Skip to main content
Discover
Pricing
Login
Sign up to read
WEBSITE LANGUAGE
Deutsch - DE
English - EN
selected language
Español - ES
Français - FR
Italiano - IT
Your selection
will not affect books.
Website language selection impacts menus and navigation.
globe icon
English
close
WEBSITE LANGUAGE
Deutsch - DE
English - EN
selected language
Español - ES
Français - FR
Italiano - IT
Your selection
will not affect books.
Website language selection impacts menus and navigation.
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Discover
Computer Science
Cyber Security
Computer Science
Cyber Security
Explore
Books
Related topics
All languages
close
Most popular
close
Showing 61 - 120 out of 1,000+ books
Digital Forensics and Incident Response
Gerard Johansen
2017
Critical Infrastructure Protection, Risk Management, and Resilience
Kelley A. Pesch-Cronin, Nancy E. Marion
2016
Dark Territory
Fred Kaplan
2016
Threat Modeling
Adam Shostack
2014
Investigating Internet Crimes
Todd G. Shipley, Art Bowker
2013
The Basics of Digital Forensics
John Sammons
2012
Kali Linux 2018: Assuring Security by Penetration Testing
Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali
2018
Combating Human Trafficking
Michael J. Palmiotto
2014
Building an Information Security Awareness Program
Bill Gardner, Valerie Thomas
2014
Police Corruption
Tim Prenzler
2009
Operating System Security
Trent Jaeger
2022
Cybercrime Investigations
John Bandler, Antonia Merzon
2020
Hands-On Machine Learning for Cybersecurity
Soma Halder, Sinan Ozdemir
2018
The Art of Intrusion
Kevin D. Mitnick, William L. Simon
2009
Secure, Resilient, and Agile Software Development
Mark Merkow
2019
Hands-On Artificial Intelligence for Cybersecurity
Alessandro Parisi
2019
Official2® Guide to the CAP® CBK®
Patrick D. Howard
2016
Digital Forensics for Legal Professionals
Larry Daniel, Lars Daniel
2011
Practical Network Automation
Abhishek Ratan
2018
Investigations and the Art of the Interview
Inge Sebyan Black, Lawrence J. Fennelly
2020
Cisco Certified CyberOps Associate 200-201 Certification Guide
Glen D. Singh
2021
Cybersecurity: The Beginner's Guide
Dr. Erdal Ozkaya
2019
Digital Forensics and Incident Response
Gerard Johansen
2022
The Ultimate Kali Linux Book
Glen D. Singh
2022
Official2® Guide to the CISSP®-ISSMP® CBK®
Joseph Steinberg
2015
Symmetric Cryptography, Volume 1
2023
Intelligent Security Systems
Leon Reznik
2021
IT Governance
Alan Calder, Steve Watkins
2019
Security Intelligence
Qing Li, Gregory Clark
2015
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
2023
Artificial Intelligence and the Law
Dennis J. Baker, Paul H. Robinson
2020
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Cyber Risk Management
Christopher J Hodson
2024
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
Deep Dive
Rae L. Baker
2023
Microsoft Defender for Endpoint in Depth
Paul Huijbregts, Joe Anich, Justen Graves
2023
Our Data, Ourselves
Jacqueline D. Lipton
2022
Cybersecurity Career Guide
Alyssa Miller
2022
Data Privacy
Nishant Bhajaria
2022
Python Network Programming Techniques
Marcel Neidinger
2021
Cybersecurity Career Master Plan
Dr. Gerald Auger, Jaclyn "Jax" Scott, Jonathan Helmus, Kim Nguyen, Heath "The Cyber Mentor" Adams
2021
Operational Auditing
Hernan Murdock
2021
Information Security in Healthcare
Terrell W. Herzig
2020
CISA – Certified Information Systems Auditor Study Guide
Hemang Doshi
2020
GDPR and Cyber Security for Business Information Systems
Antoni Gobeo, Connor Fowler, William J. Buchanan
2018
Security Operations Center Guidebook
Gregory Jarpey, Scott McCoy
2017
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
Kevin Cardwell
2016
Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
2023
Learn Computer Forensics
William Oettinger
2022
Microsoft Information Protection Administrator SC-400 Certification Guide
Shabaz Darr, Viktor Hedberg
2022
Zscaler Cloud Security Essentials
Ravi Devarasetty
2021
Securing Blockchain Networks like Ethereum and Hyperledger Fabric
Alessandro Parisi
2020
Learn Azure Sentinel
Richard Diver, Gary Bushey
2020
Managing Cybersecurity Risk
Jonathan Reuvid
2018
Protocols for Secure Electronic Commerce
Mostafa Hashem Sherif
2017
Learning iOS Penetration Testing
Swaroop Yermalkar
2016
Wiley Pathways Network Security Fundamentals Project Manual
Eric Cole, Ronald L. Krutz, James Conley, Brian Reisman, Mitch Ruebush, Dieter Gollman, Rachelle Reese
2015
ISO/IEC 27001:2022
Steve Watkins
2022
The Cybersecurity Body of Knowledge
Daniel Shoemaker, Anne Kohnke, Ken Sigler
2020
1
2
3
4
5