Les plus populaires sur Perlego
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
Understanding the Digital World_cover
Understanding the Digital World
Brian W. Kernighan
2021
Private Security_cover
Private Security
Charles P. Nemeth
2017
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
The Attention Merchants_cover
The Attention Merchants
Tim Wu
2017
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Learn Computer Forensics_cover
Learn Computer Forensics
William Oettinger
2020
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Information Security Governance_cover
Information Security Governance
Krag Brotby
2009
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Crime Prevention_cover
Crime Prevention
Stephen Schneider
2014
The Official2 CISSP CBK Reference_cover
The Official2 CISSP CBK Reference
Arthur J. Deane, Aaron Kraus
2021
Information Security Governance_cover
Information Security Governance
Andrej Volchkov
2018
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Critical Infrastructure_cover
Critical Infrastructure
Robert S. Radvanovsky, Allan McDougall
2018
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Cybersecurity Program Development for Business_cover
Cybersecurity Program Development for Business
Chris Moschovitis
2018
Data Analytics for Internal Auditors_cover
Data Analytics for Internal Auditors
Richard E. Cascarino
2017
Digital Forensics with Open Source Tools_cover
Digital Forensics with Open Source Tools
Harlan Carvey, Cory Altheide
2011
Handbook of Digital Forensics and Investigation_cover
Handbook of Digital Forensics and Investigation
Eoghan Casey
2009
Secret History_cover
Secret History
Craig Bauer
2021
Cybersecurity Law_cover
Cybersecurity Law
Davide Mula, Alfonso Contaldo
2020
Police Use of Force_cover
Police Use of Force
Michael J. Palmiotto
2016
Cyber Security_cover
Cyber Security
Jeremy Swinfen Green
2016
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
Cybersecurity Leadership Demystified_cover
Cybersecurity Leadership Demystified
Dr. Erdal Ozkaya
2022
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Mastering Windows Security and Hardening_cover
Mastering Windows Security and Hardening
Mark Dunkerley, Matt Tumbarello
2022
Cybersecurity for Business_cover
Cybersecurity for Business
Larry Clinton
2022
The Digital Silk Road_cover
The Digital Silk Road
Jonathan E. Hillman
2021
Acquiring Card Payments_cover
Acquiring Card Payments
Ilya Dubinsky
2019
Critical Infrastructure_cover
Critical Infrastructure
Tyson Macaulay
2008
Cyber Threat Intelligence_cover
Cyber Threat Intelligence
Martin Lee
2023
Mastering Defensive Security_cover
Mastering Defensive Security
Cesar Bravo, Darren Kitchen
2022
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Cynthia Brumfield, Brian Haugli
2021
Incident Response in the Age of Cloud_cover
Incident Response in the Age of Cloud
Dr. Erdal Ozkaya
2021
Practical Internet of Things Security_cover
Practical Internet of Things Security
Brian Russell, Drew Van Duren
2018
Data Science for Cyber-Security_cover
Data Science for Cyber-Security
2018
Understanding the Digital World_cover
Understanding the Digital World
Brian Kernighan
2017
Hands-on Penetration Testing for Web Applications_cover
Hands-on Penetration Testing for Web Applications
Richa Gupta
2021
Soft Target Hardening_cover
Soft Target Hardening
Jennifer Hesterman
2018
Official2 Guide to the HCISPP CBK_cover
Official2 Guide to the HCISPP CBK
Steven Hernandez
2018
Security Engineering_cover
Security Engineering
Ross Anderson
2020
Computer Security_cover
Computer Security
Dieter Gollmann
2011
Cybersecurity Essentials_cover
Cybersecurity Essentials
Charles J. Brooks, Christopher Grow, Philip A. Craig, Donald Short
2018
The Practical Guide to HIPAA Privacy and Security Compliance_cover
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
The Art of Memory Forensics_cover
The Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Research Methods for Cyber Security_cover
Research Methods for Cyber Security
Thomas W. Edgar, David O. Manz
2017
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Data-Driven Security_cover
Data-Driven Security
Jay Jacobs, Bob Rudis
2014
Gangs and Organized Crime_cover
Gangs and Organized Crime
George W. Knox, Gregg Etter, Carter F. Smith
2018
Implementing Information Security in Healthcare_cover
Implementing Information Security in Healthcare
Terrell Herzig, Tom Walsh
2020
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2020
Blockchain and the Law_cover
Blockchain and the Law
Primavera De Filippi, Aaron Wright
2018
Microsoft Windows Security Essentials_cover
Microsoft Windows Security Essentials
Darril Gibson
2011
Operating System Security_cover
Operating System Security
Trent Jaeger
2022
Publiés récemment
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Practical Threat Detection Engineering_cover
Practical Threat Detection Engineering
Megan Roddie, Jason Deyalsingh, Gary J. Katz
2023
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
The DevSecOps Playbook_cover
The DevSecOps Playbook
Sean D. Mack
2023
Okta Administration Up and Running_cover
Okta Administration Up and Running
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Security Orchestration, Automation, and Response for Security Analysts_cover
Security Orchestration, Automation, and Response for Security Analysts
Benjamin Kovacevic, Nicholas DiCola
2023
Malware Science_cover
Malware Science
Shane Molinari
2023
Enhancing IoT Security_cover
Enhancing IoT Security
Vidushi Sharma, Gamini Joshi
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Security and Risk Analysis for Intelligent Cloud Computing_cover
Security and Risk Analysis for Intelligent Cloud Computing
Ajay Kumar, Sangeeta Rani, Sarita Rathee, Surbhi Bhatia
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Cloud Penetration Testing for Red Teamers_cover
Cloud Penetration Testing for Red Teamers
Kim Crawley
2023
The Language of Deception_cover
The Language of Deception
Justin Hutchens
2023
Ethical Hacking Workshop_cover
Ethical Hacking Workshop
Rishalin Pillay, Mohammed Abutheraa
2023
Zero Trust Overview and Playbook Introduction_cover
Zero Trust Overview and Playbook Introduction
Mark Simos, Nikhil Kumar
2023
Windows Forensics Analyst Field Guide_cover
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasiński
2023
Confident Cyber Security_cover
Confident Cyber Security
Jessica Barker
2023
Implementing Multifactor Authentication_cover
Implementing Multifactor Authentication
Marco Fanti
2023
The Active Defender_cover
The Active Defender
Catherine J. Ullman
2023
Python for Security and Networking_cover
Python for Security and Networking
José Ortega
2023
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Ultimate Penetration Testing with Nmap_cover
Ultimate Penetration Testing with Nmap
Travis DeForge
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
From Exposed to Secure_cover
From Exposed to Secure
Featuring Cybersecurity And Compliance Experts From Around The World Featuring Cybersecurity And Compliance Experts From Around The World
2024
Artificial Intelligence for Cyber Defense and Smart Policing_cover
Artificial Intelligence for Cyber Defense and Smart Policing
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Why CISOs Fail_cover
Why CISOs Fail
Barak Engel
2024
The Cybersecurity Guide to Governance, Risk, and Compliance_cover
The Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver
2024
Mastering Secure Java Applications_cover
Mastering Secure Java Applications
Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar
2024
Mastering Network Forensics_cover
Mastering Network Forensics
Nipun Jaswal
2024
PCI DSS Version 4.0_cover
PCI DSS Version 4.0
Stephen Hancock
2024
Digitale Selbstverteidigung für Dummies_cover
Digitale Selbstverteidigung für Dummies
Christina Czeschik
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Deterrence in the 21st Century_cover
Deterrence in the 21st Century
Eric Ouellet, Madeleine D'Agata, Keith Stewart
2024
Fighting Phishing_cover
Fighting Phishing
Roger A. Grimes
2024
Ethical Hacking and Network Analysis with Wireshark_cover
Ethical Hacking and Network Analysis with Wireshark
Manish Sharma
2024
Becoming a Computational Thinker_cover
Becoming a Computational Thinker
Paul S Wang
2024
Ransomware_cover
Ransomware
Ravindra Das
2023
Ajoutés récemment
L'arte della guerra informatica_cover
L'arte della guerra informatica
Jon DiMaggio
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Criminal Investigation for the Professional Investigator_cover
Criminal Investigation for the Professional Investigator
BCPI, CLI, Warren J. Sonne
2006
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Official2 Guide to the HCISPP CBK_cover
Official2 Guide to the HCISPP CBK
Steven Hernandez
2018
The Practical Guide to HIPAA Privacy and Security Compliance_cover
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Police Corruption_cover
Police Corruption
Tim Prenzler
2009
Business Continuity Planning_cover
Business Continuity Planning
Ralph L. Kliem, Gregg D. Richie
2015
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Handbook of Applied Cryptography_cover
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Tradecraft Primer_cover
Tradecraft Primer
Paul Charles Topalian
2017
Counterterrorism_cover
Counterterrorism
Benoît Gomis
2015
Virtuous Policing_cover
Virtuous Policing
David G. Bolgiano, L. Morgan Banks, III, James M. Patterson
2017
Homeland Security and Private Sector Business_cover
Homeland Security and Private Sector Business
Chi-Jen Lee, Cheng-Hsiung Lu, Lucia H. Lee
2014
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
Agile Audit Transformation and Beyond_cover
Agile Audit Transformation and Beyond
Toby DeRoche
2022
Okta Administration Up and Running_cover
Okta Administration Up and Running
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Malware Science_cover
Malware Science
Shane Molinari
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Security and Risk Analysis for Intelligent Cloud Computing_cover
Security and Risk Analysis for Intelligent Cloud Computing
Ajay Kumar, Sangeeta Rani, Sarita Rathee, Surbhi Bhatia
2023
Cloud Penetration Testing for Red Teamers_cover
Cloud Penetration Testing for Red Teamers
Kim Crawley
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
The Language of Deception_cover
The Language of Deception
Justin Hutchens
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Enhancing IoT Security_cover
Enhancing IoT Security
Vidushi Sharma, Gamini Joshi
2023
Ethical Hacking Workshop_cover
Ethical Hacking Workshop
Rishalin Pillay, Mohammed Abutheraa
2023
Zero Trust Overview and Playbook Introduction_cover
Zero Trust Overview and Playbook Introduction
Mark Simos, Nikhil Kumar
2023
Windows Forensics Analyst Field Guide_cover
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
Building and Automating Penetration Testing Labs in the Cloud_cover
Building and Automating Penetration Testing Labs in the Cloud
Joshua Arvin Lat
2023
The DevSecOps Playbook_cover
The DevSecOps Playbook
Sean D. Mack
2023
Windows Forensic Analysis DVD Toolkit_cover
Windows Forensic Analysis DVD Toolkit
Harlan Carvey
2009
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
The Ultimate Kali Linux Book_cover
The Ultimate Kali Linux Book
Glen D. Singh
2022
ISO/IEC 27001:2022_cover
ISO/IEC 27001:2022
Steve Watkins
2022
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Practical Threat Detection Engineering_cover
Practical Threat Detection Engineering
Megan Roddie, Jason Deyalsingh, Gary J. Katz
2023
Security Orchestration, Automation, and Response for Security Analysts_cover
Security Orchestration, Automation, and Response for Security Analysts
Benjamin Kovacevic, Nicholas DiCola
2023
Mastering Microsoft 365 Defender_cover
Mastering Microsoft 365 Defender
Ru Campbell, Viktor Hedberg, Heike Ritter
2023
9/11 and the Future of Transportation Security_cover
9/11 and the Future of Transportation Security
R. William Johnstone
2006
Network Security Bible_cover
Network Security Bible
Eric Cole
2009
Cryptography Engineering_cover
Cryptography Engineering
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
2012
Homeland Security and Critical Infrastructure Protection_cover
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
Library Patrons' Privacy_cover
Library Patrons' Privacy
Sandra J. Valenti, Brady D. Lund, Matthew A. Beckstrom
2022
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
Introduction to Cybercrime_cover
Introduction to Cybercrime
Joshua B. Hill, Nancy E. Marion
2016