books by subject

Computer Security

Filter by available

CCNP Implementing Secured Converged Wide-Area Networks (ISCW 642-825) Lab Portfolio (Cisco Networking Academy) (Cisco Networking Academy Program)

By Kotfila, David, Moorhouse, Joshua, Wolfson, Ross

CCNP ISCW Official Exam Certification Guide

By Morgan, Brian, Lovering, Neil

Microsoft Windows Security Essentials (Essentials (John Wiley))

By Gibson, Darril

CompTIA CSA+ Study Guide: Exam CS0-001

By Chapple, Mike, Seidl, David

Linux Systems Programming

By Love, Robert

Architecting Mobile Solutions for the Enterprise

By Dino Esposito

Official (ISC)2 Guide to the CISSP CBK, Third Edition (ISC2 Press)

By tipton-harold-f, Hernandez CISSP, Steven

Privacy is Power: Why and How You Should Take Back Control of Your Data

By Véliz, Carissa

Penetration Testing: A Hands-On Introduction to Hacking

By Weidman, Georgia

Cybersecurity Blue Team Toolkit

By Tanner, Nadean H.

Make Your Own Web Page

Scooped! – Media Miss Real Story on Crime While Chasing Sex, Sleaze, & Celebrities (The Facets Of Ruby Series)

By Dave Thomas, David Heinemeier Hansson, Leon Breedt, Mike Clark, Thomas Fuchs, Andreas Schwarz

Blockchain: The Insights You Need from Harvard Business Review (HBR Insights Series)

By Review, Harvard Business, Tapscott, Don, Iansiti, Marco, Lakhani, Karim R., Tucker, Catherine

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

By Andy Greenberg

Schneier on Security

By Schneier, Bruce

E-mail Rules - A Business Guide to Managing Policies, Security, and legal Issues for E-Mail and Digital Communication

By Flynn

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behaviour Changes Online

By Aiken, Mary

Windows 8 Step by Step

By Ciprian Adrian Rusen, Joli Ballew

Commonsense Computer Security: Your Practical Guide to Preventing Accidental and Deliberate Electronic Data Loss

By Smith, Martin R.

Cyber Bullying: Bullying in the Digital Age

By Kowalski, PhD Robin M.

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results (Tools of the Trade)

By Fletcher, Peter, Poon, Alex, Pearce, Ben

Metasploit: The Penetration Tester's Guide

By Kennedy, David, O'Gorman, Jim, Kearns, Devon

BackTrack 5 Cookbook

By Willie Pritchett, David De Smet

Firewall Architecture For Enterprise

By Crothers, Norbert

Virtual Private Networks

By Mike Erwin, Charlie Scott, Paul Wolfe

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans

By Schweitzer, Douglas

Desktop Witness: The Do's and Don'ts of Personal Computer Security: 1

By A. Caloyannides, Michael

JAVA SECURITY SOLUTIONS

By Helton, Rich

Principles of Information Systems Security: Texts and Cases

By Dhillon, Gurpreet

High Integrity Software: The SPARK Approach to Safety and Security

By Barnes, John