Skip to main content
Browse
Institutions
Learners
Login
Sign up to read
WEBSITE LANGUAGE
Deutsch - DE
English - EN
selected language
Español - ES
Français - FR
Italiano - IT
Your selection
will not affect books.
Website language selection impacts menus and navigation.
globe icon
close
WEBSITE LANGUAGE
Deutsch - DE
English - EN
selected language
Español - ES
Français - FR
Italiano - IT
Your selection
will not affect books.
Website language selection impacts menus and navigation.
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Computer Science
Cyber Security
Computer Science
Cyber Security
Explore
Books
Related topics
English
open
Most popular
open
Showing 421 - 480 out of 1,000+ books
AWS Certified Security – Specialty Exam Guide
Stuart Scott
2020
Sign up to read
AWS Certified Security – Specialty Exam Guide
Stuart Scott
2020
IoT
Souvik Pal, Vicente García Díaz, Dac-Nhuong Le
2020
Sign up to read
IoT
Souvik Pal, Vicente García Díaz, Dac-Nhuong Le
2020
Hands-On Web Penetration Testing with Metasploit
Harpreet Singh, Himanshu Sharma
2020
Sign up to read
Hands-On Web Penetration Testing with Metasploit
Harpreet Singh, Himanshu Sharma
2020
Metasploit 5.0 for Beginners
Sagar Rahalkar
2020
Sign up to read
Metasploit 5.0 for Beginners
Sagar Rahalkar
2020
Cybersecurity
C. P. Gupta, K. K. Goyal
2020
Sign up to read
Cybersecurity
C. P. Gupta, K. K. Goyal
2020
Cybersecurity For Dummies
Joseph Steinberg
2019
Sign up to read
Cybersecurity For Dummies
Joseph Steinberg
2019
Cybercrime and Digital Deviance
Roderick S. Graham, 'Shawn K. Smith
2019
Sign up to read
Cybercrime and Digital Deviance
Roderick S. Graham, 'Shawn K. Smith
2019
Children and Mobile Phones
Barrie Gunter
2019
Sign up to read
Children and Mobile Phones
Barrie Gunter
2019
Learn Microsoft Azure
Mohamed Wali
2018
Sign up to read
Learn Microsoft Azure
Mohamed Wali
2018
Blockchain Developer's Guide
Brenn Hill, Samanyu Chopra, Paul Valencourt, Narayan Prusty
2018
Sign up to read
Blockchain Developer's Guide
Brenn Hill, Samanyu Chopra, Paul Valencourt, Narayan Prusty
2018
The Insider Threat
Eleanor E. Thompson
2018
Sign up to read
The Insider Threat
Eleanor E. Thompson
2018
Bug Bounty Hunting Essentials
Carlos A. Lozano, Shahmeer Amir
2018
Sign up to read
Bug Bounty Hunting Essentials
Carlos A. Lozano, Shahmeer Amir
2018
Hands-On Security in DevOps
Tony Hsu
2018
Sign up to read
Hands-On Security in DevOps
Tony Hsu
2018
Cyber Wars
Charles Arthur
2018
Sign up to read
Cyber Wars
Charles Arthur
2018
Python for Offensive PenTest
Hussam Khrais
2018
Sign up to read
Python for Offensive PenTest
Hussam Khrais
2018
FinTech
Parag Y Arjunwadkar
2018
Sign up to read
FinTech
Parag Y Arjunwadkar
2018
Blockchain and the Law
Primavera De Filippi, Aaron Wright
2018
Sign up to read
Blockchain and the Law
Primavera De Filippi, Aaron Wright
2018
Network Security and Cryptography
Sarhan M. Musa
2018
Sign up to read
Network Security and Cryptography
Sarhan M. Musa
2018
Practical Network Security
Neha Saxena
2018
Sign up to read
Practical Network Security
Neha Saxena
2018
Hacking the Human
Ian Mann
2017
Sign up to read
Hacking the Human
Ian Mann
2017
Big Data Analytics in Cybersecurity
Onur Savas, Julia Deng
2017
Sign up to read
Big Data Analytics in Cybersecurity
Onur Savas, Julia Deng
2017
Security Operations Center Guidebook
Gregory Jarpey, Scott McCoy
2017
Sign up to read
Security Operations Center Guidebook
Gregory Jarpey, Scott McCoy
2017
Advanced Penetration Testing
Wil Allsopp
2017
Sign up to read
Advanced Penetration Testing
Wil Allsopp
2017
Official2® Guide to the ISSAP® CBK
(ISC)² Corporate
2017
Sign up to read
Official2® Guide to the ISSAP® CBK
(ISC)² Corporate
2017
The Data Protection Officer
Paul Lambert
2016
Sign up to read
The Data Protection Officer
Paul Lambert
2016
CBAP® Certification and BABOK® Study Guide
Hans Jonasson
2016
Sign up to read
CBAP® Certification and BABOK® Study Guide
Hans Jonasson
2016
Insider Threat
Julie Mehan
2016
Sign up to read
Insider Threat
Julie Mehan
2016
Understanding White-Collar Crime
Petter Gottschalk
2016
Sign up to read
Understanding White-Collar Crime
Petter Gottschalk
2016
CISSP in 21 Days - Second Edition
M. L. Srinivasan
2016
Sign up to read
CISSP in 21 Days - Second Edition
M. L. Srinivasan
2016
Handbook of SCADA/Control Systems Security
Burt G. Look
2016
Sign up to read
Handbook of SCADA/Control Systems Security
Burt G. Look
2016
Cybersecurity for Industrial Control Systems
Tyson Macaulay, Bryan L. Singer
2016
Sign up to read
Cybersecurity for Industrial Control Systems
Tyson Macaulay, Bryan L. Singer
2016
Security and Privacy in Internet of Things
Fei Hu
2016
Sign up to read
Security and Privacy in Internet of Things
Fei Hu
2016
Encyclopedia of Information Systems and Technology - Two Volume Set
Phillip A. Laplante
2015
Sign up to read
Encyclopedia of Information Systems and Technology - Two Volume Set
Phillip A. Laplante
2015
Security Supervision and Management
IFPO
2015
Sign up to read
Security Supervision and Management
IFPO
2015
The Tao of Open Source Intelligence
Stewart Bertram
2015
Sign up to read
The Tao of Open Source Intelligence
Stewart Bertram
2015
Corporate Security Management
Marko Cabric
2015
Sign up to read
Corporate Security Management
Marko Cabric
2015
Advanced Persistent Threat
Eric Cole
2012
Sign up to read
Advanced Persistent Threat
Eric Cole
2012
Routledge Handbook of Surveillance Studies
Kirstie Ball, Kevin Haggerty, David Lyon
2012
Sign up to read
Routledge Handbook of Surveillance Studies
Kirstie Ball, Kevin Haggerty, David Lyon
2012
Developer's Guide to Web Application Security
Michael Cross
2011
Sign up to read
Developer's Guide to Web Application Security
Michael Cross
2011
Google Hacking for Penetration Testers
Bill Gardner, Johnny Long, Justin Brown
2011
Sign up to read
Google Hacking for Penetration Testers
Bill Gardner, Johnny Long, Justin Brown
2011
Financial Investigation and Forensic Accounting
George A. Manning
2010
Sign up to read
Financial Investigation and Forensic Accounting
George A. Manning
2010
The History of Information Security
2007
Sign up to read
The History of Information Security
2007
Applied Cryptanalysis
Mark Stamp, Richard M. Low
2007
Sign up to read
Applied Cryptanalysis
Mark Stamp, Richard M. Low
2007
Practical Hacking Techniques and Countermeasures
Mark D. Spivey
2006
Sign up to read
Practical Hacking Techniques and Countermeasures
Mark D. Spivey
2006
An Introduction to Cryptography
Richard A. Mollin
2006
Sign up to read
An Introduction to Cryptography
Richard A. Mollin
2006
Phishing Exposed
Lance James
2005
Sign up to read
Phishing Exposed
Lance James
2005
Firewalls
John R. Vacca, Scott Ellis
2004
Sign up to read
Firewalls
John R. Vacca, Scott Ellis
2004
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0
Jason Edwards
2024
Sign up to read
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0
Jason Edwards
2024
Cybersecurity Risk Management
Kurt J. Engemann, Jason A. Witty
2024
Sign up to read
Cybersecurity Risk Management
Kurt J. Engemann, Jason A. Witty
2024
Global Audit Leadership
Audley L. Bell
2024
Sign up to read
Global Audit Leadership
Audley L. Bell
2024
Web 3.0
Prabhat Kumar Srivastav, Prateek Singhal, Basudeo Singh Roohani, Nitin Sharma
2024
Sign up to read
Web 3.0
Prabhat Kumar Srivastav, Prateek Singhal, Basudeo Singh Roohani, Nitin Sharma
2024
Secure and Smart Cyber-Physical Systems
Uttam Ghosh, Fortune Mhlanga, Danda B Rawat
2024
Sign up to read
Secure and Smart Cyber-Physical Systems
Uttam Ghosh, Fortune Mhlanga, Danda B Rawat
2024
The Expert in the Next Office
M. E. Kabay
2024
Sign up to read
The Expert in the Next Office
M. E. Kabay
2024
ISO 27001 Controls – A guide to implementing and auditing, Second edition
Bridget Kenyon
2024
Sign up to read
ISO 27001 Controls – A guide to implementing and auditing, Second edition
Bridget Kenyon
2024
Social Engineering in Cybersecurity
2024
Sign up to read
Social Engineering in Cybersecurity
2024
The Adoption of Fintech
Syed Hasan Jafar, Hemachandran K, Shakeb Akhtar, Parvez Alam Khan, Hani El-Chaarani
2024
Sign up to read
The Adoption of Fintech
Syed Hasan Jafar, Hemachandran K, Shakeb Akhtar, Parvez Alam Khan, Hani El-Chaarani
2024
The Reign of Botnets
David Senecal
2024
Sign up to read
The Reign of Botnets
David Senecal
2024
Cybersecurity Strategies and Best Practices
Milad Aslaner
2024
Sign up to read
Cybersecurity Strategies and Best Practices
Milad Aslaner
2024
The Comprehensive Guide to Cybersecurity Careers
Jason Edwards
2024
Sign up to read
The Comprehensive Guide to Cybersecurity Careers
Jason Edwards
2024
Ultimate Pentesting for Web Applications
Dr. Rohit Gautam, Dr. Shifa Cyclewala
2024
Sign up to read
Ultimate Pentesting for Web Applications
Dr. Rohit Gautam, Dr. Shifa Cyclewala
2024
1
...
7
8
9