Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Computer Science
Cryptography
Computer Science
Cryptography
Explore
Books
Related topics
English
close
Most popular
close
Showing 181 - 240 out of 419 books
Tribe of Hackers Red Team
Marcus J. Carey, Jennifer Jin
2019
Sign up to read
Tribe of Hackers Red Team
Marcus J. Carey, Jennifer Jin
2019
Tribe of Hackers Red Team
Marcus J. Carey, Jennifer Jin
2019
Sign up to read
Tribe of Hackers Red Team
Marcus J. Carey, Jennifer Jin
2019
Tribe of Hackers
Marcus J. Carey, Jennifer Jin
2019
Sign up to read
Tribe of Hackers
Marcus J. Carey, Jennifer Jin
2019
The Business of Cybersecurity
Ashwini Sathnur
2019
Sign up to read
The Business of Cybersecurity
Ashwini Sathnur
2019
Mastering Ethereum
Merunas Grincalaitis
2019
Sign up to read
Mastering Ethereum
Merunas Grincalaitis
2019
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
2019
Sign up to read
Cybersecurity Blue Team Toolkit
Nadean H. Tanner
2019
Building Ethereum Dapps
Roberto Infante
2019
Sign up to read
Building Ethereum Dapps
Roberto Infante
2019
Data Security in Cloud Computing, Volume II
Giulio D'Agostino
2019
Sign up to read
Data Security in Cloud Computing, Volume II
Giulio D'Agostino
2019
Data Science for Cyber-Security
2018
Sign up to read
Data Science for Cyber-Security
2018
Fundamentals of Cyber Security
Mayank Bhushan, Mayank Bhushan, Rajkumar Singh Rathore, Aatif Jamshed
2018
Sign up to read
Fundamentals of Cyber Security
Mayank Bhushan, Mayank Bhushan, Rajkumar Singh Rathore, Aatif Jamshed
2018
Blockchain and the Law
Primavera De Filippi, Aaron Wright, Primavera De Filippi De Filippi
2018
Sign up to read
Blockchain and the Law
Primavera De Filippi, Aaron Wright, Primavera De Filippi De Filippi
2018
Blockchain and the Law
Primavera De Filippi, Aaron Wright, Primavera De Filippi De Filippi
2018
Sign up to read
Blockchain and the Law
Primavera De Filippi, Aaron Wright, Primavera De Filippi De Filippi
2018
Algebraic and Stochastic Coding Theory
Dave K. Kythe, Prem K. Kythe
2017
Sign up to read
Algebraic and Stochastic Coding Theory
Dave K. Kythe, Prem K. Kythe
2017
Wireshark for Security Professionals
Jessey Bullock, Jeff T. Parker
2017
Sign up to read
Wireshark for Security Professionals
Jessey Bullock, Jeff T. Parker
2017
Foundations of Coding
Jean-Guillaume Dumas, Jean-Louis Roch, Éric Tannier, Sébastien Varrette
2015
Sign up to read
Foundations of Coding
Jean-Guillaume Dumas, Jean-Louis Roch, Éric Tannier, Sébastien Varrette
2015
Computational Number Theory and Modern Cryptography
Song Y. Yan
2012
Sign up to read
Computational Number Theory and Modern Cryptography
Song Y. Yan
2012
Communication System Security
Lidong Chen, Guang Gong
2012
Sign up to read
Communication System Security
Lidong Chen, Guang Gong
2012
ISO 27001 Annex A Controls in Plain English
Dejan Kosutic
Sign up to read
ISO 27001 Annex A Controls in Plain English
Dejan Kosutic
Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities
2025
Sign up to read
Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities
2025
Threat Modeling Gameplay with EoP
Brett Crawley
2024
Sign up to read
Threat Modeling Gameplay with EoP
Brett Crawley
2024
Metasploit 5.0 for Beginners
Sagar Rahalkar
2020
Sign up to read
Metasploit 5.0 for Beginners
Sagar Rahalkar
2020
Hardware Security
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2014
Sign up to read
Hardware Security
Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
2014
Windows Registry Forensics
Harlan Carvey
2011
Sign up to read
Windows Registry Forensics
Harlan Carvey
2011
Forensic Investigation of Smart Digital Devices
Farkhund Iqbal
2026
Sign up to read
Forensic Investigation of Smart Digital Devices
Farkhund Iqbal
2026
Adversarial Machine Learning
Jason Edwards
2026
Sign up to read
Adversarial Machine Learning
Jason Edwards
2026
Transforming Cybersecurity with Machine Learning
Kutub Thakur, Al-Sakib Khan Pathan
2025
Sign up to read
Transforming Cybersecurity with Machine Learning
Kutub Thakur, Al-Sakib Khan Pathan
2025
Zero Trust Security Engineering
Mahesh Patil
2025
Sign up to read
Zero Trust Security Engineering
Mahesh Patil
2025
Security Engineering
Harvinder Singh Gill
2025
Sign up to read
Security Engineering
Harvinder Singh Gill
2025
Mathematics for the Digital Systems Engineer
Chris J. Mitchell
2025
Sign up to read
Mathematics for the Digital Systems Engineer
Chris J. Mitchell
2025
Cybercrime and Digital Security
Mayank Bhushan, Dr. Aatif Jamshed
2025
Sign up to read
Cybercrime and Digital Security
Mayank Bhushan, Dr. Aatif Jamshed
2025
Identity Security for Software Development
Aiyan Ma
2025
Sign up to read
Identity Security for Software Development
Aiyan Ma
2025
Generative AI for Cybersecurity and Privacy
2025
Sign up to read
Generative AI for Cybersecurity and Privacy
2025
Digital Forensics in Next-Generation Internet of Medical Things
2025
Sign up to read
Digital Forensics in Next-Generation Internet of Medical Things
2025
Internet of Things Security
2025
Sign up to read
Internet of Things Security
2025
Safeguarding Satellite Communications
Jianping An, Shuai Wang, Pingyue Yue, Gaofeng Pan
2025
Sign up to read
Safeguarding Satellite Communications
Jianping An, Shuai Wang, Pingyue Yue, Gaofeng Pan
2025
Cyber Security, Forensics and National Security
2025
Sign up to read
Cyber Security, Forensics and National Security
2025
Certified Penetration Testing Professional Exam Guide
Rahul Deshmukh
2025
Sign up to read
Certified Penetration Testing Professional Exam Guide
Rahul Deshmukh
2025
Behavioral Insights in Cybersecurity
Dustin S. Sachs
2025
Sign up to read
Behavioral Insights in Cybersecurity
Dustin S. Sachs
2025
Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare
2025
Sign up to read
Quantum Algorithms for Enhancing Cybersecurity in Computational Intelligence in Healthcare
2025
Ultimate Microsoft XDR for Full Spectrum Cyber Defence
Ian David Hanley
2025
Sign up to read
Ultimate Microsoft XDR for Full Spectrum Cyber Defence
Ian David Hanley
2025
Guardians of the Digital Age
Elçin Biren
2025
Sign up to read
Guardians of the Digital Age
Elçin Biren
2025
Ultimate Event-Driven Architecture with Python and Apache Kafka
Gopal Sharma
2025
Sign up to read
Ultimate Event-Driven Architecture with Python and Apache Kafka
Gopal Sharma
2025
Cybersecurity in Knowledge Management
2025
Sign up to read
Cybersecurity in Knowledge Management
2025
Securing Talent
Kevin Lynn McLaughlin
2025
Sign up to read
Securing Talent
Kevin Lynn McLaughlin
2025
Next Generation Data Science and Blockchain Technology for Industry 5.0
2025
Sign up to read
Next Generation Data Science and Blockchain Technology for Industry 5.0
2025
Multimedia Security
2025
Sign up to read
Multimedia Security
2025
Security Technologies for Law Enforcement Agencies
Kazım Duraklar
2025
Sign up to read
Security Technologies for Law Enforcement Agencies
Kazım Duraklar
2025
Biometric Technology and Authentication
Ravi Das
2025
Sign up to read
Biometric Technology and Authentication
Ravi Das
2025
Hacking Cryptography
Kamran Khan, Bill Cox
2025
Sign up to read
Hacking Cryptography
Kamran Khan, Bill Cox
2025
Advanced Machine Learning for Cyber-Attack Detection in IoT Networks
2025
Sign up to read
Advanced Machine Learning for Cyber-Attack Detection in IoT Networks
2025
Security Issues in Communication Devices, Networks and Computing Models
2025
Sign up to read
Security Issues in Communication Devices, Networks and Computing Models
2025
Security Issues in Communication Devices, Networks and Computing Models
2025
Sign up to read
Security Issues in Communication Devices, Networks and Computing Models
2025
Quantum Communication and Quantum Internet Applications
Daniel Minoli, Benedict Occhiogrosso
2025
Sign up to read
Quantum Communication and Quantum Internet Applications
Daniel Minoli, Benedict Occhiogrosso
2025
Artificial Intelligence for Cyber Security and Industry 4.0
2025
Sign up to read
Artificial Intelligence for Cyber Security and Industry 4.0
2025
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2025
Sign up to read
Optimal Spending on Cybersecurity Measures
Tara Kissoon
2025
Taming the Hacking Storm
Roger A. Grimes
2025
Sign up to read
Taming the Hacking Storm
Roger A. Grimes
2025
CyberMedics
2025
Sign up to read
CyberMedics
2025
Cyber Defense
Jason Edwards
2025
Sign up to read
Cyber Defense
Jason Edwards
2025
From Street-smart to Web-wise®
Al Marcella, Brian Moore, Madeline Parisi
2025
Sign up to read
From Street-smart to Web-wise®
Al Marcella, Brian Moore, Madeline Parisi
2025
Enterprise Fortress
Alex Stevens
2025
Sign up to read
Enterprise Fortress
Alex Stevens
2025
1
...
2
3
4
...
5
6
7