books by subject
Computer Security
Traces Of Guilt
Age of Context: Mobile, Sensors, Data and the Future of Privacy
We Are Anonymous
The Hacker Diaries
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Internet Book Piracy: The Fight to Protect Authors, Publishers, and Our Culture
HTML & XHTML
Human Rights and the Internet
Cybercrime Risks and Responses: Eastern and Western Perspectives
Practical UNIX Security
BTEC National Computing Student Book
Cyber-Safe Kids, Cyber-Savvy Teens: Helping Young People Learn To Use the Internet Safely and Responsibly
Saving Bletchley Park: How #socialmedia saved the home of the WWII codebreakers
Trading Online: A Step-by-Step Guide to Cyber Profits
Steal This Computer Book
NIST SP 800-81-2 Secure Domain Name System (DNS) Deployment Guide
ASP/MTS/ADSI Web Security
Foolproof
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
IPSec: Securing VPNs
Disappearing Cryptography: Being and Nothingness on the Net
Incident Response: Investigating Computer Crime
Translucent Databases
Writing Secure Code
Microsoft ISA Server 2006 Unleashed
The Perfect Weapon: war, sabotage, and fear in the cyber age
Delete: The Virtue of Forgetting in the Digital Age
Advanced Information Systems Engineering: 31st International Conference, CAiSE 2019, Rome, Italy, June 3-7, 2019, Proceedings
Building Secure Software: How to Avoid Security Problems the Right Way