure Cars_cover
Building Secure Cars
Dennis Kengo Oka
2021
Rust for Blockchain Application Development_cover
Rust for Blockchain Application Development
Akhil Sharma
2024
Hacking Connected Cars_cover
Hacking Connected Cars
Alissa Knight
2020
Introduction to Coding Theory_cover
Introduction to Coding Theory
Jurgen Bierbrauer
2016
Cryptography Apocalypse_cover
Cryptography Apocalypse
Roger A. Grimes
2019
Tribe of Hackers_cover
Tribe of Hackers
Marcus J. Carey, Jennifer Jin
2019
Tokenomics_cover
Tokenomics
Sean Au, Thomas Power
2018
Communication System Security_cover
Communication System Security
Lidong Chen, Guang Gong
2012
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
The CISO Evolution_cover
The CISO Evolution
Matthew K. Sharp, Kyriakos Lambros
2022
Security and Privacy in Cyber-Physical Systems_cover
Security and Privacy in Cyber-Physical Systems
Houbing Song, Glenn A. Fink, Sabina Jeschke
2017
Archives in the Digital Age_cover
Archives in the Digital Age
Abderrazak Mkadmi
2021
Cryptography_cover
Cryptography
Douglas Robert Stinson, Maura Paterson
2018
Applied Cryptography_cover
Applied Cryptography
Bruce Schneier
2017
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N Parasram
2020
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
An Introduction to Number Theory with Cryptography_cover
An Introduction to Number Theory with Cryptography
James Kraft, Lawrence Washington
2018
Real-World Cryptography_cover
Real-World Cryptography
David Wong
2021
Cybersecurity Fundamentals_cover
Cybersecurity Fundamentals
Kutub Thakur, Al-Sakib Khan Pathan
2020
Hands-On Blockchain with Hyperledger_cover
Hands-On Blockchain with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna
2018
Investigating Cryptocurrencies_cover
Investigating Cryptocurrencies
Nick Furneaux
2018
Cyber Security and IT Infrastructure Protection_cover
Cyber Security and IT Infrastructure Protection
John R. Vacca
2013
An In-Depth Guide to Mobile Device Forensics_cover
An In-Depth Guide to Mobile Device Forensics
Chuck Easttom
2021
Cybersecurity Law_cover
Cybersecurity Law
Davide Mula, Alfonso Contaldo
2020
Cyber Warfare – Truth, Tactics, and Strategies_cover
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
2020
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N Parasram
2017
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2017
Blockchain Development with Hyperledger_cover
Blockchain Development with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
2019
Hands-On Cryptography with Python_cover
Hands-On Cryptography with Python
Samuel Bowne
2018
Practical Cyber Intelligence_cover
Practical Cyber Intelligence
Wilson Bautista
2018
Computer Security Literacy_cover
Computer Security Literacy
Douglas Jacobson, Joseph Idziorek
2016
Tribe of Hackers Security Leaders_cover
Tribe of Hackers Security Leaders
Marcus J. Carey, Jennifer Jin
2020
Cybersecurity Blue Team Toolkit_cover
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
2019
Blockchain for Distributed Systems Security_cover
Blockchain for Distributed Systems Security
Sachin Shetty, Charles A. Kamhoua, Laurent L. Njilla
2019
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2018
Kryptografie für Dummies_cover
Kryptografie für Dummies
Hans Werner Lang
2023
IAPP CIPM Certified Information Privacy Manager Study Guide_cover
IAPP CIPM Certified Information Privacy Manager Study Guide
Mike Chapple, Joe Shelley
2023
Cryptography and Network Security_cover
Cryptography and Network Security
Bhushan Trivedi, Savita Gandhi, Dhiren Pandit
2021
Privilege Escalation Techniques_cover
Privilege Escalation Techniques
Alexis Ahmed
2021
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
SSL/TLS Under Lock and Key_cover
SSL/TLS Under Lock and Key
Paul Baka, Jeremy Schatten
2020
Unsolved!_cover
Unsolved!
Craig P. Bauer
2017
Blockchain Technology and Applications_cover
Blockchain Technology and Applications
Pethuru Raj, Kavita Saini, Chellammal Surianarayanan
2020
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Ultimate Splunk for Cybersecurity_cover
Ultimate Splunk for Cybersecurity
Jit Sinha
2024
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasiński
2023
Publiés récemment
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
Rust for Blockchain Application Development_cover
Rust for Blockchain Application Development
Akhil Sharma
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Ultimate Splunk for Cybersecurity_cover
Ultimate Splunk for Cybersecurity
Jit Sinha
2024
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasiński
2023
Bitcoin Development Philosophy_cover
Bitcoin Development Philosophy
Kalle Rosenbaum, Linnea Rosembaum, Linnéa Rosembaum
2024
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
TLS Cryptography In-Depth_cover
TLS Cryptography In-Depth
Dr. Paul Duplys, Dr. Roland Schmitz
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Decentralizing Finance_cover
Decentralizing Finance
Kenneth Bok
2024
Deploying the Zero Trust Framework in MSFT Azure_cover
Deploying the Zero Trust Framework in MSFT Azure
Ravindra Das
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things_cover
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng-Chi Lee, Mohammad S. Obaidat
2023
Cybersecurity Operations and Fusion Centers_cover
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin
2023
Crypto Taxation in USA_cover
Crypto Taxation in USA
Prashant Thakur
2023
Mobile OS Vulnerabilities_cover
Mobile OS Vulnerabilities
Shivi Garg, Niyati Baliyan
2023
Security-First Compliance for Small Businesses_cover
Security-First Compliance for Small Businesses
Karen Walsh
2023
Ransomware_cover
Ransomware
Ravindra Das
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
See Yourself in Cyber_cover
See Yourself in Cyber
Ed Adams
2024
Ciberseguridad IoT y su aplicación en ciudades inteligentes_cover
Ciberseguridad IoT y su aplicación en ciudades inteligentes
ENRIQUE VILLA, ISMAEL MORALES
2023
Introduction to Blockchain Technology_cover
Introduction to Blockchain Technology
Ahmed Banafa
2023
The Shortest Hour_cover
The Shortest Hour
Lee Parrish
2024
Elternratgeber: Sicher im Netz für Dummies_cover
Elternratgeber: Sicher im Netz für Dummies
Markus Widl
2024
The Reign of Botnets_cover
The Reign of Botnets
David Senecal
2024
HACKING_cover
HACKING
FERNANDO CASTILLO
2024
The Code of Honor_cover
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Meine digitale Sicherheit für Dummies_cover
Meine digitale Sicherheit für Dummies
Matteo Grosse-Kampmann, Chris Wojzechowski
2024
x86 Software Reverse-Engineering, Cracking, and Counter-Measures_cover
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie Domas, Christopher Domas
2024
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Dark World_cover
Dark World
Atif Ali, Muhammad Qasim
2023
Symmetric Cryptography, Volume 2_cover
Symmetric Cryptography, Volume 2
2023
Symmetric Cryptography, Volume 2_cover
Symmetric Cryptography, Volume 2
2023
Ciberseguridad empresarial_cover
Ciberseguridad empresarial
JEIMY CANO
2023
Cyber Resilience in Critical Infrastructure_cover
Cyber Resilience in Critical Infrastructure
Sinan Küfeoğlu, Abdullah Talip Akgün
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Handbook of Formal Analysis and Verification in Cryptography_cover
Handbook of Formal Analysis and Verification in Cryptography
Sedat Akleylek, Besik Dundua
2023
Learn Ethereum._cover
Learn Ethereum.
Xun (Brian) Wu, Zhihong Zou, Dongying Song
2023
Ajoutés récemment
The Shortest Hour_cover
The Shortest Hour
Lee Parrish
2024
Elternratgeber: Sicher im Netz für Dummies_cover
Elternratgeber: Sicher im Netz für Dummies
Markus Widl
2024
Introduction to Blockchain Technology_cover
Introduction to Blockchain Technology
Ahmed Banafa
2023
Quantum Information Theory_cover
Quantum Information Theory
Mark M. Wilde
2017
Bitcoin Development Philosophy_cover
Bitcoin Development Philosophy
Kalle Rosenbaum, Linnea Rosembaum, Linnéa Rosembaum
2024
L'arte della guerra informatica_cover
L'arte della guerra informatica
Jon DiMaggio
L'arte dell'invisibilità_cover
L'arte dell'invisibilità
Kevin D. Mitnick, Robert Vamosi
Il lato oscuro del software_cover
Il lato oscuro del software
Adam Shostack
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Introduction to Computer and Network Security_cover
Introduction to Computer and Network Security
Richard R. Brooks
2013
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
TLS Cryptography In-Depth_cover
TLS Cryptography In-Depth
Dr. Paul Duplys, Dr. Roland Schmitz
2024
Hacking ético_cover
Hacking ético
Luis Herrero
2023
The Auditor's Guide to Blockchain Technology_cover
The Auditor's Guide to Blockchain Technology
Shaun Aghili
2022
Discrete Mathematics With Cryptographic Applications_cover
Discrete Mathematics With Cryptographic Applications
Alexander I. Kheyfits
2021
Network Security and Cryptography_cover
Network Security and Cryptography
Sarhan M. Musa
2018
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Decentralizing Finance_cover
Decentralizing Finance
Kenneth Bok
2024
See Yourself in Cyber_cover
See Yourself in Cyber
Ed Adams
2024
Ultimate Splunk for Cybersecurity_cover
Ultimate Splunk for Cybersecurity
Jit Sinha
2024
Cryptography for Payment Professionals_cover
Cryptography for Payment Professionals
Ilya Dubinsky
2023
Intelligent Mobile Malware Detection_cover
Intelligent Mobile Malware Detection
Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
2022
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasiński
2023
Practical Mathematical Cryptography_cover
Practical Mathematical Cryptography
Kristian Gjøsteen
2022
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Cybersecurity_cover
Cybersecurity
Gautam Kumar, Om Prakash Singh, Hemraj Saini
2021
Ransomware_cover
Ransomware
Ravindra Das
2023
Deploying the Zero Trust Framework in MSFT Azure_cover
Deploying the Zero Trust Framework in MSFT Azure
Ravindra Das
2023
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things_cover
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng-Chi Lee, Mohammad S. Obaidat
2023
Kryptografie für Dummies_cover
Kryptografie für Dummies
Hans Werner Lang
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Blockchain for Real World Applications_cover
Blockchain for Real World Applications
Rishabh Garg
2022
Cybersecurity Operations and Fusion Centers_cover
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin
2023
Crypto Taxation in USA_cover
Crypto Taxation in USA
Prashant Thakur
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Quantum Information Theory_cover
Quantum Information Theory
Mark M. Wilde
2013
Quantum Computing for Computer Scientists_cover
Quantum Computing for Computer Scientists
Noson S. Yanofsky, Mirco A. Mannucci
2008
DeFi and the Future of Finance_cover
DeFi and the Future of Finance
Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
2021
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
Hacking Connected Cars_cover
Hacking Connected Cars
Alissa Knight
2020
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Security-First Compliance for Small Businesses_cover
Security-First Compliance for Small Businesses
Karen Walsh
2023
Empirical Cloud Security_cover
Empirical Cloud Security
Aditya K. Sood
2023
Mobile OS Vulnerabilities_cover
Mobile OS Vulnerabilities
Shivi Garg, Niyati Baliyan
2023
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
Quantum Computing_cover
Quantum Computing
Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Anupam Baliyan, Shalli Rani
2023
Essential Enterprise Blockchain Concepts and Applications_cover
Essential Enterprise Blockchain Concepts and Applications
Kavita Saini, Pethuru Raj Chelliah, Deepak Kumar Saini
2021