books by subject

Computer Security

Filter by available

Human Rights and the Internet

By S. Hick, E. Halpin, E. Hoskins

HTML & XHTML

By Chuck Musciano

Internet Book Piracy: The Fight to Protect Authors, Publishers, and Our Culture

By Gini Graham Scott

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

By TJ O'Connor

The Hacker Diaries

By Dan Verton

We Are Anonymous

By Parmy Olson

Age of Context: Mobile, Sensors, Data and the Future of Privacy

By Shel Israel, Robert Scoble

Traces Of Guilt

By Neil Barrett

Y2K

By Victor Porlier

Gordon Welchman: Bletchley Park's Architect of Ultra Intelligence

By Joel Greenberg

The Little Black Book of Data and Democracy: From Innocent Tweeting to an Attempted Coup: How social media threatens our very way of life

By Kyle Taylor

Global Electronic Commerce - A Policy Primer

By Catherine Mann, Sue Eckert, Sarah Cleeland Knight

A Simple Guide to Security & Privacy on Your PC

By Cassade, Manon

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

By Rich Cannings, Himanshu Dwivedi, Zane Lackey

Hacking Exposed Mobile

By Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar

Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

By Chiheb Chebbi

Hands-On Machine Learning for Cybersecurity: Safeguard your system by making your machines intelligent using the Python ecosystem

By Soma Halder, Sinan Ozdemir

Hacking: The Art of Exploitation, 2nd Edition

By Jon Erickson

Hacking Exposed Linux

By ISECOM

CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701

By Mike Chapple, David Seidl

The History Book

By Humphrey Hawksley

Ccta: Service Management Set **individual Vols Available**

By CCTA Staff, Central Computer and Telecommunications Agency

Is My Cell Phone Bugged?: Everything You Need to Know to Keep Your Mobile Conversations Private

By Kevin D. Murray

Permanent Record

By Edward Snowden

FinOps for Snowflake: A Guide to Cloud Financial Optimization

By YV Ravi Kumar, VELU NATARAJAN, Parag Bhardwaj

The Snowden Files: The Inside Story of the World's Most Wanted Man

By Luke Harding

IT Governance: A Manager's Guide to Data Security and ISO 27001/ISO 27002

By Alan Calder, Steve Watkins

Risk Management for Computer Security: Protecting Your Network and Information Assets

By Andy Jones, Debi Ashenden

CEH Certified Ethical Hacker Cert Guide (Certification Guide)

By Gregg, Michael, Santos, Omar

Running Linux

By Matt Welsh, Lar Kaufman