books by subject
Computer Security

Codes and Cryptography

Liberating Cyberspace: Civil Liberties, Human Rights & the Internet

The Trust Manifesto: What you Need to do to Create a Better Internet

Cybercrime: Protecting your business, your family and yourself

Future Crimes: Inside The Digital Underground and the Battle For Our Connected World

The Limits Of Privacy

Building Secure Software: How to Avoid Security Problems the Right Way

Exploiting Software: How to Break Code

Red Hat Linux Networking and System Administration

Hacking: The Art of Exploitation

SSH the Secure Shell: The Definitive Guide

Windows(R) XP Professional Security

Hacking Windows XP

Hacking Exposed: Network Security Secrets & Solutions, Fourth Edition

Hacker Disassembling Uncovered

Microsoft ISA Server 2006 Unleashed

The Perfect Weapon: war, sabotage, and fear in the cyber age

Delete: The Virtue of Forgetting in the Digital Age

Writing Secure Code

IPSec: Securing VPNs

Human Privacy in Virtual and Physical Worlds: Multidisciplinary Perspectives

Ten Things Every Child With Autism Wishes You Knew

Ten Things Every Child With Autism Wishes You Knew

Advanced Information Systems Engineering: 31st International Conference, CAiSE 2019, Rome, Italy, June 3-7, 2019, Proceedings

Foolproof

Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

Translucent Databases

Digital Watermarking

ASP/MTS/ADSI Web Security
