Go to content
Catalog
Light reading
Fantasy
Detective stories
Action, thriller literature
Science fiction
Romance novels
All 12
Serious reading
Contemporary prose
Classical literature
Serious about history
Biographies and memoirs
Poems, poetry
All 6
History
Popular history
Travel books
Biographies and memoirs
Historical detective stories
Historical literature
All 12
Business books
Personal effectiveness
Management
Popular business
Foreign business literature
Time management
All 31
Knowledge and skills
Self-development / personal growth
Popular science literature
Educational and scientific literature
Business books
Life stories
All 12
Psychology, motivation
Psychology books
Self-development / personal growth
Religion and spiritual literature
Biographies and memoirs
Life stories
All 7
Sports, health, beauty
Medicine and health
Sports
Sex / sex guides
Beauty
Hobbies, leisure
Yoga
Cooking
Hobbies / interests
Fine arts
Handicrafts and crafts
All 19
Home, country house
Cooking
Hobbies / interests
Household
Handicrafts and crafts
Pets
All 16
Children's books
Foreign children's books
Fairy tales
Books for children
Books for preschoolers
Books for teenagers
All 15
For parents
Parenting
Child psychology
Children's books
Children's health
Journalism and periodicals
Journalistic literature
Periodicals
Podcasts
Exclusives
Drafts
Free books
All 142 genres
Find
Saved
Cart
My books
Log in
Promo code
New releases
Popular
Audiobooks
More
Mobile applications
All books
knowledge and skills
Computers
information security
information security
Genres
Computers
information security
Format
Text
Text
Audio
Audio
Podcast
Podcast
Language
Russian
Russian
English
English
Spanish
Spanish
French
French
Italian
Italian
Show all
Highly rated
Не выбран
Books with 4 and 5 star ratings
Discounted on specials
Не выбран
Litres Authors
Не выбран
Exclusives
Не выбран
Popular
Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks
Б. В. Окунев и др.
Text PDF
PDF
Average rating 5 based on 1 ratings
5
1
$1.71
Security Patterns
Frank Buschmann и др.
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$96
Internet Security
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$150
Applied Cryptanalysis
Mark Stamp и др.
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$153.60
Information Security Governance
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$122.34
Hacking Point of Sale
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$72
Cryptography and Public Key Infrastructure on the Internet
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$84
Information Security
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$125.94
Computer Security and Cryptography
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$186
Security Engineering
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$102
Cryptology Unlocked
Reinhard Wobst и др.
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$60
Innocent Code
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$54
Secrets and Lies
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$21.54
Hardware-based Computer Security Techniques to Defeat Hackers
Roger Dube R.
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$153.60
Exclusive
Hacking For Dummies
Kevin Beaver
Text PDF
PDF
Average rating 4 based on 1 ratings
4
1
$29.99
Exclusive
CompTIA PenTest+ Study Guide. Exam PT0-001
Mike Chapple и др.
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$72
Public Key Cryptography. Applications and Attacks
Lynn Batten Margaret
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$98.46
Information Security. Principles and Practice
Mark Stamp
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$140.57
Information Security. Principles and Practice
Mark Stamp
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$152.40
Data-Driven Security. Analysis, Visualization and Dashboards
Rudis Bob и др.
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$60
IP Address Management Principles and Practice
Timothy Rooney
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$159.60
Public Key Cryptography. Applications and Attacks
Lynn Batten Margaret
Text PDF
PDF
Average rating 3 based on 4 ratings
3
4
$106.74
The Death of the Internet
Markus Jakobsson
Text PDF
PDF
Average rating 5 based on 2 ratings
5
2
$94.74
Cybercrime and Cyber Warfare
Igor Bernik
Text PDF
PDF
Average rating 0 based on 0 ratings
0
$121.14
Show more
Back
1
2
...
27
Forward