Computer security
Label
Computer security
Name
Computer security
Focus
Actions
Incoming Resources
- The hacker's guide to OS X, exploiting OS X from the root up, Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei ; Pat Engebretson, technical editor
- Practical malware analysis, the hands-on guide to dissecting malicious software, by Michael Sikorski and Andrew Honig
- Cybersecurity, by Joseph Steinberg
- Information warfare, chaos on the electronic superhighway, Winn Schwartau
- Net Force, attack protocol, written by Jerome Preisler
- The international handbook of computer security, Jae K. Shim ... [et al.]
- Future Crimes, Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, Marc Goodman
- Cybersecurity today and tomorrow, pay now or pay later, Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council
- PC magazine fighting spyware, viruses, and malware, Ed Tittel
- Computer science and IT, investigating a cyber attack, Anne Rooney
- Future crimes, everything is connected, everyone is vulnerable and what we can do about it, Marc Goodman
- Digital forensics explained, Greg Gogolin
- AutoCAD for dummies, by Ralph Grabowski
- Hackers' handbook 3.0, Dr. K
- A leader's guide to cybersecurity, why boards need to lead--and how to do it, Thomas J. Parenty, Jack J. Domet
- Introduction to cryptography with Java applets, David Bishop
- Hunting cyber criminals, a hacker's guide to online intelligence gathering tools and techniques, Vinny Troia, PhD
- Coding democracy, how hackers are disrupting power, surveillance, and authoritarianism, Maureen Webb ; forword by Cory Doctorow
- Cyberphobia, identity, trust, security and the Internet, Edward Lucas
- Hacking the future, privacy, identity, and anonymity on the Web, Cole Stryker
- AutoCAD for dummies, by Bill Fane
- Hacking exposed Cisco networks, Cisco security secrets & solutions, Andrew A. Vladimirov ... [et al.]
- Network security hacks, Andrew Lockhart
- A DIY smart home guide, tools for automating your home monitoring and security using Arduino, ESP8266, and Android, Robert Chin
- The art of deception, controlling the human element of security, Kevin D. Mitnick & William L. Simon
- How cybersecurity really works, a hands-on guide for total beginners, by Sam Grubb
- Cybersecurity is everybody's business, solve the security puzzle for your small business and home, Scott N. Schober with Criag W. Schober
- Conoce todo sobre hacking con ingenieria social, técnicas para hackear humanos, Antonio Ramos Varón, Carlos Alberto Barbero Muñoz, David Marugán Rodriguez, Ismael González Durán
- Future crimes, Marc Goodman
- Information hiding techniques for steganography and digital watermarking, Stefan Katzenbeisser, Fabien A.P. Petitcolas, editors
- You'll see this message when it is too late, the legal and economic aftermath of cybersecurity breaches, Josephine Wolff
- Conquer the web, the ultimate cybersecurity guide, edited by Jonathan Reuvid
- Cyber self-defense, expert advice to avoid online predators, identity theft, and cyberbullying, Alexis Moore and Laurie J. Edwards
- The complete guide to Internet security, Mark S. Merkow and James Breithaupt
- Cyberjutsu, cybersecurity for the modern ninja, by Ben McCarty
- Protecting your library's digital sources, the essential guide to planning and preservation, Miriam B. Kahn
- Current security management & ethical issues of information technology, edited by Rasool Azari
- The secure online business, e-commerce, IT functionality & business continuity, consultant editor, Adam Jolly
- Computer security literacy, staying safe in a digital world, Douglas Jacobson and Joseph Idziorek
- Hacking for dummies, by Kevin Beaver
- Digital fortress, Dan Brown
- Cybersecurity
- Security technologies for the World Wide Web, Rolf Oppliger
- Advanced persistent threat hacking, the art and science of hacking any organization, Tyler Wrightson
- The secret to cybersecurity, a simple plan to protect your family and business from cybercrime, Scott E. Augenbaum
- Anti-hacker tool kit, Mike Shema ... [et al.]
- Online privacy, by Julie Schwab Marzolf
- This is how they tell me the world ends, the cyberweapons arms race, Nicole Perlroth
- The complete idiot's guide to protecting yourself online, by Preston Gralla
- Wireless security, models, threats, and solutions, Randall K. Nichols, Panos C. Lekkas
Outgoing Resources
- Focus1