books by subject
Computer Security
![](https://m.media-amazon.com/images/I/41vcjSHXueL._SL500_.jpg)
Spring in Action
![](https://m.media-amazon.com/images/I/412LF72BQ9L._SL500_.jpg)
Blockchain and the Law: The Rule of Code
![](https://m.media-amazon.com/images/I/51KNFZlnFpL._SL500_.jpg)
Network Security Tools
![](https://m.media-amazon.com/images/I/51imZSASpPL._SL500_.jpg)
Amazon Web Services in Action
![](https://m.media-amazon.com/images/I/51VIynC2scL._SL500_.jpg)
Threat Modeling: Designing for Security
![](https://m.media-amazon.com/images/I/41bbF7E92pL._SL500_.jpg)
Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career
![](https://m.media-amazon.com/images/I/51LwGVmdF4L._SL500_.jpg)
PHP Cookbook
![](https://m.media-amazon.com/images/I/412Ymd3148L._SL500_.jpg)
Codes and Cryptography
![](https://m.media-amazon.com/images/I/412Ymd3148L._SL500_.jpg)
Codes and Cryptography
![](https://m.media-amazon.com/images/I/415zqKyoFvL._SL500_.jpg)
Liberating Cyberspace: Civil Liberties, Human Rights & the Internet
![](https://m.media-amazon.com/images/I/319XeO5r1VL._SL500_.jpg)
The Trust Manifesto: What you Need to do to Create a Better Internet
![](https://m.media-amazon.com/images/I/41LuN6PkvFL._SL500_.jpg)
Cybercrime: Protecting your business, your family and yourself
![](https://m.media-amazon.com/images/I/41a0-HT50yL._SL500_.jpg)
Future Crimes: Inside The Digital Underground and the Battle For Our Connected World
![](https://m.media-amazon.com/images/I/51sQGUPnUKL._SL500_.jpg)
The Limits Of Privacy
![](https://m.media-amazon.com/images/I/51VTxtvjVLL._SL500_.jpg)
Criminal Classes: Offenders at School
![](https://m.media-amazon.com/images/I/41Aazzl6YcL._SL500_.jpg)
Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives
![](https://m.media-amazon.com/images/I/411Iw+PvrSL._SL500_.jpg)
Ten Things Every Child With Autism Wishes You Knew
![](https://m.media-amazon.com/images/I/411Iw+PvrSL._SL500_.jpg)
Ten Things Every Child With Autism Wishes You Knew
![](https://m.media-amazon.com/images/I/31V6-WrlZSL._SL500_.jpg)
Advanced Information Systems Engineering: 31st International Conference, CAiSE 2019, Rome, Italy, June 3-7, 2019, Proceedings
![](https://m.media-amazon.com/images/I/51kCu2kxSlL._SL500_.jpg)
Foolproof
![](https://m.media-amazon.com/images/I/41NQqrfn+FL._SL500_.jpg)
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
![](https://m.media-amazon.com/images/I/41FMirabAbL._SL500_.jpg)
IPSec: Securing VPNs
![](https://m.media-amazon.com/images/I/51G7G5h-gEL._SL500_.jpg)
Disappearing Cryptography: Being and Nothingness on the Net
![](https://m.media-amazon.com/images/I/315RFW0XXGL._SL500_.jpg)
Incident Response: Investigating Computer Crime
![](https://m.media-amazon.com/images/I/51YQDY5D4DL._SL500_.jpg)
Translucent Databases
![](https://m.media-amazon.com/images/I/418etA7lP6L._SL500_.jpg)
ASP/MTS/ADSI Web Security
![](https://m.media-amazon.com/images/I/41ourZ1j0YL._SL500_.jpg)
Digital Watermarking
![](https://m.media-amazon.com/images/I/41xlrsyMyLL._SL500_.jpg)
Building Secure Software: How to Avoid Security Problems the Right Way
![](https://m.media-amazon.com/images/I/51Yq0ud2XXL._SL500_.jpg)
Writing Secure Code
![](https://m.media-amazon.com/images/I/41IvpSHlIpL._SL500_.jpg)