Find by topic
Find by topic
1 of 14
Find by topic
1 of 10
Most popular on Perlego
Private Security_cover
Private Security
Charles P. Nemeth
2017
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
The Attention Merchants_cover
The Attention Merchants
Tim Wu
2017
Understanding the Digital World_cover
Understanding the Digital World
Brian W. Kernighan
2021
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Information Security Governance_cover
Information Security Governance
Krag Brotby
2009
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Crime Prevention_cover
Crime Prevention
Stephen Schneider
2014
Learn Computer Forensics_cover
Learn Computer Forensics
William Oettinger
2020
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Critical Infrastructure_cover
Critical Infrastructure
Robert S. Radvanovsky, Allan McDougall
2018
Data-Driven Security_cover
Data-Driven Security
Jay Jacobs, Bob Rudis
2014
Information Security Governance_cover
Information Security Governance
Andrej Volchkov
2018
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2017
Cybersecurity Program Development for Business_cover
Cybersecurity Program Development for Business
Chris Moschovitis
2018
Critical Infrastructure Protection, Risk Management, and Resilience_cover
Critical Infrastructure Protection, Risk Management, and Resilience
Kelley A. Pesch-Cronin, Nancy E. Marion
2016
Police Use of Force_cover
Police Use of Force
Michael J. Palmiotto
2016
Cyber Security_cover
Cyber Security
Jeremy Swinfen Green
2016
The Manager's Handbook for Corporate Security_cover
The Manager's Handbook for Corporate Security
Edward Halibozek, Gerald L. Kovacich
2017
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Acquiring Card Payments_cover
Acquiring Card Payments
Ilya Dubinsky
2019
Deep Dive_cover
Deep Dive
Rae L. Baker
2023
Cybersecurity for Business_cover
Cybersecurity for Business
Larry Clinton
2022
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Cynthia Brumfield, Brian Haugli
2021
The Digital Silk Road_cover
The Digital Silk Road
Jonathan E. Hillman
2021
Practical Internet of Things Security_cover
Practical Internet of Things Security
Brian Russell, Drew Van Duren
2018
Understanding the Digital World_cover
Understanding the Digital World
Brian Kernighan
2017
Critical Infrastructure_cover
Critical Infrastructure
Tyson Macaulay
2008
Cybersecurity Leadership Demystified_cover
Cybersecurity Leadership Demystified
Dr. Erdal Ozkaya
2022
Incident Response in the Age of Cloud_cover
Incident Response in the Age of Cloud
Dr. Erdal Ozkaya
2021
Computer Security_cover
Computer Security
Dieter Gollmann
2011
Cybersecurity Essentials_cover
Cybersecurity Essentials
Charles J. Brooks, Christopher Grow, Philip A. Craig, Donald Short
2018
The Art of Memory Forensics_cover
The Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014
The Official2 CISSP CBK Reference_cover
The Official2 CISSP CBK Reference
Arthur J. Deane, Aaron Kraus
2021
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2020
Gangs and Organized Crime_cover
Gangs and Organized Crime
George W. Knox, Gregg Etter, Carter F. Smith
2018
Official2® Guide to the CAP® CBK®_cover
Official2® Guide to the CAP® CBK®
Patrick D. Howard
2016
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Hands-On Machine Learning for Cybersecurity_cover
Hands-On Machine Learning for Cybersecurity
Soma Halder, Sinan Ozdemir
2018
Blockchain and the Law_cover
Blockchain and the Law
Primavera De Filippi, Aaron Wright
2018
Investigating Internet Crimes_cover
Investigating Internet Crimes
Todd G. Shipley, Art Bowker
2013
The Basics of Digital Forensics_cover
The Basics of Digital Forensics
John Sammons
2012
The Art of Intrusion_cover
The Art of Intrusion
Kevin D. Mitnick, William L. Simon
2009
Implementing Information Security in Healthcare_cover
Implementing Information Security in Healthcare
Terrell Herzig, Tom Walsh
2020
Combating Human Trafficking_cover
Combating Human Trafficking
Michael J. Palmiotto
2014
Microsoft Windows Security Essentials_cover
Microsoft Windows Security Essentials
Darril Gibson
2011
Police Corruption_cover
Police Corruption
Tim Prenzler
2009
Operating System Security_cover
Operating System Security
Trent Jaeger
2022
Information Security_cover
Information Security
Mark Stamp
2021
Hands-On Artificial Intelligence for Cybersecurity_cover
Hands-On Artificial Intelligence for Cybersecurity
Alessandro Parisi
2019
Research Methods for Cyber Security_cover
Research Methods for Cyber Security
Thomas W. Edgar, David O. Manz
2017
Private Security_cover
Private Security
Charles P. Nemeth
2017
Cybersecurity Law_cover
Cybersecurity Law
Jeff Kosseff
2022
The Attention Merchants_cover
The Attention Merchants
Tim Wu
2017
Understanding the Digital World_cover
Understanding the Digital World
Brian W. Kernighan
2021
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2021
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Information Security Governance_cover
Information Security Governance
Krag Brotby
2009
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
CompTIA Security+ Study Guide_cover
CompTIA Security+ Study Guide
Mike Chapple, David Seidl
2021
Crime Prevention_cover
Crime Prevention
Stephen Schneider
2014
Learn Computer Forensics_cover
Learn Computer Forensics
William Oettinger
2020
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Critical Infrastructure_cover
Critical Infrastructure
Robert S. Radvanovsky, Allan McDougall
2018
Data-Driven Security_cover
Data-Driven Security
Jay Jacobs, Bob Rudis
2014
Information Security Governance_cover
Information Security Governance
Andrej Volchkov
2018
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2017
Cybersecurity Program Development for Business_cover
Cybersecurity Program Development for Business
Chris Moschovitis
2018
Critical Infrastructure Protection, Risk Management, and Resilience_cover
Critical Infrastructure Protection, Risk Management, and Resilience
Kelley A. Pesch-Cronin, Nancy E. Marion
2016
Police Use of Force_cover
Police Use of Force
Michael J. Palmiotto
2016
Cyber Security_cover
Cyber Security
Jeremy Swinfen Green
2016
The Manager's Handbook for Corporate Security_cover
The Manager's Handbook for Corporate Security
Edward Halibozek, Gerald L. Kovacich
2017
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
CompTIA CySA+ Study Guide_cover
CompTIA CySA+ Study Guide
Mike Chapple, David Seidl
2023
CompTIA Linux+ Study Guide_cover
CompTIA Linux+ Study Guide
Richard Blum, Christine Bresnahan
2022
Keycloak - Identity and Access Management for Modern Applications_cover
Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen, Pedro Igor Silva
2023
Acquiring Card Payments_cover
Acquiring Card Payments
Ilya Dubinsky
2019
Deep Dive_cover
Deep Dive
Rae L. Baker
2023
Cybersecurity for Business_cover
Cybersecurity for Business
Larry Clinton
2022
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Cynthia Brumfield, Brian Haugli
2021
The Digital Silk Road_cover
The Digital Silk Road
Jonathan E. Hillman
2021
Practical Internet of Things Security_cover
Practical Internet of Things Security
Brian Russell, Drew Van Duren
2018
Understanding the Digital World_cover
Understanding the Digital World
Brian Kernighan
2017
Critical Infrastructure_cover
Critical Infrastructure
Tyson Macaulay
2008
Cybersecurity Leadership Demystified_cover
Cybersecurity Leadership Demystified
Dr. Erdal Ozkaya
2022
Incident Response in the Age of Cloud_cover
Incident Response in the Age of Cloud
Dr. Erdal Ozkaya
2021
Computer Security_cover
Computer Security
Dieter Gollmann
2011
Cybersecurity Essentials_cover
Cybersecurity Essentials
Charles J. Brooks, Christopher Grow, Philip A. Craig, Donald Short
2018
The Art of Memory Forensics_cover
The Art of Memory Forensics
Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014
The Official2 CISSP CBK Reference_cover
The Official2 CISSP CBK Reference
Arthur J. Deane, Aaron Kraus
2021
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Digital Forensics and Incident Response_cover
Digital Forensics and Incident Response
Gerard Johansen
2020
Gangs and Organized Crime_cover
Gangs and Organized Crime
George W. Knox, Gregg Etter, Carter F. Smith
2018
Official2® Guide to the CAP® CBK®_cover
Official2® Guide to the CAP® CBK®
Patrick D. Howard
2016
Mastering Windows Server 2019_cover
Mastering Windows Server 2019
Jordan Krause
2021
Hands on Hacking_cover
Hands on Hacking
Matthew Hickey, Jennifer Arcuri
2020
Hands-On Machine Learning for Cybersecurity_cover
Hands-On Machine Learning for Cybersecurity
Soma Halder, Sinan Ozdemir
2018
Blockchain and the Law_cover
Blockchain and the Law
Primavera De Filippi, Aaron Wright
2018
Investigating Internet Crimes_cover
Investigating Internet Crimes
Todd G. Shipley, Art Bowker
2013
The Basics of Digital Forensics_cover
The Basics of Digital Forensics
John Sammons
2012
The Art of Intrusion_cover
The Art of Intrusion
Kevin D. Mitnick, William L. Simon
2009
Implementing Information Security in Healthcare_cover
Implementing Information Security in Healthcare
Terrell Herzig, Tom Walsh
2020
Combating Human Trafficking_cover
Combating Human Trafficking
Michael J. Palmiotto
2014
Microsoft Windows Security Essentials_cover
Microsoft Windows Security Essentials
Darril Gibson
2011
Police Corruption_cover
Police Corruption
Tim Prenzler
2009
Operating System Security_cover
Operating System Security
Trent Jaeger
2022
Information Security_cover
Information Security
Mark Stamp
2021
Hands-On Artificial Intelligence for Cybersecurity_cover
Hands-On Artificial Intelligence for Cybersecurity
Alessandro Parisi
2019
Research Methods for Cyber Security_cover
Research Methods for Cyber Security
Thomas W. Edgar, David O. Manz
2017
Recently published
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Mastering Secure Java Applications_cover
Mastering Secure Java Applications
Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar
2024
Hybrid Threats, Cyberterrorism and Cyberwarfare_cover
Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
2023
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2024
API Security for White Hat Hackers_cover
API Security for White Hat Hackers
Confidence Staveley
2024
Automating Security Detection Engineering_cover
Automating Security Detection Engineering
Dennis Chow
2024
Okta Administration Up and Running_cover
Okta Administration Up and Running
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Nine Steps to Success_cover
Nine Steps to Success
Alan Calder
2024
A CISO Guide to Cyber Resilience_cover
A CISO Guide to Cyber Resilience
Debra Baker
2024
Enhancing IoT Security_cover
Enhancing IoT Security
Vidushi Sharma, Gamini Joshi
2023
Zabbix 7 IT Infrastructure Monitoring Cookbook_cover
Zabbix 7 IT Infrastructure Monitoring Cookbook
Nathan Liefting, Brian van Baekel
2024
Malware Development for Ethical Hackers_cover
Malware Development for Ethical Hackers
Zhassulan Zhussupov
2024
Cyber Warfare_cover
Cyber Warfare
Paul J. Springer
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Global Digital Data Governance_cover
Global Digital Data Governance
Carolina Aguerre, Malcolm Campbell-Verduyn, Jan Aart Scholte
2024
Pro Spring Security_cover
Pro Spring Security
Massimo Nardone, Carlo Scarioni
2023
CompTIA Security+ Practice Tests_cover
CompTIA Security+ Practice Tests
David Seidl
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Zero Trust Overview and Playbook Introduction_cover
Zero Trust Overview and Playbook Introduction
Mark Simos, Nikhil Kumar
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Kurt J. Engemann, Jason A. Witty
2024
Global Audit Leadership_cover
Global Audit Leadership
Audley L. Bell
2024
Web 3.0_cover
Web 3.0
Prabhat Kumar Srivastav, Prateek Singhal, Basudeo Singh Roohani, Nitin Sharma
2024
Secure and Smart Cyber-Physical Systems_cover
Secure and Smart Cyber-Physical Systems
Uttam Ghosh, Fortune Mhlanga, Danda B Rawat
2024
The Expert in the Next Office_cover
The Expert in the Next Office
M. E. Kabay
2024
The Adoption of Fintech_cover
The Adoption of Fintech
Syed Hasan Jafar, Hemachandran K, Shakeb Akhtar, Parvez Alam Khan, Hani El-Chaarani
2024
The Reign of Botnets_cover
The Reign of Botnets
David Senecal
2024
Cybersecurity Strategies and Best Practices_cover
Cybersecurity Strategies and Best Practices
Milad Aslaner
2024
The Comprehensive Guide to Cybersecurity Careers_cover
The Comprehensive Guide to Cybersecurity Careers
Jason Edwards
2024
Ultimate Pentesting for Web Applications_cover
Ultimate Pentesting for Web Applications
Dr. Rohit Gautam, Dr. Shifa Cyclewala
2024
Combatting Cyber Terrorism_cover
Combatting Cyber Terrorism
Richard Bingley
2024
Cybercrime and Digital Deviance_cover
Cybercrime and Digital Deviance
Roderick S. Graham, 'Shawn K. Smith
2024
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Cyber Safety for Everyone - 3rd Edition_cover
Cyber Safety for Everyone - 3rd Edition
JaagoTeens
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Stepping Through Cybersecurity Risk Management_cover
Stepping Through Cybersecurity Risk Management
Jennifer L. Bayuk
2024
Why CISOs Fail_cover
Why CISOs Fail
Barak Engel
2024
Personal Identification_cover
Personal Identification
David J. Haas
2024
PCI DSS Version 4.0_cover
PCI DSS Version 4.0
Stephen Hancock
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Malware Science_cover
Malware Science
Shane Molinari
2023
Biosecurity in the Making_cover
Biosecurity in the Making
Manousos E. Kambouris
2023
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Mastering Secure Java Applications_cover
Mastering Secure Java Applications
Tarun Kumar Chawdhury, Joyanta Banerjee, Vipul Gupta, Debopam Poddar
2024
Hybrid Threats, Cyberterrorism and Cyberwarfare_cover
Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
2023
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2024
API Security for White Hat Hackers_cover
API Security for White Hat Hackers
Confidence Staveley
2024
Automating Security Detection Engineering_cover
Automating Security Detection Engineering
Dennis Chow
2024
Okta Administration Up and Running_cover
Okta Administration Up and Running
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
Nine Steps to Success_cover
Nine Steps to Success
Alan Calder
2024
A CISO Guide to Cyber Resilience_cover
A CISO Guide to Cyber Resilience
Debra Baker
2024
Enhancing IoT Security_cover
Enhancing IoT Security
Vidushi Sharma, Gamini Joshi
2023
Zabbix 7 IT Infrastructure Monitoring Cookbook_cover
Zabbix 7 IT Infrastructure Monitoring Cookbook
Nathan Liefting, Brian van Baekel
2024
Malware Development for Ethical Hackers_cover
Malware Development for Ethical Hackers
Zhassulan Zhussupov
2024
Cyber Warfare_cover
Cyber Warfare
Paul J. Springer
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Global Digital Data Governance_cover
Global Digital Data Governance
Carolina Aguerre, Malcolm Campbell-Verduyn, Jan Aart Scholte
2024
Pro Spring Security_cover
Pro Spring Security
Massimo Nardone, Carlo Scarioni
2023
CompTIA Security+ Practice Tests_cover
CompTIA Security+ Practice Tests
David Seidl
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Zero Trust Overview and Playbook Introduction_cover
Zero Trust Overview and Playbook Introduction
Mark Simos, Nikhil Kumar
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Kurt J. Engemann, Jason A. Witty
2024
Global Audit Leadership_cover
Global Audit Leadership
Audley L. Bell
2024
Web 3.0_cover
Web 3.0
Prabhat Kumar Srivastav, Prateek Singhal, Basudeo Singh Roohani, Nitin Sharma
2024
Secure and Smart Cyber-Physical Systems_cover
Secure and Smart Cyber-Physical Systems
Uttam Ghosh, Fortune Mhlanga, Danda B Rawat
2024
The Expert in the Next Office_cover
The Expert in the Next Office
M. E. Kabay
2024
The Adoption of Fintech_cover
The Adoption of Fintech
Syed Hasan Jafar, Hemachandran K, Shakeb Akhtar, Parvez Alam Khan, Hani El-Chaarani
2024
The Reign of Botnets_cover
The Reign of Botnets
David Senecal
2024
Cybersecurity Strategies and Best Practices_cover
Cybersecurity Strategies and Best Practices
Milad Aslaner
2024
The Comprehensive Guide to Cybersecurity Careers_cover
The Comprehensive Guide to Cybersecurity Careers
Jason Edwards
2024
Ultimate Pentesting for Web Applications_cover
Ultimate Pentesting for Web Applications
Dr. Rohit Gautam, Dr. Shifa Cyclewala
2024
Combatting Cyber Terrorism_cover
Combatting Cyber Terrorism
Richard Bingley
2024
Cybercrime and Digital Deviance_cover
Cybercrime and Digital Deviance
Roderick S. Graham, 'Shawn K. Smith
2024
Cyber Operations_cover
Cyber Operations
Jerry M. Couretas
2024
Cyber Safety for Everyone - 3rd Edition_cover
Cyber Safety for Everyone - 3rd Edition
JaagoTeens
2024
Introduction to Cybersecurity in the Internet of Things_cover
Introduction to Cybersecurity in the Internet of Things
Keke Gai, Jing Yu, Liehuang Zhu
2024
Stepping Through Cybersecurity Risk Management_cover
Stepping Through Cybersecurity Risk Management
Jennifer L. Bayuk
2024
Why CISOs Fail_cover
Why CISOs Fail
Barak Engel
2024
Personal Identification_cover
Personal Identification
David J. Haas
2024
PCI DSS Version 4.0_cover
PCI DSS Version 4.0
Stephen Hancock
2024
The Business of Cyber_cover
The Business of Cyber
Peter Fagan
2024
Cryptography_cover
Cryptography
Zoubir Z. Mammeri
2024
Pen Testing from Contract to Report_cover
Pen Testing from Contract to Report
Alfred Basta, Nadine Basta, Waqar Anwar
2024
Cyber Security for Next-Generation Computing Technologies_cover
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz
2024
Malware Science_cover
Malware Science
Shane Molinari
2023
Biosecurity in the Making_cover
Biosecurity in the Making
Manousos E. Kambouris
2023
Recently added
Nine Steps to Success_cover
Nine Steps to Success
Alan Calder
2024
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Kurt J. Engemann, Jason A. Witty
2024
Firewalls Don't Stop Dragons_cover
Firewalls Don't Stop Dragons
Carey Parker
2023
Pro Spring Security_cover
Pro Spring Security
Massimo Nardone, Carlo Scarioni
2023
Jump-start Your SOC Analyst Career_cover
Jump-start Your SOC Analyst Career
Tyler Wall, Jarrett Rodrick
2021
Global Audit Leadership_cover
Global Audit Leadership
Audley L. Bell
2024
Zabbix 7 IT Infrastructure Monitoring Cookbook_cover
Zabbix 7 IT Infrastructure Monitoring Cookbook
Nathan Liefting, Brian van Baekel
2024
Introduction to Security_cover
Introduction to Security
Robert Fischer, Edward Halibozek
2008
API Security for White Hat Hackers_cover
API Security for White Hat Hackers
Confidence Staveley
2024
Automating Security Detection Engineering_cover
Automating Security Detection Engineering
Dennis Chow
2024
Malware Development for Ethical Hackers_cover
Malware Development for Ethical Hackers
Zhassulan Zhussupov
2024
Cyber Warfare_cover
Cyber Warfare
Paul J. Springer
2024
Secure by Design_cover
Secure by Design
2019
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2022
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2024
A CISO Guide to Cyber Resilience_cover
A CISO Guide to Cyber Resilience
Debra Baker
2024
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Criminal Investigation for the Professional Investigator_cover
Criminal Investigation for the Professional Investigator
BCPI, CLI, Warren J. Sonne
2006
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Police Corruption_cover
Police Corruption
Tim Prenzler
2009
The Practical Guide to HIPAA Privacy and Security Compliance_cover
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Business Continuity Planning_cover
Business Continuity Planning
Ralph L. Kliem, Gregg D. Richie
2015
Handbook of SCADA/Control Systems Security_cover
Handbook of SCADA/Control Systems Security
Burt G. Look
2016
Cybersecurity for Industrial Control Systems_cover
Cybersecurity for Industrial Control Systems
Tyson Macaulay, Bryan L. Singer
2016
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Handbook of Applied Cryptography_cover
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Tradecraft Primer_cover
Tradecraft Primer
Paul Charles Topalian
2017
Counterterrorism_cover
Counterterrorism
Benoît Gomis
2015
Virtuous Policing_cover
Virtuous Policing
David G. Bolgiano, L. Morgan Banks, III, James M. Patterson
2017
Homeland Security and Private Sector Business_cover
Homeland Security and Private Sector Business
Chi-Jen Lee, Cheng-Hsiung Lu, Lucia H. Lee
2014
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Global Digital Data Governance_cover
Global Digital Data Governance
Carolina Aguerre, Malcolm Campbell-Verduyn, Jan Aart Scholte
2024
Cybersecurity_cover
Cybersecurity
C. P. Gupta, K. K. Goyal
2020
Network Security and Cryptography_cover
Network Security and Cryptography
Sarhan M. Musa
2018
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
The Psychology of Insider Risk_cover
The Psychology of Insider Risk
Eric Shaw
2023
Okta Administration Up and Running_cover
Okta Administration Up and Running
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
CompTIA Security+ Practice Tests_cover
CompTIA Security+ Practice Tests
David Seidl
2023
Secure Edge Computing_cover
Secure Edge Computing
Mohiuddin Ahmed, Paul Haskell-Dowland
2021
The Security Risk Assessment Handbook_cover
The Security Risk Assessment Handbook
Douglas Landoll
2021
Effective Threat Investigation for SOC Analysts_cover
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Hybrid Threats, Cyberterrorism and Cyberwarfare_cover
Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Enhancing IoT Security_cover
Enhancing IoT Security
Vidushi Sharma, Gamini Joshi
2023
Zero Trust Overview and Playbook Introduction_cover
Zero Trust Overview and Playbook Introduction
Mark Simos, Nikhil Kumar
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
The DevSecOps Playbook_cover
The DevSecOps Playbook
Sean D. Mack
2023
Nine Steps to Success_cover
Nine Steps to Success
Alan Calder
2024
Cybersecurity Risk Management_cover
Cybersecurity Risk Management
Kurt J. Engemann, Jason A. Witty
2024
Firewalls Don't Stop Dragons_cover
Firewalls Don't Stop Dragons
Carey Parker
2023
Pro Spring Security_cover
Pro Spring Security
Massimo Nardone, Carlo Scarioni
2023
Jump-start Your SOC Analyst Career_cover
Jump-start Your SOC Analyst Career
Tyler Wall, Jarrett Rodrick
2021
Global Audit Leadership_cover
Global Audit Leadership
Audley L. Bell
2024
Zabbix 7 IT Infrastructure Monitoring Cookbook_cover
Zabbix 7 IT Infrastructure Monitoring Cookbook
Nathan Liefting, Brian van Baekel
2024
Introduction to Security_cover
Introduction to Security
Robert Fischer, Edward Halibozek
2008
API Security for White Hat Hackers_cover
API Security for White Hat Hackers
Confidence Staveley
2024
Automating Security Detection Engineering_cover
Automating Security Detection Engineering
Dennis Chow
2024
Malware Development for Ethical Hackers_cover
Malware Development for Ethical Hackers
Zhassulan Zhussupov
2024
Cyber Warfare_cover
Cyber Warfare
Paul J. Springer
2024
Secure by Design_cover
Secure by Design
2019
Cybersecurity For Dummies_cover
Cybersecurity For Dummies
Joseph Steinberg
2022
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide_cover
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Mike Chapple, James Michael Stewart, Darril Gibson
2024
A CISO Guide to Cyber Resilience_cover
A CISO Guide to Cyber Resilience
Debra Baker
2024
ChatGPT for Cybersecurity Cookbook_cover
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
2024
The OSINT Handbook_cover
The OSINT Handbook
Dale Meredith
2024
Effective Vulnerability Management_cover
Effective Vulnerability Management
Chris Hughes, Nikki Robinson
2024
Criminal Investigation for the Professional Investigator_cover
Criminal Investigation for the Professional Investigator
BCPI, CLI, Warren J. Sonne
2006
Cold Cases_cover
Cold Cases
James M. Adcock, Sarah L. Stein
2014
Securing Systems_cover
Securing Systems
Brook S. E. Schoenfield
2015
Police Corruption_cover
Police Corruption
Tim Prenzler
2009
The Practical Guide to HIPAA Privacy and Security Compliance_cover
The Practical Guide to HIPAA Privacy and Security Compliance
Rebecca Herold, Kevin Beaver
2014
Business Continuity Planning_cover
Business Continuity Planning
Ralph L. Kliem, Gregg D. Richie
2015
Handbook of SCADA/Control Systems Security_cover
Handbook of SCADA/Control Systems Security
Burt G. Look
2016
Cybersecurity for Industrial Control Systems_cover
Cybersecurity for Industrial Control Systems
Tyson Macaulay, Bryan L. Singer
2016
Managing Intelligence_cover
Managing Intelligence
John Buckley
2017
Coding Theory and Cryptography_cover
Coding Theory and Cryptography
D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall
2000
Handbook of Applied Cryptography_cover
Handbook of Applied Cryptography
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
2018
Tradecraft Primer_cover
Tradecraft Primer
Paul Charles Topalian
2017
Counterterrorism_cover
Counterterrorism
Benoît Gomis
2015
Virtuous Policing_cover
Virtuous Policing
David G. Bolgiano, L. Morgan Banks, III, James M. Patterson
2017
Homeland Security and Private Sector Business_cover
Homeland Security and Private Sector Business
Chi-Jen Lee, Cheng-Hsiung Lu, Lucia H. Lee
2014
CompTIA A+ Complete Study Guide_cover
CompTIA A+ Complete Study Guide
Quentin Docter, Jon Buhagiar
2022
Cyber Risk Management_cover
Cyber Risk Management
Christopher J Hodson
2024
Global Digital Data Governance_cover
Global Digital Data Governance
Carolina Aguerre, Malcolm Campbell-Verduyn, Jan Aart Scholte
2024
Cybersecurity_cover
Cybersecurity
C. P. Gupta, K. K. Goyal
2020
Network Security and Cryptography_cover
Network Security and Cryptography
Sarhan M. Musa
2018
Tobias on Locks and Insecurity Engineering_cover
Tobias on Locks and Insecurity Engineering
Marc Weber Tobias
2024
The Psychology of Insider Risk_cover
The Psychology of Insider Risk
Eric Shaw
2023
Okta Administration Up and Running_cover
Okta Administration Up and Running
HenkJan de Vries, Lovisa Stenbäcken Stjernlöf
2023
Implementing DevSecOps Practices_cover
Implementing DevSecOps Practices
Vandana Verma Sehgal
2023
CompTIA Security+ Practice Tests_cover
CompTIA Security+ Practice Tests
David Seidl
2023
Secure Edge Computing_cover
Secure Edge Computing
Mohiuddin Ahmed, Paul Haskell-Dowland
2021
The Security Risk Assessment Handbook_cover
The Security Risk Assessment Handbook
Douglas Landoll
2021
Effective Threat Investigation for SOC Analysts_cover
Effective Threat Investigation for SOC Analysts
Mostafa Yahia
2023
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide_cover
Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide
Ankush Chowdhary, Prashant Kulkarni
2023
Hybrid Threats, Cyberterrorism and Cyberwarfare_cover
Hybrid Threats, Cyberterrorism and Cyberwarfare
Mohamed Amine Ferrag, Ioanna Kantzavelou, Leandros Maglaras, Helge Janicke
2023
Cybercrime and Cybersecurity_cover
Cybercrime and Cybersecurity
Paul A. Watters
2023
Burp Suite Cookbook_cover
Burp Suite Cookbook
Dr. Sunny Wear
2023
Enhancing IoT Security_cover
Enhancing IoT Security
Vidushi Sharma, Gamini Joshi
2023
Zero Trust Overview and Playbook Introduction_cover
Zero Trust Overview and Playbook Introduction
Mark Simos, Nikhil Kumar
2023
Automotive Cybersecurity Engineering Handbook_cover
Automotive Cybersecurity Engineering Handbook
Dr. Ahmad MK Nasser
2023
The DevSecOps Playbook_cover
The DevSecOps Playbook
Sean D. Mack
2023