books by subject

Computer Security

Filter by available

Decision and Game Theory for Security: 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedings: 11199 (Lecture Notes in Computer Science, 11199)

By Bushnell, Linda, Poovendran, Radha, Başar, Tamer

Microsoft Visual C# 2013 Step by Step

By John Sharp

Snakeskin

By McCabe, John

Data Protection Act 1998

By Wiewiorka, Emily

Security Complete (Complete S.)

By Evans, Dave, Jarboe, Greg, Thomases, Hollis, Smith, Mari, Treadaway, Chris

Windows XP/2000 Security Inside Out

By Bott, Ed

Hello World

By Fry, Hannah

Hacking for Dummies (For Dummies (Computer/Tech))

By Beaver, Kevin, McClure, Stuart

Running Linux

By Matthias Kalle Dalheimer, Lar Kaufman, Matt Welsh

Digital Certificates: Applied Internet Security

By Feghhi, Jalal, Williams, Peter

Software Security: Building Security In (Addison-Wesley Software Security)

By McGraw, Gary

SSl and TLS: Building and Designing Secure Systems: Designing and Building Secure Systems

By Rescorla, Eric, Karen Gettman

Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management

By Steel, Christopher, Nagappan, Ramesh, Lai, Ray

J2EE Security for Servlets, EJBs, and Web Services (Hewlett-Packard Professional Books)

By Kumar, Pankaj

Firewalls and Internet Security: Repelling The Wily Hacker

By Cheswick, William R., Bellovin, Steven M.

Writing Secure Code

By Michael Howard, David LeBlanc

Implementing Backup and Recovery: The Readiness Guide for the Enterprise (Veritas Series)

By Little, David B

Java I/O: Tips and Techniques for Putting I/O to Work

By Elliotte Rusty Harold

Hackers & Painters: Big Ideas from the Computer Age

By Paul Graham

Online Share Investing: A UK Guide

By Fitt, Alistair

MCSE Training Kit (Exam 70-220): Designing Microsoft® Windows® 2000 Network Security (Pro-Certification)

By Microsoft Corporation

The Attention Merchants: The Epic Struggle to Get Inside Our Heads

By Wu, Tim

Measuring and Managing Information Risk: A FAIR Approach

By Freund, Dr. Jack, Jones, Jack

Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford Law Books)

By Nissenbaum, Helen

High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace

By Ludlow, Peter, Godwin, Mike

Move Fast and Break Things: How Facebook, Google and Amazon Have Cornered Culture and Undermined Democracy

By Taplin, Jonathan

Cryptography: A Very Short Introduction: 68 (Very Short Introductions)

By PIPER & MURPHY, Piper, Fred, Murphy, Sean

Web Security Basics

By Bhati, Sweetha

Art of Deception C: Controlling the Human Element of Security

By Mitnick, Simon

Introduction to Computer Security: International Edition

By Goodrich, Michael, Tamassia, Roberto