Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Computer Science
Cyber Security
Computer Science
Cyber Security
Explore
Books
Related topics
English
close
Most popular
close
Showing 301 - 360 out of 2,000+ books
From Exposed to Secure
Featuring Cybersecurity And Compliance Experts From Around The World
2024
Sign up to read
From Exposed to Secure
Featuring Cybersecurity And Compliance Experts From Around The World
2024
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Sign up to read
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Critical Infrastructure
Robert Radvanovsky, Allan Mcdougall
2023
Sign up to read
Critical Infrastructure
Robert Radvanovsky, Allan Mcdougall
2023
The DevSecOps Playbook
Sean D. Mack
2023
Sign up to read
The DevSecOps Playbook
Sean D. Mack
2023
Practical Threat Detection Engineering
Megan Roddie, Jason Deyalsingh, Gary J. Katz
2023
Sign up to read
Practical Threat Detection Engineering
Megan Roddie, Jason Deyalsingh, Gary J. Katz
2023
Understand, Manage, and Measure Cyber Risk®
Ryan Leirvik
2023
Sign up to read
Understand, Manage, and Measure Cyber Risk®
Ryan Leirvik
2023
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
2023
Sign up to read
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
2023
Threats
Adam Shostack
2023
Sign up to read
Threats
Adam Shostack
2023
Red Hat Enterprise Linux 9 Administration
Pablo Iranzo Gómez, Pedro Ibañez Requena, Miguel Pérez Colino, Scott McCarty, Pedro Ibáñez Requena
2022
Sign up to read
Red Hat Enterprise Linux 9 Administration
Pablo Iranzo Gómez, Pedro Ibañez Requena, Miguel Pérez Colino, Scott McCarty, Pedro Ibáñez Requena
2022
Network Protocols for Security Professionals
Yoram Orzach, Deepanshu Khanna
2022
Sign up to read
Network Protocols for Security Professionals
Yoram Orzach, Deepanshu Khanna
2022
Windows Server 2022 Administration Fundamentals
Bekim Dauti
2022
Sign up to read
Windows Server 2022 Administration Fundamentals
Bekim Dauti
2022
Mastering Windows Security and Hardening
Mark Dunkerley, Matt Tumbarello
2022
Sign up to read
Mastering Windows Security and Hardening
Mark Dunkerley, Matt Tumbarello
2022
Learn Computer Forensics
William Oettinger
2022
Sign up to read
Learn Computer Forensics
William Oettinger
2022
Incident Response with Threat Intelligence
Roberto Martinez
2022
Sign up to read
Incident Response with Threat Intelligence
Roberto Martinez
2022
Wireless Security Architecture
Jennifer Minella
2022
Sign up to read
Wireless Security Architecture
Jennifer Minella
2022
The Ultimate Kali Linux Book
Glen D. Singh
2022
Sign up to read
The Ultimate Kali Linux Book
Glen D. Singh
2022
Network Forensics
Anchit Bijalwan
2021
Sign up to read
Network Forensics
Anchit Bijalwan
2021
Strong Security Governance through Integration and Automation
Priti Sikdar
2021
Sign up to read
Strong Security Governance through Integration and Automation
Priti Sikdar
2021
Cyberspace, Data Analytics, and Policing
David Skillicorn
2021
Sign up to read
Cyberspace, Data Analytics, and Policing
David Skillicorn
2021
Cybercrime and Information Technology
Alex Alexandrou
2021
Sign up to read
Cybercrime and Information Technology
Alex Alexandrou
2021
Industrial Cybersecurity
Pascal Ackerman
2021
Sign up to read
Industrial Cybersecurity
Pascal Ackerman
2021
Do No Harm
Matthew Webster
2021
Sign up to read
Do No Harm
Matthew Webster
2021
Cyber-Security Threats, Actors, and Dynamic Mitigation
Nicholas Kolokotronis, Stavros Shiaeles
2021
Sign up to read
Cyber-Security Threats, Actors, and Dynamic Mitigation
Nicholas Kolokotronis, Stavros Shiaeles
2021
Incident Response in the Age of Cloud
Dr. Erdal Ozkaya
2021
Sign up to read
Incident Response in the Age of Cloud
Dr. Erdal Ozkaya
2021
Privacy, Regulations, and Cybersecurity
Chris Moschovitis
2021
Sign up to read
Privacy, Regulations, and Cybersecurity
Chris Moschovitis
2021
AWS Penetration Testing
Jonathan Helmus
2020
Sign up to read
AWS Penetration Testing
Jonathan Helmus
2020
Implementing Information Security in Healthcare
Terrell Herzig, Tom Walsh
2020
Sign up to read
Implementing Information Security in Healthcare
Terrell Herzig, Tom Walsh
2020
Mastering Windows Security and Hardening
Mark Dunkerley, Matt Tumbarello
2020
Sign up to read
Mastering Windows Security and Hardening
Mark Dunkerley, Matt Tumbarello
2020
Learn Computer Forensics
William Oettinger
2020
Sign up to read
Learn Computer Forensics
William Oettinger
2020
Mastering Linux Security and Hardening
Donald A. Tevault
2020
Sign up to read
Mastering Linux Security and Hardening
Donald A. Tevault
2020
Learn Kali Linux 2019
Glen D. Singh
2019
Sign up to read
Learn Kali Linux 2019
Glen D. Singh
2019
Red Hat Enterprise Linux 8 Essentials
Neil Smyth
2019
Sign up to read
Red Hat Enterprise Linux 8 Essentials
Neil Smyth
2019
Implementing Digital Forensic Readiness
Jason Sachowski
2019
Sign up to read
Implementing Digital Forensic Readiness
Jason Sachowski
2019
Hands-On Network Forensics
Nipun Jaswal
2019
Sign up to read
Hands-On Network Forensics
Nipun Jaswal
2019
Reinforcement Learning for Cyber-Physical Systems
Chong Li, Meikang Qiu
2019
Sign up to read
Reinforcement Learning for Cyber-Physical Systems
Chong Li, Meikang Qiu
2019
Learning Python for Forensics
Preston Miller, Chapin Bryce
2019
Sign up to read
Learning Python for Forensics
Preston Miller, Chapin Bryce
2019
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Sign up to read
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Official2 Guide to the HCISPP CBK
Steven Hernandez
2018
Sign up to read
Official2 Guide to the HCISPP CBK
Steven Hernandez
2018
Network Vulnerability Assessment
Sagar Rahalkar
2018
Sign up to read
Network Vulnerability Assessment
Sagar Rahalkar
2018
Wireshark 2 Quick Start Guide
Charit Mishra
2018
Sign up to read
Wireshark 2 Quick Start Guide
Charit Mishra
2018
Mastering Machine Learning for Penetration Testing
Chiheb Chebbi
2018
Sign up to read
Mastering Machine Learning for Penetration Testing
Chiheb Chebbi
2018
Electromagnetic Compatibility
David Weston
2017
Sign up to read
Electromagnetic Compatibility
David Weston
2017
Seeking the Truth from Mobile Evidence
John Bair
2017
Sign up to read
Seeking the Truth from Mobile Evidence
John Bair
2017
Network Forensics
Ric Messier
2017
Sign up to read
Network Forensics
Ric Messier
2017
Cybersecurity
Amos N. Guiora
2017
Sign up to read
Cybersecurity
Amos N. Guiora
2017
Securing the Internet of Things
Shancang Li, Li Da Xu
2017
Sign up to read
Securing the Internet of Things
Shancang Li, Li Da Xu
2017
Protecting Your Internet Identity
Ted Claypoole, Theresa Payton
2016
Sign up to read
Protecting Your Internet Identity
Ted Claypoole, Theresa Payton
2016
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
2016
Sign up to read
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
2016
Building a Practical Information Security Program
Jason Andress, Mark Leary
2016
Sign up to read
Building a Practical Information Security Program
Jason Andress, Mark Leary
2016
Mobile Security and Privacy
Man Ho Au, Raymond Choo
2016
Sign up to read
Mobile Security and Privacy
Man Ho Au, Raymond Choo
2016
Coding for Penetration Testers
Jason Andress, Ryan Linn
2016
Sign up to read
Coding for Penetration Testers
Jason Andress, Ryan Linn
2016
Pervasive Computing
2016
Sign up to read
Pervasive Computing
2016
Information Security Governance Simplified
Todd Fitzgerald
2016
Sign up to read
Information Security Governance Simplified
Todd Fitzgerald
2016
Computer Security Literacy
Douglas Jacobson, Joseph Idziorek
2016
Sign up to read
Computer Security Literacy
Douglas Jacobson, Joseph Idziorek
2016
The Psychology of Information Security
Leron Zinatullin
2016
Sign up to read
The Psychology of Information Security
Leron Zinatullin
2016
Cybersecurity in the European Union
George Christou
2016
Sign up to read
Cybersecurity in the European Union
George Christou
2016
VMware vSphere Essentials
Kunal Kumar, Christian Stankowic
2015
Sign up to read
VMware vSphere Essentials
Kunal Kumar, Christian Stankowic
2015
Security Intelligence
Qing Li, Gregory Clark
2015
Sign up to read
Security Intelligence
Qing Li, Gregory Clark
2015
Cybersecurity
Thomas A. Johnson
2015
Sign up to read
Cybersecurity
Thomas A. Johnson
2015
Introduction to Social Media Investigation
Jennifer Golbeck
2015
Sign up to read
Introduction to Social Media Investigation
Jennifer Golbeck
2015
1
...
2
3
4
5
6
...
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41