Find by topic
Find by topic
1 of 14
Find by topic
1 of 10
Most popular on Perlego
Introduction to Modern Cryptography_cover
Introduction to Modern Cryptography
Jonathan Katz, Yehuda Lindell
2020
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2023
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
The Art of Memory Forensics_cover
The Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014
Alice and Bob Learn Application Security_cover
Alice and Bob Learn Application Security
Tanya Janca
2020
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2020
Ethereum Smart Contract Development_cover
Ethereum Smart Contract Development
Mayukh Mukhopadhyay
2018
Building Secure Cars_cover
Building Secure Cars
Dennis Kengo Oka
2021
Rust for Blockchain Application Development_cover
Rust for Blockchain Application Development
Akhil Sharma
2024
Hacking Connected Cars_cover
Hacking Connected Cars
Alissa Knight
2020
Tokenomics_cover
Tokenomics
Sean Au, Thomas Power
2018
The CISO Evolution_cover
The CISO Evolution
Matthew K. Sharp, Kyriakos Lambros
2022
Tribe of Hackers_cover
Tribe of Hackers
Marcus J. Carey, Jennifer Jin
2019
Communication System Security_cover
Communication System Security
Lidong Chen, Guang Gong
2012
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Introduction to Coding Theory_cover
Introduction to Coding Theory
Jurgen Bierbrauer
2016
Cryptography Apocalypse_cover
Cryptography Apocalypse
Roger A. Grimes
2019
Cryptography_cover
Cryptography
Douglas Robert Stinson, Maura Paterson
2018
Applied Cryptography_cover
Applied Cryptography
Bruce Schneier
2017
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N Parasram
2020
An Introduction to Number Theory with Cryptography_cover
An Introduction to Number Theory with Cryptography
James Kraft, Lawrence Washington
2018
Real-World Cryptography_cover
Real-World Cryptography
David Wong
2021
DeFi and the Future of Finance_cover
DeFi and the Future of Finance
Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
2021
Cybersecurity Fundamentals_cover
Cybersecurity Fundamentals
Kutub Thakur, Al-Sakib Khan Pathan
2020
Investigating Cryptocurrencies_cover
Investigating Cryptocurrencies
Nick Furneaux
2018
Practical Cyber Intelligence_cover
Practical Cyber Intelligence
Wilson Bautista
2018
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2017
Cyber Security and IT Infrastructure Protection_cover
Cyber Security and IT Infrastructure Protection
John R. Vacca
2013
An In-Depth Guide to Mobile Device Forensics_cover
An In-Depth Guide to Mobile Device Forensics
Chuck Easttom
2021
Cyber Warfare – Truth, Tactics, and Strategies_cover
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
2020
Cybersecurity Blue Team Toolkit_cover
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
2019
Hands-On Blockchain with Hyperledger_cover
Hands-On Blockchain with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna
2018
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N Parasram
2017
Hands-On Cryptography with Python_cover
Hands-On Cryptography with Python
Samuel Bowne
2018
Computer Security Literacy_cover
Computer Security Literacy
Douglas Jacobson, Joseph Idziorek
2016
Blockchain Development with Hyperledger_cover
Blockchain Development with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
2019
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2018
Tribe of Hackers Security Leaders_cover
Tribe of Hackers Security Leaders
Marcus J. Carey, Jennifer Jin
2020
Blockchain for Distributed Systems Security_cover
Blockchain for Distributed Systems Security
Sachin Shetty, Charles A. Kamhoua, Laurent L. Njilla
2019
Cryptography and Network Security_cover
Cryptography and Network Security
Bhushan Trivedi, Savita Gandhi, Dhiren Pandit
2021
Cybersecurity Blue Team Strategies_cover
Cybersecurity Blue Team Strategies
Kunal Sehgal, Nikolaos Thymianis
2023
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
Cybersecurity Attacks – Red Team Strategies_cover
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
2020
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
AI-Based Metaheuristics for Information Security and Digital Media_cover
AI-Based Metaheuristics for Information Security and Digital Media
Apoorva S Shastri, Mangal Singh, Anand J. Kulkarni, Patrick Siarry
2023
Responsible Graph Neural Networks_cover
Responsible Graph Neural Networks
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Zahir Tari
2023
How to Measure Anything in Cybersecurity Risk_cover
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard, Richard Seiersen
2023
IAPP CIPM Certified Information Privacy Manager Study Guide_cover
IAPP CIPM Certified Information Privacy Manager Study Guide
Mike Chapple, Joe Shelley
2023
Asymmetric Cryptography_cover
Asymmetric Cryptography
David Pointcheval
2022
Hack the Cybersecurity Interview_cover
Hack the Cybersecurity Interview
Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
2022
Cryptography Algorithms_cover
Cryptography Algorithms
Massimo Bertaccini
2022
Securing Mobile Devices and Technology_cover
Securing Mobile Devices and Technology
Kutub Thakur, Al-Sakib Khan Pathan
2021
Privilege Escalation Techniques_cover
Privilege Escalation Techniques
Alexis Ahmed
2021
Cloud Computing Simplified_cover
Cloud Computing Simplified
Surbhi Rastogi
2021
Cybersecurity for Everyone_cover
Cybersecurity for Everyone
David B. Skillicorn
2020
Introduction to Modern Cryptography_cover
Introduction to Modern Cryptography
Jonathan Katz, Yehuda Lindell
2020
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2023
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
The Art of Memory Forensics_cover
The Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014
Alice and Bob Learn Application Security_cover
Alice and Bob Learn Application Security
Tanya Janca
2020
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2020
Ethereum Smart Contract Development_cover
Ethereum Smart Contract Development
Mayukh Mukhopadhyay
2018
Building Secure Cars_cover
Building Secure Cars
Dennis Kengo Oka
2021
Rust for Blockchain Application Development_cover
Rust for Blockchain Application Development
Akhil Sharma
2024
Hacking Connected Cars_cover
Hacking Connected Cars
Alissa Knight
2020
Tokenomics_cover
Tokenomics
Sean Au, Thomas Power
2018
The CISO Evolution_cover
The CISO Evolution
Matthew K. Sharp, Kyriakos Lambros
2022
Tribe of Hackers_cover
Tribe of Hackers
Marcus J. Carey, Jennifer Jin
2019
Communication System Security_cover
Communication System Security
Lidong Chen, Guang Gong
2012
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Introduction to Coding Theory_cover
Introduction to Coding Theory
Jurgen Bierbrauer
2016
Cryptography Apocalypse_cover
Cryptography Apocalypse
Roger A. Grimes
2019
Cryptography_cover
Cryptography
Douglas Robert Stinson, Maura Paterson
2018
Applied Cryptography_cover
Applied Cryptography
Bruce Schneier
2017
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N Parasram
2020
An Introduction to Number Theory with Cryptography_cover
An Introduction to Number Theory with Cryptography
James Kraft, Lawrence Washington
2018
Real-World Cryptography_cover
Real-World Cryptography
David Wong
2021
DeFi and the Future of Finance_cover
DeFi and the Future of Finance
Campbell R. Harvey, Ashwin Ramachandran, Joey Santoro
2021
Cybersecurity Fundamentals_cover
Cybersecurity Fundamentals
Kutub Thakur, Al-Sakib Khan Pathan
2020
Investigating Cryptocurrencies_cover
Investigating Cryptocurrencies
Nick Furneaux
2018
Practical Cyber Intelligence_cover
Practical Cyber Intelligence
Wilson Bautista
2018
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2017
Cyber Security and IT Infrastructure Protection_cover
Cyber Security and IT Infrastructure Protection
John R. Vacca
2013
An In-Depth Guide to Mobile Device Forensics_cover
An In-Depth Guide to Mobile Device Forensics
Chuck Easttom
2021
Cyber Warfare – Truth, Tactics, and Strategies_cover
Cyber Warfare – Truth, Tactics, and Strategies
Dr. Chase Cunningham
2020
Cybersecurity Blue Team Toolkit_cover
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
2019
Hands-On Blockchain with Hyperledger_cover
Hands-On Blockchain with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna
2018
Digital Forensics with Kali Linux_cover
Digital Forensics with Kali Linux
Shiva V. N Parasram
2017
Hands-On Cryptography with Python_cover
Hands-On Cryptography with Python
Samuel Bowne
2018
Computer Security Literacy_cover
Computer Security Literacy
Douglas Jacobson, Joseph Idziorek
2016
Blockchain Development with Hyperledger_cover
Blockchain Development with Hyperledger
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
2019
Mastering Blockchain_cover
Mastering Blockchain
Imran Bashir
2018
Tribe of Hackers Security Leaders_cover
Tribe of Hackers Security Leaders
Marcus J. Carey, Jennifer Jin
2020
Blockchain for Distributed Systems Security_cover
Blockchain for Distributed Systems Security
Sachin Shetty, Charles A. Kamhoua, Laurent L. Njilla
2019
Cryptography and Network Security_cover
Cryptography and Network Security
Bhushan Trivedi, Savita Gandhi, Dhiren Pandit
2021
Cybersecurity Blue Team Strategies_cover
Cybersecurity Blue Team Strategies
Kunal Sehgal, Nikolaos Thymianis
2023
Blue Fox_cover
Blue Fox
Maria Markstedter
2023
Cybersecurity Attacks – Red Team Strategies_cover
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
2020
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
AI-Based Metaheuristics for Information Security and Digital Media_cover
AI-Based Metaheuristics for Information Security and Digital Media
Apoorva S Shastri, Mangal Singh, Anand J. Kulkarni, Patrick Siarry
2023
Responsible Graph Neural Networks_cover
Responsible Graph Neural Networks
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash, Zahir Tari
2023
How to Measure Anything in Cybersecurity Risk_cover
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard, Richard Seiersen
2023
IAPP CIPM Certified Information Privacy Manager Study Guide_cover
IAPP CIPM Certified Information Privacy Manager Study Guide
Mike Chapple, Joe Shelley
2023
Asymmetric Cryptography_cover
Asymmetric Cryptography
David Pointcheval
2022
Hack the Cybersecurity Interview_cover
Hack the Cybersecurity Interview
Ken Underhill, Christophe Foulon, Tia Hopkins, Mari Galloway
2022
Cryptography Algorithms_cover
Cryptography Algorithms
Massimo Bertaccini
2022
Securing Mobile Devices and Technology_cover
Securing Mobile Devices and Technology
Kutub Thakur, Al-Sakib Khan Pathan
2021
Privilege Escalation Techniques_cover
Privilege Escalation Techniques
Alexis Ahmed
2021
Cloud Computing Simplified_cover
Cloud Computing Simplified
Surbhi Rastogi
2021
Cybersecurity for Everyone_cover
Cybersecurity for Everyone
David B. Skillicorn
2020
Recently published
Rust for Blockchain Application Development_cover
Rust for Blockchain Application Development
Akhil Sharma
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Web 3.0_cover
Web 3.0
Prabhat Kumar Srivastav, Prateek Singhal, Basudeo Singh Roohani, Nitin Sharma
2024
Secure and Smart Cyber-Physical Systems_cover
Secure and Smart Cyber-Physical Systems
Uttam Ghosh, Fortune Mhlanga, Danda B Rawat
2024
Bitcoin Development Philosophy_cover
Bitcoin Development Philosophy
Kalle Rosenbaum, Linnea Rosembaum, Linnéa Rosembaum
2024
The Reign of Botnets_cover
The Reign of Botnets
David Senecal
2024
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
TLS Cryptography In-Depth_cover
TLS Cryptography In-Depth
Dr. Paul Duplys, Dr. Roland Schmitz
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Decentralizing Finance_cover
Decentralizing Finance
Kenneth Bok
2024
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
Cybersecurity Operations and Fusion Centers_cover
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Ransomware_cover
Ransomware
Ravindra Das
2023
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things_cover
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng-Chi Lee, Mohammad S. Obaidat
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Psybersecurity_cover
Psybersecurity
2024
The Language of Cyber Attacks_cover
The Language of Cyber Attacks
Aaron Mauro
2024
Construction Audit_cover
Construction Audit
Denise Cicchella
2024
Decentralized Music_cover
Decentralized Music
Paulo de Assis, Adam Łukawski
2024
Cybersecurity in Context_cover
Cybersecurity in Context
Chris Jay Hoofnagle, Golden G. Richard, III
2024
Attack-and-Defense Games for Control Systems_cover
Attack-and-Defense Games for Control Systems
Huanhuan Yuan, Yuan Yuan, Huapeng Dong, Yuanqing Xia, Mengbi Wang
2024
<p>Mastering Zero-knowledge Proofs</p>_cover
<p>Mastering Zero-knowledge Proofs</p>
Dr. Amit Dua, Gaurav Kumar
2024
Advanced Techniques and Applications of Cybersecurity and Forensics_cover
Advanced Techniques and Applications of Cybersecurity and Forensics
Keshav Kaushik, Mariya Ouaissa, Aryan Chaudhary
2024
Crypto Millionaires_cover
Crypto Millionaires
Mateusz Mach
2024
The Shortest Hour_cover
The Shortest Hour
Lee Parrish
2024
<p>Cracking the Cybersecurity Interview</p>_cover
<p>Cracking the Cybersecurity Interview</p>
Karl Gilbert, Sayanta Sen
2024
The Code of Honor_cover
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
See Yourself in Cyber_cover
See Yourself in Cyber
Ed Adams
2024
Ultimate Splunk for Cybersecurity_cover
Ultimate Splunk for Cybersecurity
Jit Sinha
2024
x86 Software Reverse-Engineering, Cracking, and Counter-Measures_cover
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie Domas, Christopher Domas
2024
Dark World_cover
Dark World
Atif Ali, Muhammad Qasim
2023
Cyber Resilience in Critical Infrastructure_cover
Cyber Resilience in Critical Infrastructure
Sinan Küfeo?lu, Abdullah Talip Akgün, Sinan Küfeo?lu
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Crypto Taxation in USA_cover
Crypto Taxation in USA
Prashant Thakur
2023
Rust for Blockchain Application Development_cover
Rust for Blockchain Application Development
Akhil Sharma
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Web 3.0_cover
Web 3.0
Prabhat Kumar Srivastav, Prateek Singhal, Basudeo Singh Roohani, Nitin Sharma
2024
Secure and Smart Cyber-Physical Systems_cover
Secure and Smart Cyber-Physical Systems
Uttam Ghosh, Fortune Mhlanga, Danda B Rawat
2024
Bitcoin Development Philosophy_cover
Bitcoin Development Philosophy
Kalle Rosenbaum, Linnea Rosembaum, Linnéa Rosembaum
2024
The Reign of Botnets_cover
The Reign of Botnets
David Senecal
2024
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
TLS Cryptography In-Depth_cover
TLS Cryptography In-Depth
Dr. Paul Duplys, Dr. Roland Schmitz
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Decentralizing Finance_cover
Decentralizing Finance
Kenneth Bok
2024
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
Cybersecurity Operations and Fusion Centers_cover
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Ransomware_cover
Ransomware
Ravindra Das
2023
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things_cover
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng-Chi Lee, Mohammad S. Obaidat
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Psybersecurity_cover
Psybersecurity
2024
The Language of Cyber Attacks_cover
The Language of Cyber Attacks
Aaron Mauro
2024
Construction Audit_cover
Construction Audit
Denise Cicchella
2024
Decentralized Music_cover
Decentralized Music
Paulo de Assis, Adam Łukawski
2024
Cybersecurity in Context_cover
Cybersecurity in Context
Chris Jay Hoofnagle, Golden G. Richard, III
2024
Attack-and-Defense Games for Control Systems_cover
Attack-and-Defense Games for Control Systems
Huanhuan Yuan, Yuan Yuan, Huapeng Dong, Yuanqing Xia, Mengbi Wang
2024
<p>Mastering Zero-knowledge Proofs</p>_cover
<p>Mastering Zero-knowledge Proofs</p>
Dr. Amit Dua, Gaurav Kumar
2024
Advanced Techniques and Applications of Cybersecurity and Forensics_cover
Advanced Techniques and Applications of Cybersecurity and Forensics
Keshav Kaushik, Mariya Ouaissa, Aryan Chaudhary
2024
Crypto Millionaires_cover
Crypto Millionaires
Mateusz Mach
2024
The Shortest Hour_cover
The Shortest Hour
Lee Parrish
2024
<p>Cracking the Cybersecurity Interview</p>_cover
<p>Cracking the Cybersecurity Interview</p>
Karl Gilbert, Sayanta Sen
2024
The Code of Honor_cover
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
Optimal Spending on Cybersecurity Measures_cover
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2024
See Yourself in Cyber_cover
See Yourself in Cyber
Ed Adams
2024
Ultimate Splunk for Cybersecurity_cover
Ultimate Splunk for Cybersecurity
Jit Sinha
2024
x86 Software Reverse-Engineering, Cracking, and Counter-Measures_cover
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie Domas, Christopher Domas
2024
Dark World_cover
Dark World
Atif Ali, Muhammad Qasim
2023
Cyber Resilience in Critical Infrastructure_cover
Cyber Resilience in Critical Infrastructure
Sinan Küfeo?lu, Abdullah Talip Akgün, Sinan Küfeo?lu
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Crypto Taxation in USA_cover
Crypto Taxation in USA
Prashant Thakur
2023
Recently added
<p>Mastering Zero-knowledge Proofs</p>_cover
<p>Mastering Zero-knowledge Proofs</p>
Dr. Amit Dua, Gaurav Kumar
2024
<p>Cracking the Cybersecurity Interview</p>_cover
<p>Cracking the Cybersecurity Interview</p>
Karl Gilbert, Sayanta Sen
2024
Psybersecurity_cover
Psybersecurity
2024
The Language of Cyber Attacks_cover
The Language of Cyber Attacks
Aaron Mauro
2024
Cybersecurity in Context_cover
Cybersecurity in Context
Chris Jay Hoofnagle, Golden G. Richard, III
2024
Construction Audit_cover
Construction Audit
Denise Cicchella
2024
Pro Cryptography and Cryptanalysis with C++23_cover
Pro Cryptography and Cryptanalysis with C++23
Marius Iulian Mihailescu, Stefania Loredana Nita
2023
Decentralized Music_cover
Decentralized Music
Paulo de Assis, Adam Łukawski
2024
Crypto Basics_cover
Crypto Basics
Slava Gomzin
2022
Attack-and-Defense Games for Control Systems_cover
Attack-and-Defense Games for Control Systems
Huanhuan Yuan, Yuan Yuan, Huapeng Dong, Yuanqing Xia, Mengbi Wang
2024
Web 3.0_cover
Web 3.0
Prabhat Kumar Srivastav, Prateek Singhal, Basudeo Singh Roohani, Nitin Sharma
2024
Secure and Smart Cyber-Physical Systems_cover
Secure and Smart Cyber-Physical Systems
Uttam Ghosh, Fortune Mhlanga, Danda B Rawat
2024
Advanced Techniques and Applications of Cybersecurity and Forensics_cover
Advanced Techniques and Applications of Cybersecurity and Forensics
Keshav Kaushik, Mariya Ouaissa, Aryan Chaudhary
2024
Crypto Millionaires_cover
Crypto Millionaires
Mateusz Mach
2024
The Shortest Hour_cover
The Shortest Hour
Lee Parrish
2024
Introduction to Blockchain Technology_cover
Introduction to Blockchain Technology
Ahmed Banafa
2023
Quantum Information Theory_cover
Quantum Information Theory
Mark M. Wilde
2017
How to Measure Anything in Cybersecurity Risk_cover
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard, Richard Seiersen
2023
Bitcoin Development Philosophy_cover
Bitcoin Development Philosophy
Kalle Rosenbaum, Linnea Rosembaum, Linnéa Rosembaum
2024
The Reign of Botnets_cover
The Reign of Botnets
David Senecal
2024
The Code of Honor_cover
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Introduction to Computer and Network Security_cover
Introduction to Computer and Network Security
Richard R. Brooks
2013
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
TLS Cryptography In-Depth_cover
TLS Cryptography In-Depth
Dr. Paul Duplys, Dr. Roland Schmitz
2024
The Auditor’s Guide to Blockchain Technology_cover
The Auditor’s Guide to Blockchain Technology
Shaun Aghili
2022
Discrete Mathematics With Cryptographic Applications_cover
Discrete Mathematics With Cryptographic Applications
Alexander I. Kheyfits
2021
Network Security and Cryptography_cover
Network Security and Cryptography
Sarhan M. Musa
2018
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Decentralizing Finance_cover
Decentralizing Finance
Kenneth Bok
2024
Intelligent Mobile Malware Detection_cover
Intelligent Mobile Malware Detection
Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
2022
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasi?ski, Artur Kurasi?ski
2023
Practical Mathematical Cryptography_cover
Practical Mathematical Cryptography
Kristian Gjøsteen
2022
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Ransomware_cover
Ransomware
Ravindra Das
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things_cover
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng-Chi Lee, Mohammad S. Obaidat
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Cybersecurity Operations and Fusion Centers_cover
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Quantum Information Theory_cover
Quantum Information Theory
Mark M. Wilde
2013
Quantum Computing for Computer Scientists_cover
Quantum Computing for Computer Scientists
Noson S. Yanofsky, Mirco A. Mannucci
2008
<p>Mastering Zero-knowledge Proofs</p>_cover
<p>Mastering Zero-knowledge Proofs</p>
Dr. Amit Dua, Gaurav Kumar
2024
<p>Cracking the Cybersecurity Interview</p>_cover
<p>Cracking the Cybersecurity Interview</p>
Karl Gilbert, Sayanta Sen
2024
Psybersecurity_cover
Psybersecurity
2024
The Language of Cyber Attacks_cover
The Language of Cyber Attacks
Aaron Mauro
2024
Cybersecurity in Context_cover
Cybersecurity in Context
Chris Jay Hoofnagle, Golden G. Richard, III
2024
Construction Audit_cover
Construction Audit
Denise Cicchella
2024
Pro Cryptography and Cryptanalysis with C++23_cover
Pro Cryptography and Cryptanalysis with C++23
Marius Iulian Mihailescu, Stefania Loredana Nita
2023
Decentralized Music_cover
Decentralized Music
Paulo de Assis, Adam Łukawski
2024
Crypto Basics_cover
Crypto Basics
Slava Gomzin
2022
Attack-and-Defense Games for Control Systems_cover
Attack-and-Defense Games for Control Systems
Huanhuan Yuan, Yuan Yuan, Huapeng Dong, Yuanqing Xia, Mengbi Wang
2024
Web 3.0_cover
Web 3.0
Prabhat Kumar Srivastav, Prateek Singhal, Basudeo Singh Roohani, Nitin Sharma
2024
Secure and Smart Cyber-Physical Systems_cover
Secure and Smart Cyber-Physical Systems
Uttam Ghosh, Fortune Mhlanga, Danda B Rawat
2024
Advanced Techniques and Applications of Cybersecurity and Forensics_cover
Advanced Techniques and Applications of Cybersecurity and Forensics
Keshav Kaushik, Mariya Ouaissa, Aryan Chaudhary
2024
Crypto Millionaires_cover
Crypto Millionaires
Mateusz Mach
2024
The Shortest Hour_cover
The Shortest Hour
Lee Parrish
2024
Introduction to Blockchain Technology_cover
Introduction to Blockchain Technology
Ahmed Banafa
2023
Quantum Information Theory_cover
Quantum Information Theory
Mark M. Wilde
2017
How to Measure Anything in Cybersecurity Risk_cover
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard, Richard Seiersen
2023
Bitcoin Development Philosophy_cover
Bitcoin Development Philosophy
Kalle Rosenbaum, Linnea Rosembaum, Linnéa Rosembaum
2024
The Reign of Botnets_cover
The Reign of Botnets
David Senecal
2024
The Code of Honor_cover
The Code of Honor
Paul J. Maurer, Ed Skoudis
2024
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Advances in Emerging Financial Technology and Digital Money_cover
Advances in Emerging Financial Technology and Digital Money
Yassine Maleh, Justin Zhang, Abderrahim Hansali
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Security Without Obscurity_cover
Security Without Obscurity
Jeff Stapleton, W. Clay Epstein
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Introduction to Computer and Network Security_cover
Introduction to Computer and Network Security
Richard R. Brooks
2013
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
TLS Cryptography In-Depth_cover
TLS Cryptography In-Depth
Dr. Paul Duplys, Dr. Roland Schmitz
2024
The Auditor’s Guide to Blockchain Technology_cover
The Auditor’s Guide to Blockchain Technology
Shaun Aghili
2022
Discrete Mathematics With Cryptographic Applications_cover
Discrete Mathematics With Cryptographic Applications
Alexander I. Kheyfits
2021
Network Security and Cryptography_cover
Network Security and Cryptography
Sarhan M. Musa
2018
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Decentralizing Finance_cover
Decentralizing Finance
Kenneth Bok
2024
Intelligent Mobile Malware Detection_cover
Intelligent Mobile Malware Detection
Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
2022
Philosophy of Cybersecurity_cover
Philosophy of Cybersecurity
Lukasz Olejnik, Artur Kurasi?ski, Artur Kurasi?ski
2023
Practical Mathematical Cryptography_cover
Practical Mathematical Cryptography
Kristian Gjøsteen
2022
The Privacy Leader Compass_cover
The Privacy Leader Compass
Valerie Lyons, Todd Fitzgerald
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
CCSP For Dummies_cover
CCSP For Dummies
Arthur J. Deane
2023
Ransomware_cover
Ransomware
Ravindra Das
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things_cover
Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things
Agbotiname Lucky Imoize, Valentina Emilia Balas, Vijender Kumar Solanki, Cheng-Chi Lee, Mohammad S. Obaidat
2023
Attribute-based Encryption_cover
Attribute-based Encryption
Qi Xia, Jianbin Gao, Isaac Amankona Obiri, Kwame Omono Asamoah, Daniel Adu Worae
2023
Cybersecurity Operations and Fusion Centers_cover
Cybersecurity Operations and Fusion Centers
Kevin Lynn McLaughlin
2023
Advancements in Cybercrime Investigation and Digital Forensics_cover
Advancements in Cybercrime Investigation and Digital Forensics
A. Harisha, Amarnath Mishra, Chandra Singh
2023
Quantum Information Theory_cover
Quantum Information Theory
Mark M. Wilde
2013
Quantum Computing for Computer Scientists_cover
Quantum Computing for Computer Scientists
Noson S. Yanofsky, Mirco A. Mannucci
2008