books by subject

Computer Security

Filter by available

Windows 8 Step by Step

By Ciprian Adrian Rusen, Joli Ballew

Commonsense Computer Security: Your Practical Guide to Preventing Accidental and Deliberate Electronic Data Loss

By Smith, Martin R.

Cyber Bullying: Bullying in the Digital Age

By Kowalski, PhD Robin M.

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results (Tools of the Trade)

By Fletcher, Peter, Poon, Alex, Pearce, Ben

Metasploit: The Penetration Tester's Guide

By Kennedy, David, O'Gorman, Jim, Kearns, Devon

BackTrack 5 Cookbook

By Willie Pritchett, David De Smet

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

By Shimonski, Robert

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

By Engebretson, Patrick

Hackers: Heroes of the Computer Revolution

By Levy, Steven

Computer Forensics: Incident Response Essentials

By Kruse II, Warren G., Heiser, Jay G.

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

By O'Connor, Tj

The .NET Developer's Guide to Windows Security

By Brown, Keith

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

By Harper, Allen, Harris, Shon, Ness, Jonathan, Eagle, Chris, Lenkey, Gideon, Williams, Terron

Global Challenges for Identity Policies (Technology, Work and Globalization)

By Edgar A. Whitley, Gus Hosein

Kingdom of Lies: Adventures in cybercrime

By Fazzini, Kate

Black Code: Surveillance, Privacy, and the Dark Side of the Internet

By Deibert, Ronald J.

Computer Security (Understanding Computers S.)

By the editors of Time-Life Books, Time-Life Books, of

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance: 13 (IEEE Press Series on Information and Communication Networks Security)

By Jacobs

Beyond Fear: Thinking Sensibly About Security in an Uncertain World

By Bruce Schneier

Windows Server® 2008 PKI and Certificate Security (PRO-Other)

By Brian Komar

Smart Card Research and Advanced Applications: IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September ... Information and Communication Technology, 52...

By Domingo-Ferrer, Josep, Chan, David, Watson, Anthony

PHP in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))

By Paul Hudson

Unix Security for the Organization

By R. Bringle Bryant

The Blue Nowhere

By Deaver, Jeffery

Doctor Ecco's Cyberpuzzles: 36 Puzzles for Hackers and Other Mathematical Detectives

By Shasha, Dennis E.

Computer Software: Legal Protection in the United Kingdom

By Carr, Henry, QC, Richard Arnold

Principles of Information Security

By Whitman, Michael

Malware Analyst′s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code

By Ligh, Michael, Adair, Steven, Hartstein, Blake, Richard, Matthew

Solving Cyber Risk: Protecting Your Company and Society

By Coburn, Andrew, Leverett, Eireann, Woo, Gordon

Security Metrics: Replacing Fear, Uncertainty, and Doubt

By Jaquith, Andrew