books by subject

Computer Security

Filter by available

Intercept: The Secret History of Computers and Spies

By Gordon Corera

The Touch

By Daniel Keyes

Hack I.T. - Security Through Penetration Testing

By T. J. Klevinsky, Scott Laliberte, Ajay Gupta

Hacking Exposed Linux

By Brian Hatch, James Lee, George Kurtz

Exploiting Software: How to Break Code

By Karen Gettman, John Fuller, Greg Hoglund, Gary McGraw

Red Hat Linux Networking and System Administration

By Terry Collings, Kurt Wall

Hacking: The Art of Exploitation

By Jon Erickson

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

By Dafydd Stuttard, Marcus Pinto

Liberating Cyberspace: Civil Liberties, Human Rights & the Internet

By Liberty

Codes and Cryptography

By Dominic Welsh (Fellow and Tutor in Mathematics, Fellow and Tutor in Mathematics, Merton College, Oxford)

Codes and Cryptography

By Dominic Welsh (Fellow and Tutor in Mathematics, Fellow and Tutor in Mathematics, Merton College, Oxford)

PHP Cookbook

By David F. Sklar, Adam Trachtenberg

Confident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career

By Jessica Barker

Threat Modeling: Designing for Security

By Adam Shostack

Amazon Web Services in Action

By Michael Wittig, Andreas Wittig

Network Security Tools

By Nitesh Dhanjani

Blockchain and the Law: The Rule of Code

By Primavera De Filippi, Aaron Wright

Spring in Action

By Craig Walls

Dark Territory: The Secret History of Cyber War

By Fred Kaplan

Introduction to Network Security

By Douglas Jacobson

Group Policy: Fundamentals, Security, and Troubleshooting

By Jeremy Moskowitz

Cybersecurity and Cyberwar: What Everyone Needs to KnowRG

By Peter W. Singer (Senior Fellow, Senior Fellow, Brookings Institution), Allan Friedman (fellow in Governance Studies, and Research Director of the Center for Technology Innovation, fellow in Governance Studies, and Research Director of the Center for Te...

The NSA Report: Liberty and Security in a Changing World

By President's Review Group on Intelligence and Communications Technologies, The, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein

Surveillance Valley: The Secret Military History of the Internet

By Yasha Levine

Privacy is Power: Why and How You Should Take Back Control of Your Data

By Carissa Veliz

World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing

By Richard S. Hunter

Foundations of Security: What Every Programmer Needs to Know

By Christoph Kern, Anita Kesavan, Neil Daswani

Inside Cyber Warfare: Mapping the Cyber Underworld

By Jeffrey Carr

Network Warrior

By Gary A. Donahue

Network Security For Dummies

By Chey Cobb (Former Sr. Tech Security Advisor, National Reconnaissance Office)