books by subject

Computer Security

Filter by available

Handbook of Computer Crime Investigation: Forensic Tools and Technology

By Casey, Eoghan

Total Surveillance: Investigating the Big Brother World of E-spies, Eavesdroppers and CCTV

By Parker, John

PHP Cookbook: 1

By Sklar, David

Creating Applications with Mozilla

By Boswell, David

Internet Safety (Hot Topics)

By Hunter, Nick

Cybersecurity Exposed: The Cyber House Rules

By Meeuwisse, Raef

Blockchain: The Insights You Need from Harvard Business Review (HBR Insights Series)

By Review, Harvard Business, Tapscott, Don, Iansiti, Marco, Lakhani, Karim R., Tucker, Catherine

Black Code: Surveillance, Privacy, and the Dark Side of the Internet

By Deibert, Ronald J.

Kingdom of Lies: Adventures in cybercrime

By Fazzini, Kate

Global Challenges for Identity Policies (Technology, Work and Globalization)

By Edgar A. Whitley, Gus Hosein

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

By Harper, Allen, Harris, Shon, Ness, Jonathan, Eagle, Chris, Lenkey, Gideon, Williams, Terron

The .NET Developer's Guide to Windows Security

By Brown, Keith

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

By O'Connor, Tj

Computer Forensics: Incident Response Essentials

By Kruse II, Warren G., Heiser, Jay G.

Hackers: Heroes of the Computer Revolution

By Levy, Steven

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

By Engebretson, Patrick

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

By Shimonski, Robert

BackTrack 5 Cookbook

By Willie Pritchett, David De Smet

Metasploit: The Penetration Tester's Guide

By Kennedy, David, O'Gorman, Jim, Kearns, Devon

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results (Tools of the Trade)

By Fletcher, Peter, Poon, Alex, Pearce, Ben

Cyber Bullying: Bullying in the Digital Age

By Kowalski, PhD Robin M.

Commonsense Computer Security: Your Practical Guide to Preventing Accidental and Deliberate Electronic Data Loss

By Smith, Martin R.

Windows 8 Step by Step

By Ciprian Adrian Rusen, Joli Ballew

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behaviour Changes Online

By Aiken, Mary

E-mail Rules - A Business Guide to Managing Policies, Security, and legal Issues for E-Mail and Digital Communication

By Flynn

Schneier on Security

By Schneier, Bruce

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

By Andy Greenberg

CCNP Implementing Secured Converged Wide-Area Networks (ISCW 642-825) Lab Portfolio (Cisco Networking Academy) (Cisco Networking Academy Program)

By Kotfila, David, Moorhouse, Joshua, Wolfson, Ross

Mastering Network Security +CD (Paper Only)

By Brenton, C

Nagios Core Administration Cookbook

By Tom Ryder