books by subject

Computer Security

Filter by available

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

By Simon Singh

The 1998 Data Protection Act Explained

By James Mullock, Piers Leigh-Pollitt, The Stationery Office

the-code-book--the-secret-history-of-codes-and-code-breaking

By Singh, Simon, Simon Singh

Supremacy: AI, ChatGPT and the Race That Will Change the World

By Parmy Olson

The Snowden Files

By Luke Harding

NIST SP 800-81-2 Secure Domain Name System (DNS) Deployment Guide

By National Institute of Standards and Technology

Steal This Computer Book

By Wallace Wang

Trading Online: A Step-by-Step Guide to Cyber Profits

By Alpesh Patel

Saving Bletchley Park: How #socialmedia saved the home of the WWII codebreakers

By Sue Black

Cyber-Safe Kids, Cyber-Savvy Teens: Helping Young People Learn To Use the Internet Safely and Responsibly

By Nancy E. Willard

BTEC National Computing Student Book

By Jenny Phillips, Alan Jarvis, Richard McGill, Mark Fishpool, Tim Cook

Practical UNIX Security

By Simson Garfinkel, Gene Spafford

Cybercrime Risks and Responses: Eastern and Western Perspectives

By Russell G. Smith, Ray Cheung, Laurie Yiu-Chung Lau

Human Rights and the Internet

By S. Hick, E. Halpin, E. Hoskins

Hacking Exposed Mobile

By Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar

Policing a Safe, Just and Tolerant Society: An International Model for Policing

By Robert Adlam, Peter Villiers

L.U.C.I in The Sky

By Chris Fox

1337 h4x0r h4ndb00k

By tapeworm

Cybercrime: Law enforcement, security and surveillance in the information age

By Brian D. Loader (University of York, UK), Douglas Thomas

Computer Security

By Dieter Gollmann

Protect Your Privacy: The PGP User's Guide

By William Stallings

At Large: The Strange Case of the World's Biggest Internet Invasion

By Charles C. Mann, David H. Freedman

Anomaly Detection Principles and Algorithms

By Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang

Hacking Exposed Linux

By ISECOM

Hacking: The Art of Exploitation, 2nd Edition

By Jon Erickson

Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem

By Soma Halder, Sinan Ozdemir

Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

By Chiheb Chebbi

Age of Context: Mobile, Sensors, Data and the Future of Privacy

By Shel Israel, Robert Scoble

We Are Anonymous

By Parmy Olson

The Hacker Diaries

By Dan Verton