books by subject

Computer Security

Filter by available

Information Technology Law

By Ian J. Lloyd, Lloyd, Ian J.

BackTrack 5 Cookbook

By Willie Pritchett, David De Smet

Metasploit: The Penetration Tester's Guide

By Kennedy, David, O'Gorman, Jim, Kearns, Devon

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results (Tools of the Trade)

By Fletcher, Peter, Poon, Alex, Pearce, Ben

Cyber Bullying: Bullying in the Digital Age

By Kowalski, PhD Robin M.

Commonsense Computer Security: Your Practical Guide to Preventing Accidental and Deliberate Electronic Data Loss

By Smith, Martin R.

Windows 8 Step by Step

By Ciprian Adrian Rusen, Joli Ballew

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behaviour Changes Online

By Aiken, Mary

E-mail Rules - A Business Guide to Managing Policies, Security, and legal Issues for E-Mail and Digital Communication

By Flynn

Schneier on Security

By Schneier, Bruce

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

By Andy Greenberg

Blockchain: The Insights You Need from Harvard Business Review (HBR Insights Series)

By Review, Harvard Business, Tapscott, Don, Iansiti, Marco, Lakhani, Karim R., Tucker, Catherine

Scooped! – Media Miss Real Story on Crime While Chasing Sex, Sleaze, & Celebrities (The Facets Of Ruby Series)

By Dave Thomas, David Heinemeier Hansson, Leon Breedt, Mike Clark, Thomas Fuchs, Andreas Schwarz

Make Your Own Web Page

Cybersecurity Blue Team Toolkit

By Tanner, Nadean H.

Penetration Testing: A Hands-On Introduction to Hacking

By Weidman, Georgia

Privacy is Power: Why and How You Should Take Back Control of Your Data

By Véliz, Carissa

Official (ISC)2 Guide to the CISSP CBK, Third Edition (ISC2 Press)

By tipton-harold-f, Hernandez CISSP, Steven

Architecting Mobile Solutions for the Enterprise

By Dino Esposito

Linux Systems Programming

By Love, Robert

CompTIA CSA+ Study Guide: Exam CS0-001

By Chapple, Mike, Seidl, David

Microsoft Windows Security Essentials (Essentials (John Wiley))

By Gibson, Darril

CCNP ISCW Official Exam Certification Guide

By Morgan, Brian, Lovering, Neil

CCNP Implementing Secured Converged Wide-Area Networks (ISCW 642-825) Lab Portfolio (Cisco Networking Academy) (Cisco Networking Academy Program)

By Kotfila, David, Moorhouse, Joshua, Wolfson, Ross

Nagios Core Administration Cookbook

By Tom Ryder

Mastering Network Security +CD (Paper Only)

By Brenton, C

The Blue Nowhere

By Deaver, Jeffery

Building Robots With Lego Mindstorms

By Mario Ferrari (Author of bestselling "Building Robots with LEGO Mindstorms", Italy), Guilio Ferrari (Author of bestselling "Building Robots with LEGO Mindstorms"

Codes: An Introduction to Information Communication and Cryptography

By Norman L. Biggs

Kali Linux Wireless Penetration Testing: Beginner's Guide

By Vivek Ramachandran, Cameron Buchanan