Memmo LogoMemmo - AI-verktyg och digital kurslitteratur
TextbooksCourses
Log in / Sign up
Memmo Logo
The study platform that helps students study smarter and get better grades. Loved by 25 000+ students!
© 2026 Memmo AB
Stockholm, Sweden
Features
  • Quiz
  • Flashcards
  • Summaries
  • AI-Chat
  • Podcast
  • e-Textbooks
  • GPA Calculator
  • Book Categories
Company
  • FAQs
  • Articles
  • About
  • Career
Other
  • Email us
  • Privacy
  • Terms
AWS StartupsGoogle for StartupsMicrosoft for Startups
  • Home
  • All Categories
  • Cybersecurity, Cloud & IoT

Course literature in Cybersecurity, Cloud & IoT

All the course literature you need for studies in Cybersecurity, Cloud & IoT. Here you will find a wide selection of e-books in Cybersecurity, Cloud & IoT. Can't find what you're looking for? Search by ISBN, title or author.

3,439 Books

A Guide to Using the Anonymous Web in Libraries and Information Organizations by Brady D. Lund, Matthew A. Beckstrom

A Guide to Using the Anonymous Web in Libraries and Information Organizations

Brady D. Lund, Matthew A. Beckstrom

490 kr

The Cyber Deterrence Problem by Aaron F. Brantly

The Cyber Deterrence Problem

Aaron F. Brantly

453 kr

Russian Hackers and the War in Ukraine by Julia Sweet

Russian Hackers and the War in Ukraine

Julia Sweet

907 kr

Managing Information Risks by William Saffady

Managing Information Risks

William Saffady

486 kr

Information Technology Protection and Homeland Security by Frank R. Spellman

Information Technology Protection and Homeland Security

Frank R. Spellman

1114 kr

The Cyber Threat and Globalization by Jack A. Jarmon, Pano Yannakogeorgos

The Cyber Threat and Globalization

Jack A. Jarmon, Pano Yannakogeorgos

429 kr

Grey Area by Vinny Troia

Grey Area

Vinny Troia

400 kr

North Korea's Cyber Operations by Ethan Sohn, Jenny Jun, Scott LaFoy

North Korea's Cyber Operations

Ethan Sohn, Jenny Jun, Scott LaFoy

478 kr

Artificial Intelligence and Machine Learning in Cybersecurity by Richard Gwashy Young, PhD

Artificial Intelligence and Machine Learning in Cybersecurity

Richard Gwashy Young, PhD

574 kr

Guide to Computer Network Security by Joseph Migga Kizza

Guide to Computer Network Security

Joseph Migga Kizza

489 kr

Guide to Computer Network Security by Joseph Migga Kizza

Guide to Computer Network Security

Joseph Migga Kizza

559 kr

Metaverse Technologies, Security, and Applications for Healthcare by Ajay Kumar Vyas, Bhavya Alankar, Harleen Kaur, Sourabh Sharma

Metaverse Technologies, Security, and Applications for Healthcare

Ajay Kumar Vyas, Bhavya Alankar, Harleen Kaur, Sourabh Sharma

1912 kr

Rise of the Machines by George Finney, John Kindervag, Zach Vinduska

Rise of the Machines

George Finney, John Kindervag, Zach Vinduska

236 kr

Information Security and Privacy Quick Reference by James Michael Stewart, Joe Shelley, Mike Chapple

Information Security and Privacy Quick Reference

James Michael Stewart, Joe Shelley, Mike Chapple

236 kr

Software-defined Infrastructure by Abdelhamid Mellouk, Brice Augustin, Mohamed Aymen Labiod, Tran Tuan Chu

Software-defined Infrastructure

Abdelhamid Mellouk, Brice Augustin, Mohamed Aymen Labiod, Tran Tuan Chu

1453 kr

Undetectable by

Undetectable

131 kr

Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems by John Chirillo

Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems

John Chirillo

392 kr

Cyber Defense by Jason Edwards

Cyber Defense

Jason Edwards

729 kr

Security 2.0 by

Security 2.0

428 kr

Cyber Resilience in Banking by Richard Gwashy Young, PhD

Cyber Resilience in Banking

Richard Gwashy Young, PhD

589 kr

The Cybersecurity Handbook by Richard Gwashy Young, PhD

The Cybersecurity Handbook

Richard Gwashy Young, PhD

420 kr

Technology, AI, and Operational Security in Banking by Richard Gwashy Young, PhD

Technology, AI, and Operational Security in Banking

Richard Gwashy Young, PhD

589 kr

Blockchain For Healthcare Data Management by Akhil Sharma, Neeraj Kumar Fuloria, Shaweta Sharma, Shivkanya Fuloria

Blockchain For Healthcare Data Management

Akhil Sharma, Neeraj Kumar Fuloria, Shaweta Sharma, Shivkanya Fuloria

645 kr

Cybersecurity in Latvia by Kate E. Kanasta, Mihails Potapovs

Cybersecurity in Latvia

Kate E. Kanasta, Mihails Potapovs

1 kr

← PreviousPage 3 of 144Next →