Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Computer Science
Cyber Security
Computer Science
Cyber Security
Explore
Books
Related topics
English
close
Most popular
close
Showing 121 - 180 out of 2,000+ books
Digital Forensics with Open Source Tools
Harlan Carvey, Cory Altheide
2011
Sign up to read
Digital Forensics with Open Source Tools
Harlan Carvey, Cory Altheide
2011
Implementing SSL / TLS Using Cryptography and PKI
Joshua Davies
2011
Sign up to read
Implementing SSL / TLS Using Cryptography and PKI
Joshua Davies
2011
Public Key Infrastructure
John R. Vacca
2004
Sign up to read
Public Key Infrastructure
John R. Vacca
2004
You CAN Stop Stupid
Ira Winkler, Tracy Celaya Brown
2020
Sign up to read
You CAN Stop Stupid
Ira Winkler, Tracy Celaya Brown
2020
Security for Software Engineers
James N. Helfrich
2018
Sign up to read
Security for Software Engineers
James N. Helfrich
2018
Hacking the Human
Ian Mann
2017
Sign up to read
Hacking the Human
Ian Mann
2017
Security Supervision and Management
IFPO
2015
Sign up to read
Security Supervision and Management
IFPO
2015
Digital Identity Management
Maryline Laurent, Samia Bouzefrane
2015
Sign up to read
Digital Identity Management
Maryline Laurent, Samia Bouzefrane
2015
Security Engineering
Ross Anderson
2020
Sign up to read
Security Engineering
Ross Anderson
2020
Digital Forensics and Incident Response
Gerard Johansen
2022
Sign up to read
Digital Forensics and Incident Response
Gerard Johansen
2022
Computer Security
Dieter Gollmann
2011
Sign up to read
Computer Security
Dieter Gollmann
2011
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Sign up to read
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Information Security Policies, Procedures, and Standards
Thomas R. Peltier
2016
Sign up to read
Information Security Policies, Procedures, and Standards
Thomas R. Peltier
2016
The Basics of Digital Forensics
John Sammons
2014
Sign up to read
The Basics of Digital Forensics
John Sammons
2014
Information Security Management Systems
Heru Susanto, Mohammad Nabil Almunawar
2018
Sign up to read
Information Security Management Systems
Heru Susanto, Mohammad Nabil Almunawar
2018
Applied Combinatorics
Fred Roberts, Barry Tesman
2009
Sign up to read
Applied Combinatorics
Fred Roberts, Barry Tesman
2009
Computer and Information Security Handbook
John R. Vacca
2017
Sign up to read
Computer and Information Security Handbook
John R. Vacca
2017
ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
Mike Wills
2022
Sign up to read
ISC2 SSCP Systems Security Certified Practitioner Official Study Guide
Mike Wills
2022
Hunting Cyber Criminals
Vinny Troia
2020
Sign up to read
Hunting Cyber Criminals
Vinny Troia
2020
Private Security and the Law
Charles P. Nemeth
2017
Sign up to read
Private Security and the Law
Charles P. Nemeth
2017
Mastering Windows Server 2019
Jordan Krause
2021
Sign up to read
Mastering Windows Server 2019
Jordan Krause
2021
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Sign up to read
Windows Forensics Analyst Field Guide
Muhiballah Mohammed
2023
Secrets and Lies
Bruce Schneier
2011
Sign up to read
Secrets and Lies
Bruce Schneier
2011
The Security Risk Assessment Handbook
Douglas Landoll
2021
Sign up to read
The Security Risk Assessment Handbook
Douglas Landoll
2021
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
Sign up to read
Measuring and Managing Information Risk
Jack Freund, Jack Jones
2014
The Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver
2024
Sign up to read
The Cybersecurity Guide to Governance, Risk, and Compliance
Jason Edwards, Griffin Weaver
2024
Introduction to Security
Robert Fischer, Edward Halibozek
2008
Sign up to read
Introduction to Security
Robert Fischer, Edward Halibozek
2008
Adversarial AI Attacks, Mitigations, and Defense Strategies
John Sotiropoulos
2024
Sign up to read
Adversarial AI Attacks, Mitigations, and Defense Strategies
John Sotiropoulos
2024
CompTIA® Security+® SY0-701 Certification Guide
Ian Neil, Ian Neil
2024
Sign up to read
CompTIA® Security+® SY0-701 Certification Guide
Ian Neil, Ian Neil
2024
CompTIA Security+ Study Guide with over 500 Practice Test Questions
Mike Chapple, David Seidl
2023
Sign up to read
CompTIA Security+ Study Guide with over 500 Practice Test Questions
Mike Chapple, David Seidl
2023
ISACA Certified in Risk and Information Systems Control Exam Guide
Shobhit Mehta
2023
Sign up to read
ISACA Certified in Risk and Information Systems Control Exam Guide
Shobhit Mehta
2023
Application Security Program Handbook
Derek Fisher
2023
Sign up to read
Application Security Program Handbook
Derek Fisher
2023
Cybersecurity All-in-One For Dummies
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
2022
Sign up to read
Cybersecurity All-in-One For Dummies
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
2022
Solving Identity Management in Modern Applications
Yvonne Wilson, Abhishek Hingnikar
2022
Sign up to read
Solving Identity Management in Modern Applications
Yvonne Wilson, Abhishek Hingnikar
2022
Real-World Cryptography
David Wong
2021
Sign up to read
Real-World Cryptography
David Wong
2021
Digital Forensics and Incident Response
Gerard Johansen
2020
Sign up to read
Digital Forensics and Incident Response
Gerard Johansen
2020
Introduction to Criminal Justice Information Systems
Ralph Ioimo
2018
Sign up to read
Introduction to Criminal Justice Information Systems
Ralph Ioimo
2018
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
Sign up to read
Homeland Security and Critical Infrastructure Protection
Ryan K. Baggett, Brian K. Simpkins
2018
Police Use of Force
Michael J. Palmiotto
2016
Sign up to read
Police Use of Force
Michael J. Palmiotto
2016
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
2013
Sign up to read
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
2013
A First Course in Systems Biology
Eberhard Voit, Melissa L. Kemp
2025
Sign up to read
A First Course in Systems Biology
Eberhard Voit, Melissa L. Kemp
2025
Hands-On Ethical Hacking Tactics
Shane Hartman
2024
Sign up to read
Hands-On Ethical Hacking Tactics
Shane Hartman
2024
Cloud Forensics Demystified
Ganesh Ramakrishnan, Mansoor Haqanee
2024
Sign up to read
Cloud Forensics Demystified
Ganesh Ramakrishnan, Mansoor Haqanee
2024
CompTIA Security+ Practice Tests
David Seidl
2023
Sign up to read
CompTIA Security+ Practice Tests
David Seidl
2023
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
2023
Sign up to read
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
2023
Mastering Linux Security and Hardening
Donald A. Tevault
2023
Sign up to read
Mastering Linux Security and Hardening
Donald A. Tevault
2023
Taking Intelligence Analysis to the Next Level
Patrick McGlynn
2022
Sign up to read
Taking Intelligence Analysis to the Next Level
Patrick McGlynn
2022
Mastering Defensive Security
Cesar Bravo, Darren Kitchen
2022
Sign up to read
Mastering Defensive Security
Cesar Bravo, Darren Kitchen
2022
Information Risk Management
David Sutton
2021
Sign up to read
Information Risk Management
David Sutton
2021
Adversarial Tradecraft in Cybersecurity
Dan Borges
2021
Sign up to read
Adversarial Tradecraft in Cybersecurity
Dan Borges
2021
Kali Linux Penetration Testing Bible
Gus Khawaja
2021
Sign up to read
Kali Linux Penetration Testing Bible
Gus Khawaja
2021
Digital Forensics Explained
Greg Gogolin
2021
Sign up to read
Digital Forensics Explained
Greg Gogolin
2021
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
2020
Sign up to read
Cybersecurity Attacks – Red Team Strategies
Johann Rehberger
2020
Building an Effective Cybersecurity Program, 2nd Edition
Tari Schreider
2019
Sign up to read
Building an Effective Cybersecurity Program, 2nd Edition
Tari Schreider
2019
Ethical Hacking and Penetration Testing Guide
Rafay Baloch
2017
Sign up to read
Ethical Hacking and Penetration Testing Guide
Rafay Baloch
2017
Information Security Policies, Procedures, and Standards
Douglas J. Landoll
2017
Sign up to read
Information Security Policies, Procedures, and Standards
Douglas J. Landoll
2017
Implementing Cybersecurity
Anne Kohnke, Ken Sigler, Dan Shoemaker
2017
Sign up to read
Implementing Cybersecurity
Anne Kohnke, Ken Sigler, Dan Shoemaker
2017
Advanced Penetration Testing
Wil Allsopp
2017
Sign up to read
Advanced Penetration Testing
Wil Allsopp
2017
Policing Cyber Hate, Cyber Threats and Cyber Terrorism
Brian Blakemore
2016
Sign up to read
Policing Cyber Hate, Cyber Threats and Cyber Terrorism
Brian Blakemore
2016
The Network Security Test Lab
Michael Gregg
2015
Sign up to read
The Network Security Test Lab
Michael Gregg
2015
1
2
3
...
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41