I più letti su Perlego
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
Introduction to Modern Cryptography_cover
Introduction to Modern Cryptography
Jonathan Katz, Yehuda Lindell
2020
DeFi and the Future of Finance_cover
DeFi and the Future of Finance
Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
2021
Cybersecurity Law_cover
Cybersecurity Law
Davide Mula, Alfonso Contaldo
2020
CISM Certified Information Security Manager Study Guide_cover
CISM Certified Information Security Manager Study Guide
Mike Chapple
2022
Building Secure Cars_cover
Building Secure Cars
Dennis Kengo Oka
2021
Data Science for Cyber-Security_cover
Data Science for Cyber-Security
2018
The Art of Memory Forensics_cover
The Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2020
Alice and Bob Learn Application Security_cover
Alice and Bob Learn Application Security
Tanya Janca
2020
Cybersecurity Fundamentals_cover
Cybersecurity Fundamentals
Kutub Thakur, Al-Sakib Khan Pathan
2020
Tribe of Hackers_cover
Tribe of Hackers
Marcus J. Carey, Jennifer Jin
2019
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2023
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
Communication System Security_cover
Communication System Security
Lidong Chen, Guang Gong
2012
IAPP CIPP / US Certified Information Privacy Professional Study Guide_cover
IAPP CIPP / US Certified Information Privacy Professional Study Guide
Mike Chapple, Joe Shelley
2021
Cryptography Apocalypse_cover
Cryptography Apocalypse
Roger A. Grimes
2019
Security and Privacy in Cyber-Physical Systems_cover
Security and Privacy in Cyber-Physical Systems
Houbing Song, Glenn A. Fink, Sabina Jeschke
2017
Introduction to Coding Theory_cover
Introduction to Coding Theory
Jurgen Bierbrauer
2016
Archives in the Digital Age_cover
Archives in the Digital Age
Abderrazak Mkadmi
2021
Cryptography_cover
Cryptography
Douglas Robert Stinson, Maura Paterson
2018
Applied Cryptography_cover
Applied Cryptography
Bruce Schneier
2017
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N Parasram
2020
An Introduction to Number Theory with Cryptography_cover
An Introduction to Number Theory with Cryptography
James Kraft, Lawrence Washington
2018
Real-World Cryptography_cover
Real-World Cryptography
David Wong
2021
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2017
Cybersecurity Blue Team Toolkit_cover
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
2019
Investigating Cryptocurrencies_cover
Investigating Cryptocurrencies
Nick Furneaux
2018
Blockchain Development with Hyperledger_cover
Blockchain Development with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
2019
Hands-On Cryptography with Python_cover
Hands-On Cryptography with Python
Samuel Bowne
2018
Cyber Security and IT Infrastructure Protection_cover
Cyber Security and IT Infrastructure Protection
John R. Vacca
2013
Tribe of Hackers Security Leaders_cover
Tribe of Hackers Security Leaders
Marcus J. Carey, Jennifer Jin
2020
Computer Security Literacy_cover
Computer Security Literacy
Douglas Jacobson, Joseph Idziorek
2016
An In-Depth Guide to Mobile Device Forensics_cover
An In-Depth Guide to Mobile Device Forensics
Chuck Easttom
2021
Cyber Warfare – Truth, Tactics, and Strategies_cover
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
2020
Blockchain for Distributed Systems Security_cover
Blockchain for Distributed Systems Security
Sachin Shetty, Charles A. Kamhoua, Laurent L. Njilla
2019
Hands-On Blockchain with Hyperledger_cover
Hands-On Blockchain with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna
2018
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2018
Practical Cyber Intelligence_cover
Practical Cyber Intelligence
Wilson Bautista
2018
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N Parasram
2017
The CISO Evolution_cover
The CISO Evolution
Matthew K. Sharp, Kyriakos Lambros
2022
IAPP CIPM Certified Information Privacy Manager Study Guide_cover
IAPP CIPM Certified Information Privacy Manager Study Guide
Mike Chapple, Joe Shelley
2023
Tokenomics_cover
Tokenomics
Sean Au, Thomas Power
2018
Cryptography For Dummies_cover
Cryptography For Dummies
Chey Cobb
2004
Blockchain für Dummies_cover
Blockchain für Dummies
Tiana Laurence
2019
Cryptography Algorithms_cover
Cryptography Algorithms
Massimo Bertaccini
2022
Privilege Escalation Techniques_cover
Privilege Escalation Techniques
Alexis Ahmed
2021
Cryptography and Network Security_cover
Cryptography and Network Security
Bhushan Trivedi, Savita Gandhi, Dhiren Pandit
2021
Cybersecurity Attacks – Red Team Strategies_cover
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
2020
Unsolved!_cover
Unsolved!
Craig P. Bauer
2017
AI-Based Metaheuristics for Information Security and Digital Media_cover
AI-Based Metaheuristics for Information Security and Digital Media
Apoorva S Shastri, Mangal Singh, Anand J. Kulkarni, Patrick Siarry
2023
Cybersecurity Blue Team Strategies_cover
Cybersecurity Blue Team Strategies
Kunal Sehgal, Nikolaos Thymianis
2023
Hack the Cybersecurity Interview_cover
Hack the Cybersecurity Interview
Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
2022
Penetration Testing for Jobseekers_cover
Penetration Testing for Jobseekers
Debasish Mandal
2022
Understanding Blockchain and Cryptocurrencies_cover
Understanding Blockchain and Cryptocurrencies
Akira Summers
2022
Essential Cryptography for JavaScript Developers_cover
Essential Cryptography for JavaScript Developers
Alessandro Segala
2022
SSL/TLS Under Lock and Key_cover
SSL/TLS Under Lock and Key
Paul Baka, Jeremy Schatten
2020
Blockchain Development for Finance Projects_cover
Blockchain Development for Finance Projects
Ishan Roy
2020
Providing Sound Foundations for Cryptography_cover
Providing Sound Foundations for Cryptography
Oded Goldreich
2019
Pubblicati di recente
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
AI-Based Metaheuristics for Information Security and Digital Media_cover
AI-Based Metaheuristics for Information Security and Digital Media
Apoorva S Shastri, Mangal Singh, Anand J. Kulkarni, Patrick Siarry
2023
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
TLS Cryptography In-Depth_cover
TLS Cryptography In-Depth
Dr. Paul Duplys, Dr. Roland Schmitz
2024
Ultimate Splunk for Cybersecurity_cover
Ultimate Splunk for Cybersecurity
Jit Sinha
2024
Decentralizing Finance_cover
Decentralizing Finance
Kenneth Bok
2024
Ransomware_cover
Ransomware
Ravindra Das
2023
Deploying the Zero Trust Framework in MSFT Azure_cover
Deploying the Zero Trust Framework in MSFT Azure
Ravindra Das
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things_cover
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng-Chi Lee, Mohammad S. Obaidat
2023
Cybersecurity Operations and Fusion Centers_cover
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Attribute-based Encryption (ABE)_cover
Attribute-based Encryption (ABE)
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Crypto Taxation in USA_cover
Crypto Taxation in USA
Prashant Thakur
2023
Mobile OS Vulnerabilities_cover
Mobile OS Vulnerabilities
Shivi Garg, Niyati Baliyan
2023
Security-First Compliance for Small Businesses_cover
Security-First Compliance for Small Businesses
Karen Walsh
2023
Quantum Computing_cover
Quantum Computing
Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Anupam Baliyan, Shalli Rani
2023
Empirical Cloud Security_cover
Empirical Cloud Security
Aditya K. Sood
2023
Build Your Own Blockchain In JS_cover
Build Your Own Blockchain In JS
Sankar Srinivasan
2023
Understanding Blockchain_cover
Understanding Blockchain
Sankar Srinivasan
2023
Mettiti al sicuro_cover
Mettiti al sicuro
Gianluca Maggi
2023
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasiński
2023
Kryptografie in der Praxis_cover
Kryptografie in der Praxis
David Wong
2023
Cryptography for Payment Professionals_cover
Cryptography for Payment Professionals
Ilya Dubinsky
2023
The Zero Trust Framework and Privileged Access Management (PAM)_cover
The Zero Trust Framework and Privileged Access Management (PAM)
Ravindra Das
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Meine digitale Sicherheit für Dummies_cover
Meine digitale Sicherheit für Dummies
Matteo Grosse-Kampmann, Chris Wojzechowski
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
See Yourself in Cyber_cover
See Yourself in Cyber
Ed Adams
2024
x86 Software Reverse-Engineering, Cracking, and Counter-Measures_cover
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie Domas, Christopher Domas
2024
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Dark World_cover
Dark World
Atif Ali, Muhammad Qasim
2023
Symmetric Cryptography, Volume 2_cover
Symmetric Cryptography, Volume 2
Christina Boura, Maria Naya-Plasencia
2023
Symmetric Cryptography, Volume 2_cover
Symmetric Cryptography, Volume 2
Christina Boura, Maria Naya-Plasencia
2023
Automated Secure Computing for Next-Generation Systems_cover
Automated Secure Computing for Next-Generation Systems
2023
Cyber Resilience in Critical Infrastructure_cover
Cyber Resilience in Critical Infrastructure
Sinan Küfeoğlu, Abdullah Talip Akgün
2023
Attribute-based Encryption (ABE)_cover
Attribute-based Encryption (ABE)
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Handbook of Formal Analysis and Verification in Cryptography_cover
Handbook of Formal Analysis and Verification in Cryptography
Sedat Akleylek, Besik Dundua
2023
Learn Ethereum._cover
Learn Ethereum.
Xun (Brian) Wu, Zhihong Zou, Dongying Song
2023
Convergence of Blockchain, AI and IoT_cover
Convergence of Blockchain, AI and IoT
B Balamurugan, T Poongodi, M R Manu, S Karthikeyan, Yogesh Sharma
2023
Responsible Graph Neural Networks_cover
Responsible Graph Neural Networks
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Zahir Tari
2023
The Zero Trust Framework_cover
The Zero Trust Framework
Ravindra Das
2023
Hacking ético_cover
Hacking ético
Luis Herrero
2023
Ciberseguridad para niños con minecraft_cover
Ciberseguridad para niños con minecraft
30600
2023
Ingeniería inversa. Curso práctico_cover
Ingeniería inversa. Curso práctico
Cayetano de Juan
2023
Aggiunti di recente
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Hacking ético_cover
Hacking ético
Luis Herrero
2023
The Auditor's Guide to Blockchain Technology_cover
The Auditor's Guide to Blockchain Technology
Shaun Aghili
2022
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
See Yourself in Cyber_cover
See Yourself in Cyber
Ed Adams
2024
Ultimate Splunk for Cybersecurity_cover
Ultimate Splunk for Cybersecurity
Jit Sinha
2024
x86 Software Reverse-Engineering, Cracking, and Counter-Measures_cover
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie Domas, Christopher Domas
2024
Kryptografie in der Praxis_cover
Kryptografie in der Praxis
David Wong
2023
Cryptography for Payment Professionals_cover
Cryptography for Payment Professionals
Ilya Dubinsky
2023
Handbook of Formal Analysis and Verification in Cryptography_cover
Handbook of Formal Analysis and Verification in Cryptography
Sedat Akleylek, Besik Dundua
2023
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasiński
2023
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
The Zero Trust Framework_cover
The Zero Trust Framework
Ravindra Das
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
A Practical Introduction to Enterprise Network and Security Management_cover
A Practical Introduction to Enterprise Network and Security Management
Bongsik Shin
2021
Cybersecurity_cover
Cybersecurity
Gautam Kumar, Om Prakash Singh, Hemraj Saini
2021
Ransomware_cover
Ransomware
Ravindra Das
2023
Symmetric Cryptography, Volume 2_cover
Symmetric Cryptography, Volume 2
Christina Boura, Maria Naya-Plasencia
2023
Deploying the Zero Trust Framework in MSFT Azure_cover
Deploying the Zero Trust Framework in MSFT Azure
Ravindra Das
2023
Dark World_cover
Dark World
Atif Ali, Muhammad Qasim
2023
Learn Ethereum._cover
Learn Ethereum.
Xun (Brian) Wu, Zhihong Zou, Dongying Song
2023
Symmetric Cryptography, Volume 1_cover
Symmetric Cryptography, Volume 1
2023
Symmetric Cryptography, Volume 2_cover
Symmetric Cryptography, Volume 2
Christina Boura, Maria Naya-Plasencia
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Advanced Penetration Testing with Kali Linux_cover
Advanced Penetration Testing with Kali Linux
Ummed Meel
2023
Cyber Resilience in Critical Infrastructure_cover
Cyber Resilience in Critical Infrastructure
Sinan Küfeoğlu, Abdullah Talip Akgün
2023
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things_cover
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng-Chi Lee, Mohammad S. Obaidat
2023
Attribute-based Encryption (ABE)_cover
Attribute-based Encryption (ABE)
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Kryptografie für Dummies_cover
Kryptografie für Dummies
Hans Werner Lang
2023
Cybersecurity Operations and Fusion Centers_cover
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin
2023
Crypto Taxation in USA_cover
Crypto Taxation in USA
Prashant Thakur
2023
Attribute-based Encryption (ABE)_cover
Attribute-based Encryption (ABE)
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Secure Multiparty Computation and Secret Sharing_cover
Secure Multiparty Computation and Secret Sharing
Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen
2015
Quantum Information Theory_cover
Quantum Information Theory
Mark M. Wilde
2013
Quantum Computing for Computer Scientists_cover
Quantum Computing for Computer Scientists
Noson S. Yanofsky, Mirco A. Mannucci
2008
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
DeFi and the Future of Finance_cover
DeFi and the Future of Finance
Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
2021
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Hacking Connected Cars_cover
Hacking Connected Cars
Alissa Knight
2020
Security-First Compliance for Small Businesses_cover
Security-First Compliance for Small Businesses
Karen Walsh
2023
Empirical Cloud Security_cover
Empirical Cloud Security
Aditya K. Sood
2023
Mobile OS Vulnerabilities_cover
Mobile OS Vulnerabilities
Shivi Garg, Niyati Baliyan
2023
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2019
Quantum Computing_cover
Quantum Computing
Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Anupam Baliyan, Shalli Rani
2023
Essential Enterprise Blockchain Concepts and Applications_cover
Essential Enterprise Blockchain Concepts and Applications
Kavita Saini, Pethuru Raj Chelliah, Deepak Kumar Saini
2021
Ethereum_cover
Ethereum
Paul Paxton
2022
AI-Based Metaheuristics for Information Security and Digital Media_cover
AI-Based Metaheuristics for Information Security and Digital Media
Apoorva S Shastri, Mangal Singh, Anand J. Kulkarni, Patrick Siarry
2023
Convergence of Blockchain, AI and IoT_cover
Convergence of Blockchain, AI and IoT
B Balamurugan, T Poongodi, M R Manu, S Karthikeyan, Yogesh Sharma
2023
Blockchain QuickStart Guide_cover
Blockchain QuickStart Guide
Dr. Kalpesh Parikh, Amit Johri
2022
Exploring Blockchain in Healthcare_cover
Exploring Blockchain in Healthcare
Anurag Srivastava
2022
Providing Sound Foundations for Cryptography_cover
Providing Sound Foundations for Cryptography
Oded Goldreich
2019
Cloud Computing Simplified_cover
Cloud Computing Simplified
Surbhi Rastogi
2021
Responsible Graph Neural Networks_cover
Responsible Graph Neural Networks
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Zahir Tari
2023
Build Your Own Blockchain In JS_cover
Build Your Own Blockchain In JS
Sankar Srinivasan
2023
Understanding Blockchain_cover
Understanding Blockchain
Sankar Srinivasan
2023
Mettiti al sicuro_cover
Mettiti al sicuro
Gianluca Maggi
2023
Penetration Testing for Jobseekers_cover
Penetration Testing for Jobseekers
Debasish Mandal
2022
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2023