books by subject

Computer Security

Filter by available

Codes and Cryptography

By Dominic Welsh (Fellow and Tutor in Mathematics, Fellow and Tutor in Mathematics, Merton College, Oxford)

Liberating Cyberspace: Civil Liberties, Human Rights & the Internet

By Liberty

The Trust Manifesto: What you Need to do to Create a Better Internet

By Damian Bradfield

Cybercrime: Protecting your business, your family and yourself

By Todd Wade

Future Crimes: Inside The Digital Underground and the Battle For Our Connected World

By Marc Goodman

The Limits Of Privacy

By Amitai Etzioni

Building Secure Software: How to Avoid Security Problems the Right Way

By John Viega, Gary R. McGraw

Exploiting Software: How to Break Code

By Karen Gettman, John Fuller, Greg Hoglund, Gary McGraw

Red Hat Linux Networking and System Administration

By Terry Collings, Kurt Wall

Hacking: The Art of Exploitation

By Jon Erickson

SSH the Secure Shell: The Definitive Guide

By Daniel Barrett, Richard E. Silverman

Windows(R) XP Professional Security

By C. Weber, Gary Bahadur

Hacking Windows XP

By Steve Sinchak, Ziff Davis

Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition

By Stuart Mcclure, Joel Scambray, George Kurtz

Hacker Disassembling Uncovered

By Kris Kaspersky

Microsoft ISA Server 2006 Unleashed

By Michael Noel

The Perfect Weapon: war, sabotage, and fear in the cyber age

By David E. Sanger

Delete: The Virtue of Forgetting in the Digital Age

By Viktor Mayer-Schoenberger

Writing Secure Code

By Microsoft Press

IPSec: Securing VPNs

By Carlton Davis

Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives

By Mary C. Lacity, Lynda Coon

Ten Things Every Child With Autism Wishes You Knew

By Ellen Notbohm

Ten Things Every Child With Autism Wishes You Knew

By Notbohm, Ellen

Advanced Information Systems Engineering: 31st International Conference, CAiSE 2019, Rome, Italy, June 3-7, 2019, Proceedings

By Paolo Giorgini, Barbara Weber

Foolproof

By Dianne Pugh

Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

By Prabath Siriwardena

Translucent Databases

By Wayner, Peter

Digital Watermarking

By Ingemar Cox (Professor, university college, London, U.K.), Matthew Miller (NEC, Princeton, NJ, U.S.A.), Jeffrey Bloom (Thomson, Mathew Miller

ASP/MTS/ADSI Web Security

By Richard Harrison

PHP in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))

By Paul Hudson