Library

Explore 200,000 online courses/books/problem sets in over 2,050 subjects. From Computer Science, Business, and Personal Development to Arts, STEM, and more. Find your perfect MOOC.

Library

Learning Product
Subject
Difficulty
Cost
Certificate
Provider
Publisher
University
Institution
Tag

System Safety for the 21st Century, 2nd Edition

System Safety for the 21st Century Explore an authoritative and complete exploration of basic and advanced concepts in system safety engineering The Second Edition of System Safety for the...

Books Wiley 💰 Information Security

System Safety for the 21st Century, 2nd Edition

System Safety for the 21st Century Explore an authoritative and complete exploration of basic and advanced concepts in system safety engineering The Second Edition of System Safety for...

Building Secure Cars

BUILDING SECURE CARSExplores how the automotive industry can address the increased risks of cyberattacks and incorporate security into the software development lifecycleWhile increased connectivity...

Books Wiley 💰 Information Security

Building Secure Cars

BUILDING SECURE CARSExplores how the automotive industry can address the increased risks of cyberattacks and incorporate security into the software development lifecycleWhile increased...

Hacking Multifactor Authentication

Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However,...

Books Wiley 💰 Information Security

Hacking Multifactor Authentication

Protect your organization from scandalously easy-to-hack MFA security “solutions” Multi-Factor Authentication (MFA) is spreading like wildfire across digital...

Security Engineering, 3rd Edition

Now that there’s software in everything, how can you make anything secure? Understand how to engineer dependable systems with this newly...

Books Wiley 💰 Information Security

Security Engineering, 3rd Edition

Now that there’s software in everything, how can you make anything secure? Understand how to engineer dependable systems with this...

Implementing Cryptography Using Python

Learn to deploy proven cryptographic tools in your applications and servicesCryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including...

Books Wiley 💰 Information Security

Implementing Cryptography Using Python

Learn to deploy proven cryptographic tools in your applications and servicesCryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals,...

Automotive System Safety

Contains practical insights into automotive system safety with a focus on corporate safety organization and safety managementFunctional Safety has become important and mandated in the automotive...

Books Wiley 💰 Information Security

Automotive System Safety

Contains practical insights into automotive system safety with a focus on corporate safety organization and safety managementFunctional Safety has become important and mandated in the...

Cryptography Apocalypse

Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using...

Books Wiley 💰 Information Security

Cryptography Apocalypse

Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age....

Cyber-Risk Informatics

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.This book provides a scientific modeling...

Books Wiley 💰 Information Security

Cyber-Risk Informatics

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.This book provides a scientific...

Threat Modeling: Designing for Security

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable...

Books Wiley 💰 Information Security

Threat Modeling: Designing for Security

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his...

Web Commerce Security Design and Development

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems.Whether it's online banking or...

Books Wiley 💰 Information Security

Web Commerce Security Design and Development

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems.Whether it's online banking...

Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a...

Books Wiley 💰 Information Security

Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition

The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in...

Cyber Operations

Cyber OperationsA rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected...

Books Wiley 💰 Information Security

Cyber Operations

Cyber OperationsA rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more...

Stepping Through Cybersecurity Risk Management

Stepping Through Cybersecurity Risk ManagementAuthoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management.Stepping...

Books Wiley 💰 Information Security

Stepping Through Cybersecurity Risk Management

Stepping Through Cybersecurity Risk ManagementAuthoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk...

See Yourself in Cyber

A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organizationIn See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and...

Books Wiley 💰 Information Security

See Yourself in Cyber

A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organizationIn See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist...

Zero Trust and Third-Party Risk

Dramatically lower the cyber risk posed by third-party software and vendors in your organizationIn Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible...

Books Wiley 💰 Information Security

Zero Trust and Third-Party Risk

Dramatically lower the cyber risk posed by third-party software and vendors in your organizationIn Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an...

The Battle for Your Computer

Discover the extraordinary realities of the world’s most advanced cybersecurity companies and techIn The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security Industry,...

Books Wiley 💰 Information Security

The Battle for Your Computer

Discover the extraordinary realities of the world’s most advanced cybersecurity companies and techIn The Battle for Your Computer: Israel and the Growth of the Global Cyber-Security...

Cybersecurity First Principles: A Reboot of Strategy and Tactics

The first expert discussion of the foundations of cybersecurityIn Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire,...

Books Wiley 💰 Information Security

Cybersecurity First Principles: A Reboot of Strategy and Tactics

The first expert discussion of the foundations of cybersecurityIn Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The...

How to Measure Anything in Cybersecurity Risk, 2nd Edition

A start-to-finish guide for realistically measuring cybersecurity riskIn the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security...

Books Wiley 💰 Information Security

How to Measure Anything in Cybersecurity Risk, 2nd Edition

A start-to-finish guide for realistically measuring cybersecurity riskIn the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information...

Tribe of Hackers Blue Team

Blue Team defensive advice from the biggest names in cybersecurityThe Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in...

Books Wiley 💰 Information Security

Tribe of Hackers Blue Team

Blue Team defensive advice from the biggest names in cybersecurityThe Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names...

Tribe of Hackers Red Team

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.The Tribe of Hackers team is back with a new guide packed with insights from dozens of the...

Books Wiley 💰 Information Security

Tribe of Hackers Red Team

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe.The Tribe of Hackers team is back with a new guide packed with insights from dozens of...

Records : 41120 of 72640 | Page : of 3632