Explore: Computer Networks Security Measures
Discover books, insights, and more — all in one place.
Learn more about Computer Networks Security Measures with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computer-networks--security-measures”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Hacking
By Jon Erickson and Jon Erickson

“Hacking” Metadata:
- Title: Hacking
- Authors: Jon EricksonJon Erickson
- Languages: ➤ Spanish; Castilian - español, castellano - English
- Number of Pages: Median: 384
- Publisher: ➤ No Starch Press, Incorporated - Anaya Multimedia - No Starch Press - Dpunkt.Verlag GmbH
- Publish Date: 2003 - 2007 - 2008
- Publish Location: Madrid - San Francisco, CA
“Hacking” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer hackers - Security measures - Computer security - Hackers - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL58399590M - OL34012869M - OL39216568M - OL32507218M - OL26390872M - OL24891296M - OL18500076M - OL8871437M - OL8871391M
- Online Computer Library Center (OCLC) ID: 219606838 - 630813373 - 175218338 - 70077772
- Library of Congress Control Number (LCCN): 2003017498 - 2007042910
- All ISBNs: ➤ 1593271441 - 9788441524699 - 9783898645362 - 8441524696 - 9781593270070 - 9781593270872 - 3898645363 - 1593270879 - 9781593271442 - 1593270070
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2CISSP
Exam Guide
By Shon Harris and Fernando Maymi

“CISSP” Metadata:
- Title: CISSP
- Authors: Shon HarrisFernando Maymi
- Language: English
- Number of Pages: Median: 1205
- Publisher: ➤ McGraw-Hill Osborne - McGraw-Hill Osborne Media - McGraw-Hill - McGraw-Hill Companies - Pearson Education, Limited - McGraw-Hill/Osborne Media - McGraw-Hill Education
- Publish Date: ➤ 2005 - 2007 - 2008 - 2009 - 2010 - 2013 - 2016 - 2018
- Publish Location: ➤ New York, Chicago, San Francisco, Athens, London, Madrid, Mexico City, Milan, New Delhi, Singapore, Sydney, Toronto - San Francisco - New York
“CISSP” Subjects and Themes:
- Subjects: ➤ Examinations - Computer networks - Study guides - Certification - Electronic data processing personnel - Security measures - Medical - Nonfiction - CISSP - Information Security - Electronic data processing personnel, certification - Computer networks, security measures - Telecommunications engineers
Edition Identifiers:
- The Open Library ID: ➤ OL40363737M - OL9965469M - OL24074036M - OL24022942M - OL21873917M - OL9965468M - OL24575102M - OL25444290M - OL24320026M - OL26834976M - OL26832770M - OL24002809M - OL9869623M
- Online Computer Library Center (OCLC) ID: 213309246 - 670428794 - 825076467 - 435500969
- Library of Congress Control Number (LCCN): 2016017045 - 2009053307 - 2012044884 - 2007042918 - 2016017235
- All ISBNs: ➤ 0072257148 - 9780071849272 - 9781260142655 - 0071849270 - 1260142655 - 0071781749 - 9780072257151 - 9780071497879 - 9780789742162 - 0072257156 - 0071602178 - 0789742160 - 9780071781749 - 9780072257144 - 9780071602174 - 0071497870
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find CISSP at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Network Security Assessment
By Chris McNab

“Network Security Assessment” Metadata:
- Title: Network Security Assessment
- Author: Chris McNab
- Languages: ➤ Spanish; Castilian - español, castellano - English
- Number of Pages: Median: 478
- Publisher: ➤ O'Reilly Media, Inc. - O'Reilly Media, Incorporated - Anaya Multimedia - O'Reilly - O'Reilly Media
- Publish Date: ➤ 2004 - 2005 - 2007 - 2008 - 2016
- Publish Location: ➤ Sebastopol, CA - Cambridge - Sebastopol - Beijing
“Network Security Assessment” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Computers - Evaluation - Security measures - Computer networks, security measures - Computers, access control - Database security - Data protection - Computer security - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: ➤ OL23691203M - OL22133719M - OL36716419M - OL3327684M - OL36706371M - OL23399927M - OL13267854M - OL23635962M - OL36707449M - OL9513003M - OL23556906M - OL36716538M - OL26836814M
- Online Computer Library Center (OCLC) ID: 180989270 - 57059486
- Library of Congress Control Number (LCCN): 2009419532 - 2004302106
- All ISBNs: ➤ 9780596519339 - 0596510306 - 9781306816878 - 149191095X - 9780596510305 - 059600611X - 9788441517516 - 8441517517 - 0596519338 - 1306816874 - 1306817455 - 9781491910955 - 9780596520809 - 0596520808 - 9781306817455 - 9780596006112
Author's Alternative Names:
"Christopher Ross McNab" and "Christopher R. McNab"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Network Security Assessment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Hacking exposed
By Joel Scambray, Stuart McClure and George Kurtz

“Hacking exposed” Metadata:
- Title: Hacking exposed
- Authors: Joel ScambrayStuart McClureGeorge Kurtz
- Language: English
- Number of Pages: Median: 628
- Publisher: ➤ McGraw-Hill/OsborneMedia - Osborne/McGraw-Hill - McGraw-Hill/Osborne - McGraw-Hill Osborne Media
- Publish Date: ➤ 2000 - 2001 - 2002 - 2003 - 2006
- Publish Location: New York - Berkeley, Calif
“Hacking exposed” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Design - Microsoft Windows (Computer file) - Security measures - Web sites - Computernetwerken - Hacking - Computerbeveiliging - Microsoft windows (computer program) - Computer networks, security measures - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - COMPUTERS - Internet - Security - Networking - General - Literary collections
Edition Identifiers:
- The Open Library ID: ➤ OL9256905M - OL7302228M - OL7302492M - OL3319073M - OL6901297M - OL17840891M - OL3657306M
- Online Computer Library Center (OCLC) ID: 50055885 - 50557718 - 53968784
- Library of Congress Control Number (LCCN): 00712033 - 2004270118 - 2002512020
- All ISBNs: ➤ 9780072230611 - 9780072224382 - 0072127481 - 0072230614 - 007222438X - 9780072127485
First Setence:
"It's difficult to talk about any system in a vacuum, especially one that is so widely deployed in so many roles as Windows Server in all of its flavors."
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking exposed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Understanding Network Hacks
By Bastian Ballmann

“Understanding Network Hacks” Metadata:
- Title: Understanding Network Hacks
- Author: Bastian Ballmann
- Language: English
- Number of Pages: Median: 192
- Publisher: ➤ Springer Berlin / Heidelberg - Springer
- Publish Date: 2015 - 2016 - 2021 - 2022
“Understanding Network Hacks” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Python (computer program language) - Computer networks - Security measures - Access control - Python (Computer program language) - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - Python (Langage de programmation) - COMPUTERS - Networking - Security
Edition Identifiers:
- The Open Library ID: OL37269197M - OL37332320M - OL37312955M - OL28266079M - OL37416972M
- Online Computer Library Center (OCLC) ID: 900539794
- All ISBNs: ➤ 9783662444368 - 9783662444375 - 9783662508626 - 9783662621592 - 3662444372 - 3662621568 - 3662508621 - 3662621592 - 9783662621561 - 3662444364
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Understanding Network Hacks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Web Security & Commerce
By Simson Garfinkel and Gene Spafford

“Web Security & Commerce” Metadata:
- Title: Web Security & Commerce
- Authors: Simson GarfinkelGene Spafford
- Languages: ➤ Spanish; Castilian - español, castellano - English
- Number of Pages: Median: 756
- Publisher: ➤ O'Reilly - McGraw-Hill Companies - O'Reilly Media, Incorporated - O'Reilly Media, Inc.
- Publish Date: 1997 - 2000 - 2001 - 2002
- Publish Location: ➤ Sebastopol - Cambridge, Mass - Beijing - Farnham
“Web Security & Commerce” Subjects and Themes:
- Subjects: ➤ Security measures - Electronic commerce - Computer networks - Web sites - World Wide Web - Commerce électronique - Redes de computadores e tecnicas - Sites Web - Web - Contrôle - Accès - Mesures - Réseaux d'ordinateurs - Ordinateurs - Sécurité - Internet advertising - Computer security - Computer networks, security measures - General - Viruses - Com053000 - Cs.cmp_sc.app_sw - Cs.cmp_sc.secur - Computer networks--security measures - World wide web--security measures - Web sites--security measures - Electronic commerce--security measures - Tk5105.59 .g37 1997 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL13149790M - OL7580885M - OL36708543M - OL36717662M - OL36798996M - OL17919818M - OL22082448M - OL285601M
- Online Computer Library Center (OCLC) ID: 37129739
- Library of Congress Control Number (LCCN): 2001052375 - 97188705
- All ISBNs: ➤ 9781449305284 - 1306814383 - 1565922697 - 9701021428 - 9789701021422 - 9780596000455 - 9781449305246 - 1449305245 - 9781565922693 - 9781306814386 - 1449305288 - 0596000456
Author's Alternative Names:
"Simson L. Garfinkel"Access and General Info:
- First Year Published: 1997
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Web Security & Commerce at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Hacking for Dummies
By Kevin Beaver and Jutta Schmidt

“Hacking for Dummies” Metadata:
- Title: Hacking for Dummies
- Authors: Kevin BeaverJutta Schmidt
- Languages: English - ger
- Number of Pages: Median: 396
- Publisher: ➤ For Dummies - John Wiley & Sons, Inc. - Wiley - Wiley Pub. - John Wiley & Sons, Ltd. - Wiley & Sons, Limited, John - Brand: Wiley-VCH Verlag GmbH - John Wiley & Son inc. - Wiley & Sons Canada, Limited, John - John Wiley &Sons - Wiley & Sons, Incorporated, John
- Publish Date: ➤ 2004 - 2006 - 2007 - 2009 - 2010 - 2012 - 2013 - 2015 - 2016 - 2018 - 2019 - 2020 - 2022
- Publish Location: ➤ Hoboken, NJ - New York - Chichester
“Hacking for Dummies” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer hackers - Computer networks - Computer security - Nonfiction - Security measures - Networking - Data protection - General - Internet - Security - Hackers - Computer networks, security measures - Engineering & Applied Sciences - Computer Science
Edition Identifiers:
- The Open Library ID: ➤ OL39938989M - OL39984549M - OL33467708M - OL33643196M - OL33721332M - OL33814272M - OL33835394M - OL40053258M - OL40077759M - OL33415963M - OL26961199M - OL26838501M - OL29131004M - OL29131005M - OL29304324M - OL33645424M - OL33645425M - OL34529389M - OL35584459M - OL35853272M - OL35881789M - OL39849032M - OL39856690M - OL39863911M - OL39900428M - OL40050877M - OL48632739M - OL48635334M - OL48638700M - OL26319294M - OL25353392M - OL24256462M - OL18498113M - OL24276588M - OL23072865M - OL8050918M - OL7595409M
- Online Computer Library Center (OCLC) ID: ➤ 1043392947 - 858027983 - 219607826 - 908805314 - 614432840 - 437082945
- Library of Congress Control Number (LCCN): 2006932690 - 2004101971 - 2012955723 - 2009942371 - 2018944084
- All ISBNs: ➤ 1118380932 - 9780764557842 - 9780470550939 - 3527677232 - 9781118380949 - 9781118380956 - 9781119174714 - 1283941120 - 1118380967 - 9780470602560 - 0470602562 - 1118380940 - 0470550937 - 9783527819041 - 9781118380932 - 9781119485476 - 9780470199268 - 9780470052358 - 9783527715510 - 9780470113073 - 3527805001 - 3527819045 - 1119872200 - 3527677224 - 9781119154686 - 1119872197 - 9780764573781 - 9781119872214 - 9781280649691 - 0470113073 - 9781118380963 - 3527715517 - 1119872219 - 1119485517 - 352780501X - 1119154707 - 9781119872207 - 9783527805006 - 9781119872191 - 9783527708307 - 9783527717958 - 1119485479 - 3527708308 - 9781119154693 - 9780470602683 - 0470602678 - 0470602686 - 9783527677238 - 1119485541 - 1280649690 - 9781119485513 - 1119154685 - 9781280350320 - 1280350326 - 1118380959 - 0470199261 - 3527829229 - 1119174716 - 9781283941129 - 9781119154709 - 9783527829224 - 076455784X - 0764573780 - 9783527677221 - 1119154693 - 9781119485544 - 9780470602676 - 9783527805013 - 3527717951 - 047005235X
First Setence:
"This book is about hacking ethically - the science of testing your computers and network for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them."
Author's Alternative Names:
"Kevin M. Beaver" and "Kevin Michael Beaver"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacking for Dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Hackers
Heroes of the Computer Revolution
By Steven Levy

“Hackers” Metadata:
- Title: Hackers
- Author: Steven Levy
- Languages: English - tur
- Number of Pages: Median: 458
- Publisher: ➤ ODTÜ Yayıncılık - Penguin Books - Delta - Anchor Press/Doubleday - O'Reilly Media - Penguin (Non-Classics) - Dell Pub. - Tandem Library - Doubleday Books
- Publish Date: ➤ 1984 - 1985 - 1994 - 2001 - 2010
- Publish Location: ➤ Sebastopol, CA - New York, N.Y - Garden City, N.Y - Ankara, Turkey
“Hackers” Subjects and Themes:
- Subjects: ➤ Computer programming - Electronic digital computers - Programming - Computer hackers - History - Internet - Computer science - Hackers - maths - mathematics - Programmation (Informatique) - Passionnés d'informatique - Computer engineering - Geeks (Computer enthusiasts) - Artificial intelligence - Research - Popular works - Biographies - Computer crimes - Computer security - Criminal psychology - Computer networks, security measures
- People: ➤ Bob Albrecht - Bob Box - Carolyn Box - Doug Carlston - Bob Davis - Peter Deutsch - Steve Dompier - John Draper - Mark Duchaineau - Chris Epinosa - Lee Felsenstein - Ed Fredkin - Gordon French - Richard Garriott - Bill Gates - Bill Gosper - Richard Greenblatt - John Harris - Jerry Jewell - Steven Jobs - Tom Knight - Alan Kotok - Efrem Lipkin - John McCarthy - Bob Marsh - Roger Melen - Louis Merton - Jude Milhon - Marvin Minsky - Fred Moore - Stewart Nelson - Ted Nelson (1937-) - Russel Noftsker - Adam Osborne - Tom Pittman - Ed Roberts - Steve Russell - Peter Samson - Bob Saunders - Warren Schwader - David Silver - Dan Sokol - Les Solomon - Marty Spergel - Richard Stallman (1953-) - Jeff Stephenson - Jay Sullivan - Dick Sunderland - Gerry Sussman - Margot Tommervik - Jim Warren - Randy Wigginton - Ken Williams - Roberta Williams - Stephen Wozniak
- Time: 1950-1980
Edition Identifiers:
- The Open Library ID: ➤ OL25551982M - OL7357943M - OL25663390M - OL2844180M - OL3964146M - OL18298430M - OL24376515M - OL7439008M - OL9513913M - OL7437794M
- Online Computer Library Center (OCLC) ID: 686710304 - 615926697 - 29765572 - 10605060
- Library of Congress Control Number (LCCN): 2001268767 - 2010283265 - 84006188
- All ISBNs: ➤ 9780385191951 - 0385312105 - 9780613922081 - 1449388396 - 0613922085 - 0141000511 - 9780385312103 - 9781449388393 - 0385191952 - 9780141000510
Access and General Info:
- First Year Published: 1984
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hackers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9The Art of Deception
By Kevin D. Mitnick and William L. Simon

“The Art of Deception” Metadata:
- Title: The Art of Deception
- Authors: Kevin D. MitnickWilliam L. Simon
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Tantor and Blackstone Publishing - Wiley Publishing - Wiley - John Wiley & Sons, Ltd.
- Publish Date: ➤ 2001 - 2002 - 2003 - 2007 - 2021
- Publish Location: USA - New York
“The Art of Deception” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Social aspects - Computer hackers - Computer security - Information technology - Deception - Hackers - Business and economics - Computer networks, security measures - Security systems - Internal security - Social Engineering - Sécurité informatique - Sûreté de l'État - COMPUTERS - Internet - Security - Networking - General - Dispositifs de sécurité - Facteurs humains - Aspects psychologiques - Désinformation - Computerbeveiliging - Computercriminaliteit - Psychologische aspecten
- People: Kevin Mitnick
Edition Identifiers:
- Google Books ID: vRG7QgAACAAJ
- The Open Library ID: ➤ OL51730261M - OL35272573M - OL7613854M - OL8042481M - OL24328570M - OL24321037M
- Online Computer Library Center (OCLC) ID: 50494246 - 51209751 - 428739808
- Library of Congress Control Number (LCCN): 2002512977
- All ISBNs: ➤ 9781665197052 - 9780471237129 - 0471237124 - 9780764542800 - 1665197056 - 076454280X - 0471432288 - 9780471432289
First Setence:
"a company may have purchased the best security technologies that money can buy, trained their people so well that they lock up all their secrets before going home at night, and hired building guards from the best security firm in the business."
Author's Alternative Names:
"Kevin David Mitnick", "Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "Kevin MITNICK" and "KD Mitnick"Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Deception at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Cyber Security
By Martti Lehto and Pekka Neittaanmäki

“Cyber Security” Metadata:
- Title: Cyber Security
- Authors: Martti LehtoPekka Neittaanmäki
- Language: English
- Number of Pages: Median: 296
- Publisher: ➤ MOXIC - Springer International Publishing AG - Springer
- Publish Date: ➤ 2015 - 2016 - 2018 - 2019 - 2022 - 2023
“Cyber Security” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Military art and science - Cyber intelligence (Computer security) - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: ➤ OL36217165M - OL35882701M - OL28336263M - OL50635173M - OL27981972M - OL28188912M - OL28052076M
- Online Computer Library Center (OCLC) ID: 933526787
- All ISBNs: ➤ 9783319183015 - 9783030091972 - 3030912922 - 9783319352039 - 3319183028 - 3319753061 - 3319352032 - 9783030912925 - 331918301X - 3030912957 - 9783319183022 - 303009197X - 9783030912956 - 9783319753065
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Metasploit
By David Kennedy

“Metasploit” Metadata:
- Title: Metasploit
- Author: David Kennedy
- Language: English
- Number of Pages: Median: 299
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco, Calif
“Metasploit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - COMPUTERS / Internet / Security - Computer networks - Computers - COMPUTERS / Security / General - COMPUTERS / Internet / General - Metasploit (Electronic resource) - Security measures - COMPUTERS / Security / Viruses - Computer networks, security measures - Open source software
Edition Identifiers:
- The Open Library ID: OL24896075M
- Online Computer Library Center (OCLC) ID: 754641929
- Library of Congress Control Number (LCCN): 2011020166
- All ISBNs: 9781593272883 - 159327288X
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Metasploit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Cryptography and Network Security
By William Stallings

“Cryptography and Network Security” Metadata:
- Title: ➤ Cryptography and Network Security
- Author: William Stallings
- Languages: English - por
- Number of Pages: Median: 748
- Publisher: ➤ Pearson Education, Limited - Pearson Education do Brasil
- Publish Date: ➤ 2002 - 2005 - 2010 - 2011 - 2015 - 2016 - 2018
- Publish Location: São Paulo, Brazil
“Cryptography and Network Security” Subjects and Themes:
- Subjects: ➤ Computer networks - Data encryption (computer science) - Coding theory - Computer security - Computer networks, security measures - Literary collections
Edition Identifiers:
- The Open Library ID: ➤ OL50527406M - OL29410914M - OL29409486M - OL29403690M - OL29210176M - OL29041401M - OL29013434M - OL28956401M
- All ISBNs: ➤ 0134484525 - 9781282693098 - 9780137056323 - 9780135307496 - 013530749X - 1282693093 - 9780132023221 - 9780131115026 - 013705632X - 0132023229 - 0134444663 - 8543014506 - 9788543014500 - 0131115022 - 9780134484525 - 9780134444666
First Setence:
"Nos quatro anos desde que a quinta edição deste livro foi publicada, o campo tem visto inovações e melhorias contínuas."
Author's Alternative Names:
"Stallings, William; William Walter Stallings" and "W. Stallings"Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cryptography and Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Secrets and Lies
Digital Security in a Networked World
By Bruce Schneier

“Secrets and Lies” Metadata:
- Title: Secrets and Lies
- Author: Bruce Schneier
- Languages: English - ger
- Number of Pages: Median: 440
- Publisher: ➤ Wiley-VCH - John Wiley & Sons, Inc. - Dpunkt.Verlag GmbH - Wiley-VCH Verlag GmbH - John Wiley & Sons - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2000 - 2001 - 2004 - 2011 - 2013 - 2015
“Secrets and Lies” Subjects and Themes:
- Subjects: Computer networks - Security measures - Computer security - Computer networks, security measures - Computer science
Edition Identifiers:
- The Open Library ID: ➤ OL26773330M - OL29064027M - OL29074280M - OL29074286M - OL7617491M - OL9052995M - OL9546996M - OL7614129M - OL27183187M
- Online Computer Library Center (OCLC) ID: 1001838451 - 906119939
- Library of Congress Control Number (LCCN): 2015932613
- All ISBNs: ➤ 9783898643023 - 3898643026 - 9781118082546 - 9781118075074 - 3527501282 - 9781119092438 - 1118082540 - 9780471253112 - 0471253111 - 1118082273 - 1118075072 - 3527500219 - 9780471453802 - 1119092434 - 9783527500215 - 0471453803 - 9783527501281 - 9781118082270
First Setence:
"Rereading a book that I finished fifteen years ago —in 2000— perhaps the most surprising thing is how little things have changed."
"The world is a dangerous place."
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Secrets and Lies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Cryptography and network security
By William Stallings

“Cryptography and network security” Metadata:
- Title: ➤ Cryptography and network security
- Author: William Stallings
- Language: English
- Number of Pages: Median: 724
- Publisher: ➤ Pearson Education - Pearson - William Stallings - Dorling Kindersley - Pearson Prentice Hall
- Publish Date: 2006 - 2016
- Publish Location: Delhi
“Cryptography and network security” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Data encryption (Computer science) - Computer security - Coding theory - Computer networks, security measures - Data encryption (computer science)
Edition Identifiers:
- The Open Library ID: OL53201397M - OL28219449M - OL26639170M
- Online Computer Library Center (OCLC) ID: 933863805 - 607874481
- Library of Congress Control Number (LCCN): 2015051130
- All ISBNs: 9780134444284 - 0134444280 - 9788177587746 - 8177587749
Author's Alternative Names:
"Stallings, William; William Walter Stallings" and "W. Stallings"Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cryptography and network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Principles of information security
By Michael E. Whitman and Herbert J. Mattord

“Principles of information security” Metadata:
- Title: ➤ Principles of information security
- Authors: Michael E. WhitmanHerbert J. Mattord
- Language: English
- Number of Pages: Median: 628
- Publisher: ➤ Thomson Course Technology - Cengage Learning - Course Technology
- Publish Date: ➤ 2004 - 2005 - 2009 - 2014 - 2021
- Publish Location: Boston, Mass
“Principles of information security” Subjects and Themes:
- Subjects: ➤ Mesures - Sécurité - Technologie de l'information - Computer security - Computer networks - Security measures - Systèmes informatiques - Computer networks, security measures - Information technology
Edition Identifiers:
- The Open Library ID: OL21577454M - OL24586474M - OL34693789M - OL28518544M - OL7607254M
- Online Computer Library Center (OCLC) ID: 904377220
- Library of Congress Control Number (LCCN): 2007297587 - 2014944986
- All ISBNs: ➤ 1285448367 - 1423901770 - 9780619216252 - 9780357506431 - 035750643X - 9781285448367 - 9781423901778 - 0619216255
Author's Alternative Names:
"Herbert Mattord"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Principles of information security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Hands-on ethical hacking and network defense
By Michael T. Simpson

“Hands-on ethical hacking and network defense” Metadata:
- Title: ➤ Hands-on ethical hacking and network defense
- Author: Michael T. Simpson
- Language: English
- Number of Pages: Median: 455
- Publisher: ➤ Course Technology, Cengage Learning
- Publish Date: 2011
- Publish Location: Boston, MA
“Hands-on ethical hacking and network defense” Subjects and Themes:
- Subjects: Computer hackers - Computer security - Hackers - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL25313749M
- Online Computer Library Center (OCLC) ID: 656249356
- Library of Congress Control Number (LCCN): 2010922642
- All ISBNs: 9781435486096 - 1435486099
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hands-on ethical hacking and network defense at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Principles of information security
By Michael E. Whitman

“Principles of information security” Metadata:
- Title: ➤ Principles of information security
- Author: Michael E. Whitman
- Language: English
- Number of Pages: Median: 617
- Publisher: Course Technology
- Publish Date: 2012
- Publish Location: Boston, MA
“Principles of information security” Subjects and Themes:
- Subjects: Computer networks - Security measures - Computer security - Computer networks, security measures - Information technology
Edition Identifiers:
- The Open Library ID: OL25093895M
- Library of Congress Control Number (LCCN): 2010940654
- All ISBNs: 9781111138219 - 1111138214
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Principles of information security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Network Security Essentials
By William Stallings

“Network Security Essentials” Metadata:
- Title: Network Security Essentials
- Author: William Stallings
- Language: English
- Number of Pages: Median: 432
- Publisher: ➤ Prentice Hall - pearson education
- Publish Date: 1999 - 2002 - 2006 - 2009
- Publish Location: india
“Network Security Essentials” Subjects and Themes:
- Subjects: Computer networks - Security measures - Computer security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL9294506M - OL9284752M - OL7331364M - OL7330104M - OL24376796M - OL7339851M - OL9286012M
- Online Computer Library Center (OCLC) ID: 50725678
- Library of Congress Control Number (LCCN): 99045765 - 2002190732
- All ISBNs: ➤ 0130351288 - 9780130160935 - 9788131716649 - 0130160938 - 9780130351289 - 8131716643 - 0132380331 - 9780132380331
Author's Alternative Names:
"Stallings, William; William Walter Stallings" and "W. Stallings"Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Network Security Essentials at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Foundations and Practice of Security
By Joaquin Garcia-Alfaro

“Foundations and Practice of Security” Metadata:
- Title: ➤ Foundations and Practice of Security
- Author: Joaquin Garcia-Alfaro
- Language: English
- Number of Pages: Median: 379
- Publisher: ➤ Springer London, Limited - Springer Berlin Heidelberg - Springer - Springer International Publishing AG - Imprint: Springer
- Publish Date: ➤ 2012 - 2013 - 2014 - 2015 - 2016 - 2018 - 2019 - 2020 - 2021 - 2022 - 2023
- Publish Location: Berlin, Heidelberg
“Foundations and Practice of Security” Subjects and Themes:
- Subjects: ➤ Computer Imaging, Vision, Pattern Recognition and Graphics - Information systems - Software engineering - Computer vision - Information Systems Applications (incl. Internet) - Computer science - Management of Computing and Information Systems - Management information systems - Computer Appl. in Administrative Data Processing - Business Information Systems - Computer security - Computer networks, security measures - Data encryption (computer science)
Edition Identifiers:
- The Open Library ID: ➤ OL48202805M - OL38331093M - OL37228818M - OL36261509M - OL36219924M - OL36214997M - OL36212928M - OL35848232M - OL30613969M - OL28255317M - OL28218302M - OL28184668M - OL28115495M - OL28027979M - OL28006026M - OL27976328M - OL27039645M
- All ISBNs: ➤ 3319303031 - 3319053019 - 3642371183 - 3319170406 - 3319756494 - 3030184188 - 9783319303024 - 9783319756493 - 3031301218 - 9783319519654 - 9783319170404 - 9783319170398 - 3319053027 - 3319170392 - 3319303023 - 3642371205 - 9783642371196 - 3642371191 - 9783031301216 - 9783030453701 - 3642279023 - 9783030708801 - 9783642371189 - 9783642279027 - 9783319053028 - 9783030184186 - 9783319303031 - 9783319053011 - 3030453707 - 3031081463 - 9783031081460 - 3319519654 - 3030708802 - 9783642371202
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Foundations and Practice of Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Advances in Intelligent Information Hiding and Multimedia Signal Processing
By Jeng-Shyang Pan, Pei-Wei Tsai, Junzo Watada and Lakhmi C. Jain

“Advances in Intelligent Information Hiding and Multimedia Signal Processing” Metadata:
- Title: ➤ Advances in Intelligent Information Hiding and Multimedia Signal Processing
- Authors: Jeng-Shyang PanPei-Wei TsaiJunzo WatadaLakhmi C. Jain
- Language: English
- Number of Pages: Median: 468
- Publisher: ➤ Springer International Publishing AG - Springer Singapore Pte. Limited - Springer
- Publish Date: ➤ 2016 - 2017 - 2018 - 2019 - 2020 - 2021 - 2022 - 2023 - 2024
“Advances in Intelligent Information Hiding and Multimedia Signal Processing” Subjects and Themes:
- Subjects: Computer security - Multimedia systems - Image processing - Signal processing - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL37998934M - OL37319969M - OL28229965M - OL28203442M - OL51809068M - OL48687637M - OL28237876M - OL28224369M - OL28217603M - OL37997573M - OL38007652M - OL37313171M - OL37320894M - OL30878437M - OL37269851M - OL28246365M - OL37299103M - OL37269844M - OL46077370M - OL28201931M - OL30156468M
- All ISBNs: ➤ 9789813364196 - 9811397120 - 9789813367562 - 9811397090 - 9789811910524 - 9783319843476 - 331984346X - 9811910529 - 9789813367593 - 9811397112 - 9811910553 - 9789811910555 - 9783319876559 - 3319843478 - 981336422X - 9789811397097 - 3319876562 - 9783319502083 - 9783319638584 - 9789811397165 - 9811397163 - 9813367598 - 9789811397127 - 9789813364226 - 9783319876566 - 3319638556 - 9789811397134 - 9783319502113 - 3319502085 - 981336419X - 9783319638553 - 3319876554 - 9811397139 - 9789811397110 - 9813367563 - 9783319843469 - 3319502115 - 9819901073 - 9789819901043 - 9819901049 - 3319638580 - 9789819901074
Author's Alternative Names:
"Lakhmi C Jain", "Jain Lakhmi" and "Professor Lakhmi C. Jain"Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Advances in Intelligent Information Hiding and Multimedia Signal Processing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21AWS Certified Cloud Practitioner Study Guide
By Ben Piper and David Clinton

“AWS Certified Cloud Practitioner Study Guide” Metadata:
- Title: ➤ AWS Certified Cloud Practitioner Study Guide
- Authors: Ben PiperDavid Clinton
- Language: English
- Number of Pages: Median: 304
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley-Interscience - Sybex - Wiley & Sons, Incorporated, John
- Publish Date: 2019 - 2023
“AWS Certified Cloud Practitioner Study Guide” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Electronic data processing personnel, certification - Cloud computing
Edition Identifiers:
- The Open Library ID: ➤ OL49315705M - OL39948139M - OL28254800M - OL29445500M - OL49264979M - OL29425943M - OL49264986M
- All ISBNs: ➤ 1394235658 - 1119490707 - 139423564X - 9781119490692 - 9781394235650 - 9781394235643 - 1119490693 - 9781119490715 - 1119574404 - 1394235631 - 9781119574408 - 9781119490708 - 1119490715 - 9781394235636
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find AWS Certified Cloud Practitioner Study Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22AWS Certified Solutions Architect Study Guide
By Ben Piper and David Clinton

“AWS Certified Solutions Architect Study Guide” Metadata:
- Title: ➤ AWS Certified Solutions Architect Study Guide
- Authors: Ben PiperDavid Clinton
- Language: English
- Number of Pages: Median: 416
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - Sybex
- Publish Date: 2019 - 2020 - 2022 - 2023
“AWS Certified Solutions Architect Study Guide” Subjects and Themes:
- Subjects: ➤ Electronic data processing personnel, certification - Computer networks, security measures - Cloud computing
Edition Identifiers:
- The Open Library ID: ➤ OL33800334M - OL37987402M - OL29431833M - OL38018077M - OL28722744M - OL28722746M - OL38012632M - OL39937397M - OL29431823M - OL33800329M - OL27759572M
- All ISBNs: ➤ 9781119504177 - 9781119713104 - 9781119982647 - 1119713099 - 9781119560395 - 1119982634 - 111950421X - 1119713080 - 9781119982623 - 1119504198 - 1119713102 - 9781119504214 - 1119982626 - 1119504171 - 9781119982630 - 9781119713098 - 111956039X - 1119982642 - 9781119504191 - 9781119713081
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find AWS Certified Solutions Architect Study Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23CISSP
By James Michael Stewart, Mike Chapple and Ed Tittel

“CISSP” Metadata:
- Title: CISSP
- Authors: James Michael StewartMike ChappleEd Tittel
- Language: English
- Number of Pages: Median: 832
- Publisher: ➤ Sybex - Wiley & Sons, Limited, John - SYBEX - John Wiley & Sons, Ltd. - Brand: Sybex - Wiley & Sons, Incorporated, John - Wiley Pub.
- Publish Date: ➤ 2004 - 2005 - 2006 - 2008 - 2011 - 2012 - 2016
- Publish Location: ➤ San Francisco, Calif - New York - London - Indianapolis, Ind
“CISSP” Subjects and Themes:
- Subjects: ➤ Examinations - Study guides - Computer security - Certification - Computer networks - Electronic data processing personnel - Computer Technology - Nonfiction - Study Guide - COMPUTERS / Certification Guides / General - Networking - COMPUTERS - General - Internet - Security - Electronic data processing personnel, certification - Computer networks, security measures - Examinations, study guides - Security measures
Edition Identifiers:
- Google Books ID: _9ndf7S9oUoC
- The Open Library ID: ➤ OL40095163M - OL40074252M - OL39839935M - OL34601306M - OL30619555M - OL3699153M - OL8096739M - OL24323673M - OL25557062M - OL29064152M - OL28988317M - OL29118666M - OL24249248M - OL16873867M
- Online Computer Library Center (OCLC) ID: 56751851 - 817706363 - 748329415 - 614432867 - 781717660
- Library of Congress Control Number (LCCN): 2012940018 - 2008022835 - 2005929270 - 2003115091 - 2010047238
- All ISBNs: ➤ 0782151205 - 1118028260 - 9780470276884 - 1119384141 - 1118332105 - 9781118028261 - 9781118028278 - 9781118314173 - 9780471779810 - 9781118075005 - 0782144438 - 9781118463895 - 1118028252 - 9780470944981 - 9781119384144 - 0470395915 - 0470276886 - 9780470395912 - 9781118332108 - 0782151558 - 1118463897 - 9780782144437 - 0470944986 - 1118314174 - 1118028279 - 9781119384182 - 1119384184 - 0782143350 - 9780782151558 - 9780782151206 - 0471779814 - 9781118028254 - 1118075005 - 9780782143355
First Setence:
"The Access Control Systems and Methodology domain of the Common Body of Knowledge (CBK) for the CISSP certification exam deals with topics and issues related to the monitoring, identification, and authorization of granting or restricting user access to resources."
Author's Alternative Names:
"James M. Stewart"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CISSP at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Cybersecurity Ethics
By Mary Manjikian
“Cybersecurity Ethics” Metadata:
- Title: Cybersecurity Ethics
- Author: Mary Manjikian
- Language: English
- Number of Pages: Median: 246
- Publisher: ➤ Taylor & Francis Group - RoutledgeFalmer
- Publish Date: 2017 - 2022 - 2023
“Cybersecurity Ethics” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Internet - Computer crimes - Moral and ethical aspects - Computer networks - Security measures - BUSINESS & ECONOMICS - Business Ethics - Informationstechnik - Computersicherheit - Ethik
Edition Identifiers:
- The Open Library ID: ➤ OL28844917M - OL33757188M - OL46075323M - OL39644779M - OL46072560M - OL33592139M - OL33563193M - OL39658564M - OL39644762M - OL33580144M - OL28864084M
- Online Computer Library Center (OCLC) ID: 1023802306
- All ISBNs: ➤ 1138717525 - 9781000828207 - 9781351766555 - 1000828204 - 1315196271 - 9781351766562 - 1138717495 - 9781032164991 - 9781032164977 - 1351766562 - 1003248829 - 9781003248828 - 1032164999 - 9781000828252 - 1032164972 - 1351766554 - 9781138717497 - 9781138717527 - 9781351766548 - 1000828255 - 9781315196275 - 1351766546
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cybersecurity Ethics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Apache Cookbook
By Ken Coar and Rich Bowen

“Apache Cookbook” Metadata:
- Title: Apache Cookbook
- Authors: Ken CoarRich Bowen
- Languages: ➤ English - Spanish; Castilian - español, castellano
- Number of Pages: Median: 287
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated - O'Reilly Media, Inc. - Anaya Multimedia - O'Reilly Media
- Publish Date: ➤ 2003 - 2004 - 2007 - 2008 - 2020
- Publish Location: ➤ Sebastopol, CA - Sebastapol, California, USA
“Apache Cookbook” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer programs - Web servers - Apache (Computer file : Apache Group) - Security measures - Apache (computer program) - Computer networks, security measures - Apache (Computer file)
Edition Identifiers:
- The Open Library ID: ➤ OL13267817M - OL28816989M - OL36705320M - OL36709514M - OL36715165M - OL36720287M - OL26374428M - OL26374420M - OL9537442M - OL3325953M - OL19327806M - OL18518844M
- Online Computer Library Center (OCLC) ID: 55639880 - 213482737 - 53875585 - 213482736 - 156890985
- Library of Congress Control Number (LCCN): 2004299607 - 2008273306
- All ISBNs: ➤ 9780596519735 - 1491918381 - 1306817412 - 9781306817417 - 0596529945 - 059651638X - 1306817226 - 9781306817226 - 9780596516383 - 9780596529949 - 9780596551872 - 0596551878 - 9780596001919 - 9788441517042 - 0596001916 - 8441517045 - 0596519737 - 9781491918388
Author's Alternative Names:
"Ken A. L. Coar"Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Apache Cookbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Tribe of Hackers
By Marcus J. Carey and Jennifer Jin

“Tribe of Hackers” Metadata:
- Title: Tribe of Hackers
- Authors: Marcus J. CareyJennifer Jin
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - Independently published - Wiley & Sons Canada, Limited, John
- Publish Date: 2019
“Tribe of Hackers” Subjects and Themes:
- Subjects: ➤ Data protection - Computer networks, security measures - Computer security - Risk management - Business enterprises
Edition Identifiers:
- The Open Library ID: OL29444178M - OL29444151M - OL32926095M - OL38315372M - OL28902773M
- All ISBNs: ➤ 9781119643371 - 1119643376 - 1119643406 - 1119643384 - 9781119643388 - 1119643392 - 9781119643401 - 1793464189 - 9781119643395 - 9781793464187
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Tribe of Hackers at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Cyber Security
By Sutton, David
“Cyber Security” Metadata:
- Title: Cyber Security
- Author: Sutton, David
- Language: English
- Number of Pages: Median: 222
- Publisher: ➤ BCS Learning & Development Limited
- Publish Date: 2017
“Cyber Security” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL34547540M - OL34621388M - OL34547541M - OL34547539M
- All ISBNs: ➤ 1780173415 - 1780173431 - 1780173423 - 9781780173436 - 9781780173405 - 1780173407 - 9781780173412 - 9781780173429
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cyber Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28The Ethical Hack
By James S. Tiller

“The Ethical Hack” Metadata:
- Title: The Ethical Hack
- Author: James S. Tiller
- Language: English
- Number of Pages: Median: 322
- Publisher: ➤ Taylor and Francis - Taylor & Francis Group - Auerbach Publishers, Incorporated - AUERBACH
- Publish Date: 2004 - 2005 - 2019
- Publish Location: London
“The Ethical Hack” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Penetration testing (Computer security) - Computer hackers - Computer networks - Testing - Security measures - Business enterprises - Hackers - Computer networks, security measures - Business enterprises, computer networks - Réseaux d'ordinateurs - Sécurité - Mesures - Pirates informatiques - Entreprises - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: ➤ OL33461822M - OL54207446M - OL8259205M - OL37979189M - OL34724651M - OL37980819M - OL24246119M - OL34664878M
- Online Computer Library Center (OCLC) ID: 61362977
- Library of Congress Control Number (LCCN): 2003052467
- All ISBNs: ➤ 9780429209550 - 1135502439 - 1135502471 - 9781102154655 - 9780849316098 - 084931609X - 042920955X - 9781135502430 - 9780367393816 - 1102154652 - 9781135502478 - 9781280157707 - 9780203495414 - 0367393816 - 1280157704 - 0203495411
First Setence:
"Hiring someone to hack your company goes by many names, such as ethical hacking, penetration testing, tiger teaming, intrusion testing, vulnerability analysis, and even security assessment."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Ethical Hack at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29CISA Certified Information Systems Auditor Study Guide
By David L. Cannon

“CISA Certified Information Systems Auditor Study Guide” Metadata:
- Title: ➤ CISA Certified Information Systems Auditor Study Guide
- Author: David L. Cannon
- Language: English
- Number of Pages: Median: 696
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: ➤ 2008 - 2009 - 2011 - 2016 - 2017
“CISA Certified Information Systems Auditor Study Guide” Subjects and Themes:
- Subjects: ➤ Management information systems - Computer networks, security measures - Electronic data processing personnel, certification - Computer security--examinations - Computer security--examinations--study guides - Information storage and retrieval systems--security measures--examinations - Information storage and retrieval systems--security measures--examinations--study guides - Computer networks--security measures--examinations - Computer networks--security measures--examinations--study guides - Management information systems--auditing--examinations - Management information systems--auditing--examinations--study guides - Qa76.3 .c3445 2016 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL29309519M - OL29255919M - OL29062845M - OL29309530M - OL39900529M - OL39841998M - OL29353884M - OL29062878M - OL39885887M - OL29014440M - OL39897496M - OL39878286M
- All ISBNs: ➤ 9780470370407 - 0470329998 - 1119056241 - 1118033655 - 9781283126373 - 1119056403 - 9781281285706 - 1283126370 - 9781119056249 - 9781119419211 - 9781118033685 - 9781118033678 - 1119419212 - 9781119056409 - 111905625X - 9781118033654 - 9780470329993 - 1118033671 - 1281285706 - 0470595965 - 9780470595961 - 9781119056256 - 111803368X - 0470370408
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find CISA Certified Information Systems Auditor Study Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Hands-on ethical hacking and network defense
By Michael T. Simpson

“Hands-on ethical hacking and network defense” Metadata:
- Title: ➤ Hands-on ethical hacking and network defense
- Author: Michael T. Simpson
- Language: English
- Number of Pages: Median: 450
- Publisher: ➤ Course Technology - Stacy L. Hiquet
- Publish Date: 2013
- Publish Location: Boston, MA
“Hands-on ethical hacking and network defense” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Computer networks - Computer hackers - Security measures - Computer security - Hackers - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL25902144M - OL25407698M
- Online Computer Library Center (OCLC) ID: 810454466 - 793166956
- Library of Congress Control Number (LCCN): 2012930937
- All ISBNs: 9781133935612 - 1133935613
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Hands-on ethical hacking and network defense at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31The art of software security assessment
By Mark Dowd, John McDonald and Justin Schuh

“The art of software security assessment” Metadata:
- Title: ➤ The art of software security assessment
- Authors: Mark DowdJohn McDonaldJustin Schuh
- Language: English
- Number of Pages: Median: 1187
- Publisher: ➤ Addison-Wesley - Addison-Wesley Professional - Pearson Education, Limited
- Publish Date: 2006 - 2007
- Publish Location: Indianapolis, Ind
“The art of software security assessment” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Computer software - Development - Security measures - Data security & data encryption - Software engineering - Computers - Computers - Computer Security - Security - General - Computer Books: General - Programming - Software Development - Computers / Security - Computer networks, security measures - Computer software, development - Computer software--development - Computer networks--security measures - Qa76.9.a25 d75 2007 - 005.8
Edition Identifiers:
- The Open Library ID: OL9847923M - OL17865566M - OL35567489M
- Online Computer Library Center (OCLC) ID: 70836623
- Library of Congress Control Number (LCCN): 2006023446
- All ISBNs: 9780132701938 - 9780321444424 - 0321444426 - 0132701936
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The art of software security assessment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Cybersecurity Law
By Jeff Kosseff

“Cybersecurity Law” Metadata:
- Title: Cybersecurity Law
- Author: Jeff Kosseff
- Language: English
- Number of Pages: Median: 616
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: 2017 - 2019 - 2022
“Cybersecurity Law” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Computer crimes - Crime prevention - Privacy, right of - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL39940096M - OL40047693M - OL29326263M - OL29326245M - OL27417696M - OL28689154M - OL38006157M - OL44173134M - OL38014497M - OL37339679M - OL29433183M - OL29433181M
- All ISBNs: ➤ 9781119517290 - 9781119517320 - 1119822165 - 111951729X - 1119822181 - 1119517206 - 9781119231899 - 9781119231882 - 9781119517207 - 1119231868 - 1119822173 - 1119232023 - 9781119232018 - 1119232015 - 9781119231509 - 9781119822172 - 1119231884 - 9781119822189 - 1119231507 - 9781119231868 - 1119231892 - 9781119822165 - 111951732X - 9781119232025
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cybersecurity Law at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33CompTIA CySA+ Study Guide
By Mike Chapple and David Seidl

“CompTIA CySA+ Study Guide” Metadata:
- Title: CompTIA CySA+ Study Guide
- Authors: Mike ChappleDavid Seidl
- Language: English
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: 2023
“CompTIA CySA+ Study Guide” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL48175930M - OL48686815M - OL48681973M
- All ISBNs: ➤ 9781394182916 - 1394182910 - 9781394182909 - 9781394182923 - 1394182902 - 1394182929
Access and General Info:
- First Year Published: 2023
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find CompTIA CySA+ Study Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Security in Computing and Communications
By Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat and Jose M. Alcaraz Calero

“Security in Computing and Communications” Metadata:
- Title: ➤ Security in Computing and Communications
- Authors: Sabu M. ThampiSanjay MadriaGuojun WangDanda B. RawatJose M. Alcaraz Calero
- Language: English
- Number of Pages: Median: 460
- Publisher: ➤ Springer - Lloret Mauri Jaime - Springer Singapore Pte. Limited - Springer London, Limited
- Publish Date: ➤ 2013 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2021
“Security in Computing and Communications” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Computers, access control - Computer science - Computer Communication Networks - Data protection - Systems and Data Security - E-Commerce/e-business
Edition Identifiers:
- The Open Library ID: ➤ OL36217183M - OL30785909M - OL28961763M - OL28305858M - OL37235873M - OL30321492M - OL28178189M - OL37322457M - OL30195670M - OL30528404M - OL37236356M - OL34541263M - OL28337128M
- All ISBNs: ➤ 366244965X - 3642405762 - 9789811068997 - 9811068992 - 3319229141 - 9783319229140 - 9811548242 - 9789811358258 - 9783319229157 - 9789811027376 - 9789811548260 - 9783642405761 - 3662449668 - 9783662449660 - 9789811548246 - 9811548269 - 9811027390 - 9789811068973 - 9811027374 - 9811068976 - 331922915X - 9789811027390 - 9811604215 - 9783662449653 - 9811358257 - 9789811604218
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security in Computing and Communications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Financial Cryptography and Data Security
By Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan Wallach, Michael Brenner and Kurt Rohloff

“Financial Cryptography and Data Security” Metadata:
- Title: ➤ Financial Cryptography and Data Security
- Authors: ➤ Jeremy ClarkSarah MeiklejohnPeter Y. A. RyanDan WallachMichael BrennerKurt Rohloff
- Language: English
- Number of Pages: Median: 323
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2013 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2025
“Financial Cryptography and Data Security” Subjects and Themes:
- Subjects: ➤ Electronic funds transfers - Data encryption (computer science) - Electronic commerce - Computer security - Internet, security measures - Cryptography, data processing - System design - Computer networks, security measures - Internal security - Computer science - Data protection - Information systems - Systems and Data Security - Data Encryption - E-Commerce/e-business - Computer Appl. in Administrative Data Processing
Edition Identifiers:
- The Open Library ID: ➤ OL57532211M - OL28239582M - OL30907132M - OL29728105M - OL34528868M - OL28253524M - OL28249616M - OL28281516M - OL57550244M - OL30358706M - OL30527919M - OL28740778M - OL37229466M - OL28041391M
- All ISBNs: ➤ 3662447738 - 3662583860 - 9783662480502 - 9783662588192 - 3031786750 - 3662480506 - 9783662583869 - 9783642413216 - 364241320X - 9783031786754 - 9783319702773 - 9783662447734 - 3031786785 - 9783662533567 - 3030437248 - 9783030437244 - 9783031786785 - 3662588196 - 3642413196 - 9783319428260 - 3319428268 - 9783642413209 - 3662480514 - 9783642413193 - 3319702777 - 9783662480519 - 3662533561 - 3642413218
Author's Alternative Names:
"Peter Y A Ryan" and "Peter Y.A. Ryan"Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Financial Cryptography and Data Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Intelligence and Security Informatics
By Michael Chau

“Intelligence and Security Informatics” Metadata:
- Title: ➤ Intelligence and Security Informatics
- Author: Michael Chau
- Language: English
- Number of Pages: Median: 144
- Publisher: ➤ Springer Berlin Heidelberg - Springer London, Limited - Springer
- Publish Date: ➤ 2012 - 2013 - 2014 - 2015 - 2016 - 2017
- Publish Location: Berlin, Heidelberg
“Intelligence and Security Informatics” Subjects and Themes:
- Subjects: ➤ Computers - Data Mining and Knowledge Discovery - Computers and Society - Computer networks - Law and legislation - Information Systems - Information Systems Applications (incl. Internet) - Computer science - Management of Computing and Information Systems - Data mining - Legal Aspects of Computing - Computer security - Computer networks, security measures - Expert systems (computer science) - National security - Information retrieval - Information organization - Computer Communication Networks - Data protection - Information storage and retrieval systems - Systems and Data Security
Edition Identifiers:
- The Open Library ID: ➤ OL27046085M - OL29610282M - OL37229394M - OL28155630M - OL37229176M - OL34376973M - OL28735827M - OL34536888M - OL34520875M - OL28160491M - OL29366182M - OL28167799M
- All ISBNs: ➤ 3319184555 - 9783642396922 - 9783642304286 - 3319066765 - 3642304281 - 9783319574622 - 3319066773 - 3319318624 - 9783319184555 - 3319184547 - 3642220401 - 9783319066769 - 3642396925 - 3642396933 - 9783319066776 - 9783642220401 - 9783319318639 - 9783319318622 - 3319574620 - 9783642304293 - 9783642396939 - 3319318632 - 364230429X - 9783319184548
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Intelligence and Security Informatics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Cloud Computing and Security
By Xingming Sun, Alex Liu, Han-Chieh Chao and Elisa Bertino

“Cloud Computing and Security” Metadata:
- Title: Cloud Computing and Security
- Authors: Xingming SunAlex LiuHan-Chieh ChaoElisa Bertino
- Language: English
- Number of Pages: Median: 740
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2016 - 2017 - 2018
“Cloud Computing and Security” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Cloud computing - Data encryption (computer science) - Multimedia systems - Computer security
Edition Identifiers:
- The Open Library ID: ➤ OL28324562M - OL28032613M - OL30050629M - OL28026209M - OL30908658M - OL28214505M - OL34528870M - OL28172145M - OL28182086M - OL28213984M - OL28329024M - OL28129576M
- All ISBNs: ➤ 9783030000202 - 9783319486703 - 9783319685045 - 3319685414 - 9783319486734 - 9783030000172 - 9783030000080 - 3030000087 - 3030000141 - 3030000052 - 9783319270500 - 3030000117 - 9783319270517 - 331968504X - 3319270516 - 3030000206 - 3030000176 - 3319486705 - 3319270508 - 9783030000059 - 9783030000141 - 9783030000110 - 331948673X - 9783319685410
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cloud Computing and Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Guide to computer network security
By Joseph Migga Kizza

“Guide to computer network security” Metadata:
- Title: ➤ Guide to computer network security
- Author: Joseph Migga Kizza
- Language: English
- Number of Pages: Median: 548
- Publisher: ➤ Springer - Springer International Publishing AG
- Publish Date: ➤ 2009 - 2013 - 2015 - 2017 - 2018 - 2020 - 2024 - 2025
“Guide to computer network security” Subjects and Themes:
- Subjects: Computer networks - Security measures - Access control - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL27982675M - OL28182862M - OL34569230M - OL37104048M - OL43207044M - OL35848001M - OL50637348M - OL27179429M - OL57748209M
- Online Computer Library Center (OCLC) ID: 898418431
- All ISBNs: ➤ 3030381404 - 9781447145448 - 1447166531 - 9783030381400 - 9783031475481 - 9781447166535 - 3319857061 - 3319556053 - 9781848009172 - 1447145445 - 9783319857060 - 9781447145424 - 1848009178 - 3031475488 - 9783319556055 - 1447145429 - 303147743X - 9783031477430
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Guide to computer network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39The tangled Web
By Michal Zalewski

“The tangled Web” Metadata:
- Title: The tangled Web
- Author: Michal Zalewski
- Language: English
- Number of Pages: Median: 299
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco
“The tangled Web” Subjects and Themes:
- Subjects: ➤ COMPUTERS / Networking / Security - COMPUTERS / Internet / Security - Computer networks - Browsers (Computer programs) - COMPUTERS / Web / Browsers - COMPUTERS / Networking / General - COMPUTERS / Security / Cryptography - COMPUTERS / Security / General - Computer security - COMPUTERS / Networking / Network Protocols - Security measures - COMPUTERS / Web / Web Programming - COMPUTERS / Security / Viruses - Computer networks, security measures - Web sites - Computer networks--security measures - Browsers (computer programs)
Edition Identifiers:
- The Open Library ID: OL25078214M
- Online Computer Library Center (OCLC) ID: 714726106 - 786166335
- Library of Congress Control Number (LCCN): 2011039636
- All ISBNs: 9781593273880 - 1593273886
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The tangled Web at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Network security essentials
By William Stallings

“Network security essentials” Metadata:
- Title: Network security essentials
- Author: William Stallings
- Number of Pages: Median: 464
- Publisher: Pearson
- Publish Date: 2016
“Network security essentials” Subjects and Themes:
- Subjects: Computer networks - Security measures - Computer security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL28179580M
- Online Computer Library Center (OCLC) ID: 948671000
- Library of Congress Control Number (LCCN): 2016020709
- All ISBNs: 9780134527338 - 013452733X
Author's Alternative Names:
"Stallings, William; William Walter Stallings" and "W. Stallings"Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Network security essentials at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Basics of Web Hacking
By Josh Pauli

“Basics of Web Hacking” Metadata:
- Title: Basics of Web Hacking
- Author: Josh Pauli
- Language: English
- Number of Pages: Median: 160
- Publisher: ➤ Syngress - Elsevier Science & Technology Books
- Publish Date: 2013
“Basics of Web Hacking” Subjects and Themes:
- Subjects: ➤ Web sites - Computer networks, security measures - Computer security - Hackers - Computer crimes - Application software - Security measures - Web applications - Computer networks - Penetration testing (Computer security) - Prevention - Computer hackers
Edition Identifiers:
- The Open Library ID: OL34602847M - OL28511782M
- Online Computer Library Center (OCLC) ID: 858036837
- Library of Congress Control Number (LCCN): 2013017240
- All ISBNs: 9780124166004 - 0124166008 - 0124166598 - 9780124166592
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Basics of Web Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Mastering network security
By Chris Brenton and Cameron Hunt

“Mastering network security” Metadata:
- Title: Mastering network security
- Authors: Chris BrentonCameron Hunt
- Language: English
- Number of Pages: Median: 672
- Publisher: ➤ SYBEX - John Wiley & Sons, Ltd. - Sybex - Network - Wiley & Sons, Incorporated, John
- Publish Date: 1998 - 2002 - 2003 - 2006
- Publish Location: ➤ New York - London - San Francisco, Calif
“Mastering network security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer networks - Computer security - Data protection - Nonfiction - Security measures - Networking - COMPUTERS - General - Internet - Security - Data security & data encryption - Network security - Computers - Computer Security - Computer Data Security - Microcomputer Networks - Computer Books: General - Security - General - Networking - General - Computers / Security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL24265867M - OL39884225M - OL8096564M - OL398234M - OL22445777M
- Online Computer Library Center (OCLC) ID: 745061767 - 40647147
- Library of Congress Control Number (LCCN): 98087201 - 2002108077
- All ISBNs: ➤ 0782151485 - 0782141420 - 9781280650055 - 9780782151480 - 9780782141429 - 0782123430 - 9780782123432 - 1280650052
First Setence:
"WE ALL PROBABLY HAVE an idea about what the word system means."
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mastering network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Protocols for secure electronic commerce
By Mostafa Hashem Sherif

“Protocols for secure electronic commerce” Metadata:
- Title: ➤ Protocols for secure electronic commerce
- Author: Mostafa Hashem Sherif
- Language: English
- Number of Pages: Median: 496
- Publisher: ➤ Taylor & Francis Group - CRC Press
- Publish Date: ➤ 2000 - 2003 - 2004 - 2016 - 2017
- Publish Location: Boca Raton, FL
“Protocols for secure electronic commerce” Subjects and Themes:
- Subjects: ➤ Electronic commerce - Credit cards - Computer networks, security measures - Computer networks - Security measures - Bank credit cards - Computer security - Commerce électronique - Cartes bancaires - Réseaux d'ordinateurs - Sécurité - Mesures - BUSINESS & ECONOMICS - Marketing - Telemarketing - Multilevel - Mail Order - Direct - E-Commerce - Internet Marketing - Industrial Management - Management - Management Science - Organizational Behavior
Edition Identifiers:
- The Open Library ID: ➤ OL33635442M - OL33774326M - OL29015669M - OL33482050M - OL33498459M - OL29813431M - OL9603258M - OL22568308M - OL28803346M - OL33368522M - OL29832091M - OL33742356M - OL29832087M
- Online Computer Library Center (OCLC) ID: 61280433 - 70246835 - 42980334 - 951505382
- Library of Congress Control Number (LCCN): 2015040118 - 99089494 - 2003061098
- All ISBNs: ➤ 9780203507087 - 9781482203776 - 148220374X - 1351836188 - 9780849395970 - 9781315337340 - 9781420040012 - 1315356406 - 1482203774 - 9781351836180 - 1315220296 - 9781482203745 - 1280242523 - 0203507088 - 9781280242526 - 1351827499 - 0849395976 - 1420040014 - 1315337347 - 9781315373973 - 9780849315091 - 9781315220291 - 9781351827492 - 1315373971 - 9781315356402 - 0849315093
First Setence:
"Electronic commerce (or e-commerce) is a multidisciplinary activity that influences the behavior of the participants and the relations that they establish among themselves."
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Protocols for secure electronic commerce at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Silence on the Wire
By Michal Zalewski

“Silence on the Wire” Metadata:
- Title: Silence on the Wire
- Author: Michal Zalewski
- Languages: English - ger
- Number of Pages: Median: 313
- Publisher: Hanser - No Starch Press
- Publish Date: 2005 - 2007
- Publish Location: Mu nchen - Wien
“Silence on the Wire” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer networks - Security measures - Computer networks--Security measures
Edition Identifiers:
- The Open Library ID: OL54543288M - OL25534208M - OL8871403M
- Online Computer Library Center (OCLC) ID: 55124380 - 698798014
- Library of Congress Control Number (LCCN): 2004009744
- All ISBNs: ➤ 1593270933 - 9781593270469 - 9783446408005 - 3446408002 - 9781593270933 - 1593270461
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Silence on the Wire at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Information Security and IT Risk Management
By Manish Agrawal, Alex Campoe and Eric Pierce

“Information Security and IT Risk Management” Metadata:
- Title: ➤ Information Security and IT Risk Management
- Authors: Manish AgrawalAlex CampoeEric Pierce
- Language: English
- Number of Pages: Median: 432
- Publisher: ➤ Prospect Press - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: 2014 - 2024
“Information Security and IT Risk Management” Subjects and Themes:
- Subjects: ➤ Data protection - Computer networks, security measures - Computer security - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: ➤ OL39965058M - OL35585978M - OL39956474M - OL51136479M - OL51140724M - OL27557753M
- Library of Congress Control Number (LCCN): 2014000622 - 2014010463
- All ISBNs: ➤ 9781118802977 - 1118802977 - 1118803094 - 9781958303160 - 195830316X - 9781958303177 - 111880306X - 9781118335895 - 1118335899 - 9781118803097 - 1958303178 - 9781118803066
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security and IT Risk Management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Access control, authentication, and public key infrastructure
By Bill Ballad

“Access control, authentication, and public key infrastructure” Metadata:
- Title: ➤ Access control, authentication, and public key infrastructure
- Author: Bill Ballad
- Language: English
- Number of Pages: Median: 400
- Publisher: ➤ Jones & Bartlett Learning, LLC - Jones & Bartlett Learning
- Publish Date: 2011 - 2013
- Publish Location: Sudbury, MA
“Access control, authentication, and public key infrastructure” Subjects and Themes:
- Subjects: ➤ Public key cryptography - Computers - Access control - Authentication - Computer security - Computer networks, security measures - Computers, access control - Cryptography
Edition Identifiers:
- The Open Library ID: OL25047332M - OL28512974M - OL29698839M
- Online Computer Library Center (OCLC) ID: 702369403 - 650217951
- Library of Congress Control Number (LCCN): 2011282487 - 2013372266
- All ISBNs: ➤ 1284031594 - 0763791288 - 9781284031591 - 1284031608 - 9781284031607 - 9780763791285
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Access control, authentication, and public key infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47CISSP OFFICIAL (ISC)2 PRACTICE TESTS
By Mike Chapple and David Seidl

“CISSP OFFICIAL (ISC)2 PRACTICE TESTS” Metadata:
- Title: ➤ CISSP OFFICIAL (ISC)2 PRACTICE TESTS
- Authors: Mike ChappleDavid Seidl
- Language: English
- Number of Pages: Median: 484
- Publisher: ➤ Wiley & Sons, Incorporated, John - SYBEX
- Publish Date: 2016 - 2018
“CISSP OFFICIAL (ISC)2 PRACTICE TESTS” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Computer networks - Examinations, questions - Security measures - Réseaux d'ordinateurs - Examens, questions - Sécurité - Mesures - Sécurité informatique
Edition Identifiers:
- The Open Library ID: OL34527614M - OL26419319M - OL29373865M - OL34533005M - OL29373870M
- Online Computer Library Center (OCLC) ID: 958144822
- All ISBNs: ➤ 9781119252290 - 9781119288046 - 9781119475965 - 1119475945 - 1119252296 - 9781119252283 - 9781119475941 - 1119288045 - 1119252288 - 1119475961
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CISSP OFFICIAL (ISC)2 PRACTICE TESTS at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Introduction to Computer Networks and Cybersecurity
By Chwan-Hwa (John) Wu and J. David Irwin

“Introduction to Computer Networks and Cybersecurity” Metadata:
- Title: ➤ Introduction to Computer Networks and Cybersecurity
- Authors: Chwan-Hwa (John) WuJ. David Irwin
- Language: English
- Number of Pages: Median: 1336
- Publisher: Taylor & Francis Group
- Publish Date: 2013 - 2016 - 2017
“Introduction to Computer Networks and Cybersecurity” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer networks - COMPUTERS / Networking / General - COMPUTERS / Security / General - COMPUTERS / Information Technology - Security measures
Edition Identifiers:
- The Open Library ID: ➤ OL28489043M - OL29232952M - OL29291183M - OL33679256M - OL28843777M - OL33542893M
- Online Computer Library Center (OCLC) ID: 899501242
- Library of Congress Control Number (LCCN): 2012036920
- All ISBNs: ➤ 9781466572133 - 9780429101311 - 1466572140 - 9781466572140 - 9781498760133 - 9781138071896 - 1466572132 - 1138071897 - 1498760139 - 9781466575400 - 1466575409 - 0429101317
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Introduction to Computer Networks and Cybersecurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
By Mike Chapple, James Michael Stewart and Darril Gibson
“(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide” Metadata:
- Title: ➤ (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
- Authors: Mike ChappleJames Michael StewartDarril Gibson
- Language: English
- Number of Pages: Median: 1248
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John
- Publish Date: 2018 - 2021 - 2024
“(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks, security measures - Electronic data processing personnel, certification - Engineers - General - Professional, career & trade -> computer science -> certification - Security - Auditing - Professional, career & trade -> computer science -> networking - Business & economics -> accounting -> auditing - Tp20 - Cs41 - Professional, career & trade -> computer science -> internet & www
Edition Identifiers:
- The Open Library ID: ➤ OL33828102M - OL50622344M - OL33820343M - OL36734327M - OL33828135M - OL33622301M - OL50654839M - OL33586458M
- All ISBNs: ➤ 1119475953 - 1394254717 - 1119786231 - 9781119786245 - 9781119786337 - 9781119786238 - 9781119475873 - 9781119475958 - 1119786339 - 9781119549567 - 111978624X - 1394254709 - 9781394254712 - 1119549566 - 1119475872 - 9781394254705
Author's Alternative Names:
"James M. Stewart"Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Practical Network Security Monitoring
By Richard Bejtlich

“Practical Network Security Monitoring” Metadata:
- Title: ➤ Practical Network Security Monitoring
- Author: Richard Bejtlich
- Number of Pages: Median: 376
- Publisher: No Starch Press,US
- Publish Date: 2013
“Practical Network Security Monitoring” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer networks - Security measures - Electronic countermeasures
Edition Identifiers:
- The Open Library ID: OL26185467M
- Library of Congress Control Number (LCCN): 2013017966
- All ISBNs: 9781593275099 - 1593275099
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Practical Network Security Monitoring at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.