books by subject

Computer Security

Filter by available

Official (ISC)2 Guide to the CISSP CBK, Third Edition (ISC2 Press)

By tipton-harold-f, Hernandez CISSP, Steven

Kingdom of Lies: Adventures in cybercrime

By Fazzini, Kate

Global Challenges for Identity Policies (Technology, Work and Globalization)

By Edgar A. Whitley, Gus Hosein

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

By Harper, Allen, Harris, Shon, Ness, Jonathan, Eagle, Chris, Lenkey, Gideon, Williams, Terron

The .NET Developer's Guide to Windows Security

By Brown, Keith

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

By O'Connor, Tj

Computer Forensics: Incident Response Essentials

By Kruse II, Warren G., Heiser, Jay G.

Hackers: Heroes of the Computer Revolution

By Levy, Steven

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

By Engebretson, Patrick

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

By Shimonski, Robert

BackTrack 5 Cookbook

By Willie Pritchett, David De Smet

Metasploit: The Penetration Tester's Guide

By Kennedy, David, O'Gorman, Jim, Kearns, Devon

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results (Tools of the Trade)

By Fletcher, Peter, Poon, Alex, Pearce, Ben

Cyber Bullying: Bullying in the Digital Age

By Kowalski, PhD Robin M.

Commonsense Computer Security: Your Practical Guide to Preventing Accidental and Deliberate Electronic Data Loss

By Smith, Martin R.

Windows 8 Step by Step

By Ciprian Adrian Rusen, Joli Ballew

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behaviour Changes Online

By Aiken, Mary

E-mail Rules - A Business Guide to Managing Policies, Security, and legal Issues for E-Mail and Digital Communication

By Flynn

Schneier on Security

By Schneier, Bruce

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

By Andy Greenberg

Blockchain: The Insights You Need from Harvard Business Review (HBR Insights Series)

By Review, Harvard Business, Tapscott, Don, Iansiti, Marco, Lakhani, Karim R., Tucker, Catherine

Scooped! – Media Miss Real Story on Crime While Chasing Sex, Sleaze, & Celebrities (The Facets Of Ruby Series)

By Dave Thomas, David Heinemeier Hansson, Leon Breedt, Mike Clark, Thomas Fuchs, Andreas Schwarz

Make Your Own Web Page

Cybersecurity Blue Team Toolkit

By Tanner, Nadean H.

Penetration Testing: A Hands-On Introduction to Hacking

By Weidman, Georgia

Privacy is Power: Why and How You Should Take Back Control of Your Data

By Véliz, Carissa

Creating Applications with Mozilla

By Boswell, David

Internet Safety (Hot Topics)

By Hunter, Nick

Cybersecurity Exposed: The Cyber House Rules

By Meeuwisse, Raef

PHP Cookbook: 1

By Sklar, David