Explore: Computers Internet Security
Discover books, insights, and more — all in one place.
Learn more about Computers Internet Security with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computers----internet----security”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Mapping security
By Tom Patterson and Scott Gleeson Blue

“Mapping security” Metadata:
- Title: Mapping security
- Authors: Tom PattersonScott Gleeson Blue
- Language: English
- Number of Pages: Median: 419
- Publisher: ➤ Addison-Wesley Professional - Addison-Wesley
- Publish Date: 2004 - 2005
- Publish Location: London - Boston
“Mapping security” Subjects and Themes:
- Subjects: ➤ Data security & data encryption - Network security - Computer Data Security - International Business Administration - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Internet / Security - International - General - Computer networks - Electronic commerce - International business enterprises - Internet - Security measures - Computer security - Corporate planning
Edition Identifiers:
- The Open Library ID: OL9554400M - OL22156643M
- Online Computer Library Center (OCLC) ID: 57550889
- Library of Congress Control Number (LCCN): 2004113324
- All ISBNs: 0321304527 - 9780321304520
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Mapping security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Protecting your internet identity
By Ted Claypoole

“Protecting your internet identity” Metadata:
- Title: ➤ Protecting your internet identity
- Author: Ted Claypoole
- Language: English
- Number of Pages: Median: 215
- Publisher: ➤ Rowman & Littlefield Publishers
- Publish Date: 2012
- Publish Location: Lanham, Md
“Protecting your internet identity” Subjects and Themes:
- Subjects: ➤ Social aspects - TECHNOLOGY & ENGINEERING / Telecommunications - SOCIAL SCIENCE / Criminology - COMPUTERS / Security / General - COMPUTERS / Internet / Security - Online identities - Internet - Prevention - Online identity theft - TECHNOLOGY & ENGINEERING - SOCIAL SCIENCE - COMPUTERS - General - Security - Telecommunications - Criminology - Internet, social aspects - Identity theft - Computer crimes - Crime prevention
Edition Identifiers:
- The Open Library ID: OL25121678M
- Online Computer Library Center (OCLC) ID: 746835045
- Library of Congress Control Number (LCCN): 2011045107
- All ISBNs: 9781442212213 - 1442212209 - 1442212217 - 9781442212206
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Protecting your internet identity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Penetration Testing: A Hands-On Introduction to Hacking
By Georgia Weidman

“Penetration Testing: A Hands-On Introduction to Hacking” Metadata:
- Title: ➤ Penetration Testing: A Hands-On Introduction to Hacking
- Author: Georgia Weidman
- Number of Pages: Median: 528
- Publisher: No Starch Press
- Publish Date: 2014
“Penetration Testing: A Hands-On Introduction to Hacking” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Kali Linux - Hackers - Computer security - COMPUTERS / Internet / Security - COMPUTERS / Networking / Security - COMPUTERS / Security / General - Penetration testing (computer security) - Computers / internet / security - Computers / networking / security - Computers / security / general
Edition Identifiers:
- The Open Library ID: OL26838292M
- Online Computer Library Center (OCLC) ID: 881503059
- Library of Congress Control Number (LCCN): 2014001066
- All ISBNs: 9781593275648 - 1593275641
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Penetration Testing: A Hands-On Introduction to Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Metasploit
By David Kennedy

“Metasploit” Metadata:
- Title: Metasploit
- Author: David Kennedy
- Language: English
- Number of Pages: Median: 299
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco, Calif
“Metasploit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - COMPUTERS / Internet / Security - Computer networks - Computers - COMPUTERS / Security / General - COMPUTERS / Internet / General - Metasploit (Electronic resource) - Security measures - COMPUTERS / Security / Viruses - Computer networks, security measures - Open source software
Edition Identifiers:
- The Open Library ID: OL24896075M
- Online Computer Library Center (OCLC) ID: 754641929
- Library of Congress Control Number (LCCN): 2011020166
- All ISBNs: 9781593272883 - 159327288X
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Metasploit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Metasploit
By David Kennedy

“Metasploit” Metadata:
- Title: Metasploit
- Author: David Kennedy
- Language: English
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco, Calif
“Metasploit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - COMPUTERS / Internet / Security - Computer networks - Computers - COMPUTERS / Security / General - COMPUTERS / Internet / General - Metasploit (Electronic resource) - Security measures - COMPUTERS / Security / Viruses
Edition Identifiers:
- The Open Library ID: OL24906341M
- Library of Congress Control Number (LCCN): 2011020166
- All ISBNs: 9781593272883 - 159327288X
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Metasploit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6The tangled Web
By Michal Zalewski

“The tangled Web” Metadata:
- Title: The tangled Web
- Author: Michal Zalewski
- Language: English
- Number of Pages: Median: 299
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco
“The tangled Web” Subjects and Themes:
- Subjects: ➤ COMPUTERS / Networking / Security - COMPUTERS / Internet / Security - Computer networks - Browsers (Computer programs) - COMPUTERS / Web / Browsers - COMPUTERS / Networking / General - COMPUTERS / Security / Cryptography - COMPUTERS / Security / General - Computer security - COMPUTERS / Networking / Network Protocols - Security measures - COMPUTERS / Web / Web Programming - COMPUTERS / Security / Viruses - Computer networks, security measures - Web sites - Computer networks--security measures - Browsers (computer programs)
Edition Identifiers:
- The Open Library ID: OL25078214M
- Online Computer Library Center (OCLC) ID: 714726106 - 786166335
- Library of Congress Control Number (LCCN): 2011039636
- All ISBNs: 9781593273880 - 1593273886
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The tangled Web at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Internet of Things
By S. Velliangiri, Sathish A. P. Kumar and P. Karthikeyan
“Internet of Things” Metadata:
- Title: Internet of Things
- Authors: S. VelliangiriSathish A. P. KumarP. Karthikeyan
- Language: English
- Number of Pages: Median: 200
- Publisher: Taylor & Francis Group
- Publish Date: 2020 - 2024
“Internet of Things” Subjects and Themes:
- Subjects: ➤ Internet of things - Security measures - Internet des objets - Sécurité - Mesures - COMPUTERS / Database Management / Data Mining - COMPUTERS / Internet / Security - TECHNOLOGY / Manufacturing
Edition Identifiers:
- The Open Library ID: ➤ OL30189673M - OL34680027M - OL30184239M - OL57526146M - OL30189414M - OL30189463M
- Online Computer Library Center (OCLC) ID: 1203025326
- All ISBNs: ➤ 9781000291674 - 9781003032441 - 0367672448 - 9780367893873 - 9781000291636 - 1000291634 - 1000291677 - 1000291650 - 1003032443 - 0367893878 - 9781000291650 - 9780367672447
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Internet of Things at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Cyber Enigma
By E. Dilipraj
“Cyber Enigma” Metadata:
- Title: Cyber Enigma
- Author: E. Dilipraj
- Language: English
- Number of Pages: Median: 262
- Publisher: ➤ KW Publishers Pvt Ltd in association with Centre for Air Power Studies - Taylor & Francis Group
- Publish Date: 2017 - 2019 - 2023
- Publish Location: New Delhi [India]
“Cyber Enigma” Subjects and Themes:
- Subjects: ➤ Cyberterrorism - BUSINESS & ECONOMICS / Infrastructure - SOCIAL SCIENCE / General - COMPUTERS / Internet / Security - COMPUTERS / Virtual Reality
Edition Identifiers:
- The Open Library ID: ➤ OL49698610M - OL40074978M - OL44323362M - OL33741793M - OL39944292M - OL40087322M - OL39945918M
- Online Computer Library Center (OCLC) ID: 1103918843 - 990248542
- Library of Congress Control Number (LCCN): 2017324346
- All ISBNs: ➤ 9780367322649 - 0367322641 - 0429325568 - 9781000507737 - 9386288575 - 9789386288578 - 1000507734 - 9781000517651 - 9781032653952 - 9789386288585 - 9780429325564 - 9781000512694 - 9386288583 - 100051269X - 1032653957 - 1000517659
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cyber Enigma at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Build your own security lab
a field guide for network testing
By Michael Gregg

“Build your own security lab” Metadata:
- Title: Build your own security lab
- Author: Michael Gregg
- Language: English
- Number of Pages: Median: 456
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley
- Publish Date: 2008 - 2010 - 2011
- Publish Location: Indianapolis, IN
“Build your own security lab” Subjects and Themes:
- Subjects: ➤ Computer networks - Testing - Security measures - COMPUTERS / Networking / Security - Computer networks / Security measures / Testing - COMPUTERS / Internet / Security - COMPUTERS / Security / General - Réseaux d'ordinateurs - Wireless communication systems - Networking - COMPUTERS - General - Internet - Security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL29103933M - OL29047277M - OL19141879M - OL18893654M - OL10294432M - OL19999522M
- Online Computer Library Center (OCLC) ID: 699852569
- Library of Congress Control Number (LCCN): 2008009610
- All ISBNs: ➤ 9780470179864 - 1118080637 - 9780470379479 - 9781118080634 - 0470379472 - 0470179864
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Build your own security lab at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Routledge Companion to Global Cyber-Security Strategy
By Scott N. Romaniuk and Mary Manjikian

“Routledge Companion to Global Cyber-Security Strategy” Metadata:
- Title: ➤ Routledge Companion to Global Cyber-Security Strategy
- Authors: Scott N. RomaniukMary Manjikian
- Language: English
- Number of Pages: Median: 560
- Publisher: Taylor & Francis Group
- Publish Date: 2020 - 2021 - 2023
“Routledge Companion to Global Cyber-Security Strategy” Subjects and Themes:
- Subjects: ➤ Strategy - Internet, security measures - International relations - National security - Cyberspace - Security measures - Government policy - Cyberterrorism - Prevention - Computer crimes - Computer security - Internet - Computer networks - Sécurité informatique - Politique gouvernementale - Sécurité - Mesures - Réseaux d'ordinateurs - POLITICAL SCIENCE / Political Freedom & Security / International Security - HISTORY / Military / Strategy - COMPUTERS / Internet / Security
Edition Identifiers:
- The Open Library ID: ➤ OL29529085M - OL29530536M - OL46569080M - OL29530228M - OL29530267M - OL34667445M
- Online Computer Library Center (OCLC) ID: 1158506535
- Library of Congress Control Number (LCCN): 2020024630
- All ISBNs: ➤ 0429680368 - 9780367024239 - 9780367620660 - 042968035X - 9780429399718 - 0429680376 - 9780429680366 - 0367620669 - 0429399715 - 9780429680359 - 9780429680373 - 0367024233
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Routledge Companion to Global Cyber-Security Strategy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11What stays in Vegas
By Adam Tanner

“What stays in Vegas” Metadata:
- Title: What stays in Vegas
- Author: Adam Tanner
- Language: English
- Number of Pages: Median: 326
- Publisher: PublicAffairs
- Publish Date: 2014 - 2016
“What stays in Vegas” Subjects and Themes:
- Subjects: ➤ Business intelligence - Casinos - Consumer profiling - Customer services - Ceasars Entertainment - Right of Privacy - Case studies - Privacy, right of - Consumer behavior - Nevada, economic conditions - BUSINESS & ECONOMICS / Marketing / Direct - LAW / Privacy - COMPUTERS / Internet / Security - New York Times reviewed - Caesars Entertainment Corporation
- Places: United States - Nevada - Las Vegas
Edition Identifiers:
- The Open Library ID: OL27164325M - OL34516929M - OL34869160M - OL27424209M
- Online Computer Library Center (OCLC) ID: 869266801
- Library of Congress Control Number (LCCN): 2014019481
- All ISBNs: ➤ 9781322544472 - 1610396391 - 1610394194 - 9781610396394 - 1610394186 - 9781610394185 - 9781610394192 - 1322544476
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find What stays in Vegas at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Security Risk Models for Cyber Insurance
By David Rios Insua, Caroline Baylon and Jose Vila
“Security Risk Models for Cyber Insurance” Metadata:
- Title: ➤ Security Risk Models for Cyber Insurance
- Authors: David Rios InsuaCaroline BaylonJose Vila
- Language: English
- Number of Pages: Median: 149
- Publisher: ➤ Taylor & Francis Group - CRC Press LLC
- Publish Date: 2020 - 2022
“Security Risk Models for Cyber Insurance” Subjects and Themes:
- Subjects: ➤ Computer insurance - Computer security - Risk management - COMPUTERS / Security / General - MATHEMATICS / Probability & Statistics / General - COMPUTERS / Internet / Security
Edition Identifiers:
- The Open Library ID: ➤ OL34686425M - OL54015717M - OL33815248M - OL33815233M - OL33815332M - OL33815279M
- Online Computer Library Center (OCLC) ID: 1226565273
- All ISBNs: ➤ 9781000336221 - 9780367672638 - 1000336190 - 9781000336191 - 9781000336160 - 0367672634 - 0429329482 - 1000336166 - 0367339498 - 9780367339494 - 1000336220 - 9780429329487
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Security Risk Models for Cyber Insurance at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13The smartphone
anatomy of an industry
By Elizabeth Woyke

“The smartphone” Metadata:
- Title: The smartphone
- Author: Elizabeth Woyke
- Language: English
- Number of Pages: Median: 296
- Publisher: New Press, The - The New Press
- Publish Date: 2011 - 2014
- Publish Location: New York
“The smartphone” Subjects and Themes:
- Subjects: ➤ Cell phones - Electronic industries - Smartphones - Telecommunication - Smart phones - BUSINESS & ECONOMICS / Industries / Computer Industry - COMPUTERS / Social Aspects / Human-Computer Interaction - COMPUTERS / Internet / Security
Edition Identifiers:
- The Open Library ID: OL26197156M - OL35799881M - OL37201800M
- Online Computer Library Center (OCLC) ID: 881318295
- Library of Congress Control Number (LCCN): 2014020781
- All ISBNs: ➤ 9781595589637 - 1595589635 - 1322549893 - 1595589686 - 9781595589682 - 9781322549897
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The smartphone at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Mainframe basics for security professionals
By Ori Pomerantz, Barbara Vander Weele, Mark Nelson and Tim Hahn

“Mainframe basics for security professionals” Metadata:
- Title: ➤ Mainframe basics for security professionals
- Authors: Ori PomerantzBarbara Vander WeeleMark NelsonTim Hahn
- Language: English
- Number of Pages: Median: 174
- Publisher: ➤ Pearson Education, Limited - IBM Press - IBM Press/Pearson - IBM Pr
- Publish Date: 2007 - 2008
- Publish Location: ➤ Upper Saddle River, N.J - Upper Saddle River, NJ
“Mainframe basics for security professionals” Subjects and Themes:
- Subjects: ➤ Electronic digital computers - Z/OS - Computer security - Network security - Computers - Computer - Internet - Computer Books: Internet General - Hardware - Personal Computers - General - Internet - Security - Computers / Internet / Security - Computer security - Electronic digital computers
Edition Identifiers:
- The Open Library ID: ➤ OL50173723M - OL35570943M - OL35567854M - OL29181196M - OL10083012M - OL18840829M
- Online Computer Library Center (OCLC) ID: 297576631
- Library of Congress Control Number (LCCN): 2007044290
- All ISBNs: ➤ 9780132704342 - 9780131738560 - 0137137583 - 9780137137596 - 0131738569 - 9780137137589 - 013270434X - 9780133763041 - 0133763048 - 0137137591
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mainframe basics for security professionals at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Introduction to cybercrime
By Joshua Hill

“Introduction to cybercrime” Metadata:
- Title: Introduction to cybercrime
- Author: Joshua Hill
- Language: English
- Number of Pages: Median: 290
- Publisher: Praeger
- Publish Date: 2016
- Publish Location: Santa Barbara, CA
“Introduction to cybercrime” Subjects and Themes:
- Subjects: ➤ Computer crimes - LAW / Communications - Internet - COMPUTERS / Internet / Security - Security measures - Prevention - Crime prevention
Edition Identifiers:
- The Open Library ID: OL30400363M
- Online Computer Library Center (OCLC) ID: 900016494
- Library of Congress Control Number (LCCN): 2015036592
- All ISBNs: ➤ 9781440832741 - 1440835330 - 1440832730 - 1440832749 - 9781440835339 - 9781440832734
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Introduction to cybercrime at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Mobile Technology and Social Transformations
By Stefanie Felsberger and Ramesh Subramanian
“Mobile Technology and Social Transformations” Metadata:
- Title: ➤ Mobile Technology and Social Transformations
- Authors: Stefanie FelsbergerRamesh Subramanian
- Language: English
- Publisher: Taylor & Francis Group
- Publish Date: 2021
“Mobile Technology and Social Transformations” Subjects and Themes:
- Subjects: ➤ Sociology - Cell phone systems - Social aspects - Social change - Information networks - Law and legislation - Knowledge management - Case studies - Téléphonie cellulaire - Aspect social - Gestion des connaissances - Études de cas - BUSINESS & ECONOMICS / Knowledge Capital - COMPUTERS / Internet / General - COMPUTERS / Internet / Security
Edition Identifiers:
- The Open Library ID: OL34697142M - OL36257278M - OL34763673M - OL34763720M - OL34697133M
- Online Computer Library Center (OCLC) ID: 1221018972
- Library of Congress Control Number (LCCN): 2020045958
- All ISBNs: ➤ 1000375218 - 0367545241 - 9781003089575 - 9781000375213 - 9780367545222 - 1003089577 - 9781000375145 - 9780367545246 - 0367545225 - 1000375145
Access and General Info:
- First Year Published: 2021
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Mobile Technology and Social Transformations at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17China and Cybersecurity
By Jon R. Lindsay, Tai Ming Cheung and Derek S. Reveron

“China and Cybersecurity” Metadata:
- Title: China and Cybersecurity
- Authors: Jon R. LindsayTai Ming CheungDerek S. Reveron
- Language: English
- Number of Pages: Median: 384
- Publisher: ➤ Oxford University Press - Oxford University Press, Incorporated
- Publish Date: 2015
“China and Cybersecurity” Subjects and Themes:
- Subjects: ➤ National security, united states - Security, international - International cooperation - Terrorism - Cyberterrorism - National security - International Security - COMPUTERS / Internet / Security - POLITICAL SCIENCE / Political Freedom & Security / International Security - BUSINESS & ECONOMICS / International / Economics
Edition Identifiers:
- The Open Library ID: OL28559112M - OL46053954M - OL36313302M - OL28559100M
- Online Computer Library Center (OCLC) ID: 893897354
- Library of Congress Control Number (LCCN): 2014046287
- All ISBNs: ➤ 0190201266 - 9780190201289 - 9781322875101 - 1322875103 - 0190201274 - 0190201282 - 9780190201265 - 9780190201272
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find China and Cybersecurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Securing VoIP networks
By Peter Thermos and Ari Takanen

“Securing VoIP networks” Metadata:
- Title: Securing VoIP networks
- Authors: Peter ThermosAri Takanen
- Language: English
- Number of Pages: Median: 359
- Publisher: ➤ Pearson Education, Limited - Addison-Wesley - Addison-Wesley Professional
- Publish Date: 2007 - 2008
- Publish Location: ➤ Boston, MA - Upper Saddle River, NJ
“Securing VoIP networks” Subjects and Themes:
- Subjects: ➤ Internet telephony - Security measures - Network security - Computers - Computer - Internet - Computers - Computer Security - Computer Books: Internet General - Networking - General - Security - General - Computers / Internet / Security - Internet - Security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL35569146M - OL9802245M - OL18498154M - OL22767543M
- Online Computer Library Center (OCLC) ID: 123955114 - 172622934
- Library of Congress Control Number (LCCN): 2007017689
- All ISBNs: 9780321524966 - 0321524969 - 9780321437341 - 0321437349
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Securing VoIP networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19CCSP self-study
By Grey, Paul CCIE., Ido Dubrawsky and Paul Grey

“CCSP self-study” Metadata:
- Title: CCSP self-study
- Authors: Grey, Paul CCIE.Ido DubrawskyPaul Grey
- Language: English
- Number of Pages: Median: 508
- Publisher: Cisco - Cisco Press
- Publish Date: 2004 - 2005
- Publish Location: Indianapolis, Ind
“CCSP self-study” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computing and Information Technology - Data security & data encryption - Network security - Networking - Security - Computers - Computers - Certification - Computer Books: Internet General - Certification Guides - Cisco - Computers / Internet / Security - Internet - Security - Extranets (computer networks) - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL3314955M - OL8823144M
- Online Computer Library Center (OCLC) ID: 57200207
- Library of Congress Control Number (LCCN): 2004107545
- All ISBNs: 1587201321 - 9781587201325
Author's Alternative Names:
"Ido Dubrawski"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CCSP self-study at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Understanding PKI
By Carlisle Adams, Carlisle Adams and Steve Lloyd

“Understanding PKI” Metadata:
- Title: Understanding PKI
- Authors: Carlisle AdamsCarlisle AdamsSteve Lloyd
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Pearson Education, Limited - Addison-Wesley Professional - Addison-Wesley
- Publish Date: 2002 - 2003
- Publish Location: Boston
“Understanding PKI” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Business enterprises - Public key infrastructure (Computer security) - Data security & data encryption - Network security - Cryptography/Access Control - Computers - Computers - Computer Security - Security - General - Computer Books: General - Networking - General - Computers / Internet / Security - Public key infrastructure (Com - Computer security - Computer networks, security measures - Business enterprises, computer networks - Business enterprises--computer networks--security measures - Computer networks--security measures - Public key infrastructure (computer security) - Qa76.9.a25 a346 2003 - 005.8
Edition Identifiers:
- The Open Library ID: OL21169862M - OL7668473M - OL28998865M
- Online Computer Library Center (OCLC) ID: 50198373
- Library of Congress Control Number (LCCN): 2002074687
- All ISBNs: 9780321743091 - 0672323915 - 0321743091 - 9780672323911
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Understanding PKI at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Cisco Asa
By Frahim, Jazib/ Santos, Omar, Omar Santos and Jazib Frahim

“Cisco Asa” Metadata:
- Title: Cisco Asa
- Authors: Frahim, Jazib/ Santos, OmarOmar SantosJazib Frahim
- Language: English
- Number of Pages: Median: 1044
- Publisher: ➤ Pearson Education, Limited - Cisco Press - Macmillan Technical Pub
- Publish Date: 2005 - 2006 - 2014
“Cisco Asa” Subjects and Themes:
- Subjects: ➤ Data security & data encryption - Internet - Network security - Computers - Computer Data Security - Computer Network Management - Computer - Internet - Computer Books: General - Security - General - Internet - Security - Certification Guides - Cisco - Computers / Internet / Security - Networking - General - Computer networks, security measures - Computer networks - Security measures - Firewalls (Computer security)
Edition Identifiers:
- The Open Library ID: OL54048783M - OL35518959M - OL8822253M - OL23091021M
- Library of Congress Control Number (LCCN): 2004108505
- All ISBNs: ➤ 1587140985 - 9780132954419 - 9781587052095 - 9781587140983 - 0132954419 - 1587052091
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cisco Asa at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Real 802.11 security
By Jon Edney and William A. Arbaugh

“Real 802.11 security” Metadata:
- Title: Real 802.11 security
- Authors: Jon EdneyWilliam A. Arbaugh
- Language: English
- Number of Pages: Median: 480
- Publisher: ➤ Addison-Wesley - Addison-Wesley Professional
- Publish Date: 2003 - 2004
- Publish Location: Boston, MA
“Real 802.11 security” Subjects and Themes:
- Subjects: ➤ IEEE 802.11 (Standard) - Security measures - Wireless LANs - Communications engineering / telecommunications - Network security - Networking standards & protocols - Computer Data Security - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Internet / Security - Internet - General - Networking - Local Area Networks (LANs) - Lokales Netz - Sicherheit - Computer security
Edition Identifiers:
- The Open Library ID: OL3686297M - OL9561244M
- Library of Congress Control Number (LCCN): 2003049595
- All ISBNs: 0321136209 - 9780321136206
First Setence:
"Broadcast radio and, later, broadcast TV have defined wireless for two generations."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Real 802.11 security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23The hacked world order
By Adam Segal
“The hacked world order” Metadata:
- Title: The hacked world order
- Author: Adam Segal
- Language: English
- Number of Pages: Median: 306
- Publisher: PublicAffairs
- Publish Date: 2016
“The hacked world order” Subjects and Themes:
- Subjects: ➤ Cyberterrorism - Cyberspace - Technology and international relations - Internet in espionage - Internet and international relations - Hacking - Political aspects - POLITICAL SCIENCE / International Relations / General - COMPUTERS / Internet / Security - POLITICAL SCIENCE / Political Freedom & Security / International Security - POLITICAL SCIENCE - International Relations - General - Political Freedom & Security - International Security - COMPUTERS - Internet - Security - Spionage - Politiska aspekter
Edition Identifiers:
- The Open Library ID: OL27206750M
- Online Computer Library Center (OCLC) ID: 925426214
- Library of Congress Control Number (LCCN): 2015030885
- All ISBNs: 9781610394154 - 1610394151
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The hacked world order at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Intrusion signatures and analysis
By Stephen Northcutt, Mark Cooper, Matt Fearnow and Karen Frederick

“Intrusion signatures and analysis” Metadata:
- Title: ➤ Intrusion signatures and analysis
- Authors: Stephen NorthcuttMark CooperMatt FearnowKaren Frederick
- Language: English
- Number of Pages: Median: 379
- Publisher: New Riders - Sams
- Publish Date: 2001
- Publish Location: Indianapolis, Ind
“Intrusion signatures and analysis” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer security - Data security & data encryption - Security - General - Computer Data Security - Computers - Computers - Computer Security - Networking - General - Computer Books: General - Internet - Security - Computers / Internet / Security - Access control - Computers, access control
Edition Identifiers:
- The Open Library ID: OL7891435M - OL15495553M
- Online Computer Library Center (OCLC) ID: 46312517
- Library of Congress Control Number (LCCN): 00108786
- All ISBNs: 9780735710634 - 0735710635
First Setence:
"DID YOU EVER WATCH THE OLD cowboy-and-Indian movies on Saturday afternoon television when you were growing up?"
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Intrusion signatures and analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Computer forensics
By Nathan Clarke

“Computer forensics” Metadata:
- Title: Computer forensics
- Author: Nathan Clarke
- Language: English
- Number of Pages: Median: 75
- Publisher: IT Governance Pub.
- Publish Date: 2010
- Publish Location: Ely
“Computer forensics” Subjects and Themes:
- Subjects: ➤ COMPUTERS / Networking / Security - Forensic sciences - COMPUTERS / Internet / Security - Computer networks - COMPUTERS / Security / General - IT - Computer crimes - Investigation - Computer Science - Computer security - Security measures - Re seaux d'ordinateurs - Criminalistique - Criminalite informatique - Enque tes - Enquêtes - Réseaux d'ordinateurs - Criminalité informatique
Edition Identifiers:
- The Open Library ID: OL25542894M
- Online Computer Library Center (OCLC) ID: 857307614 - 662258332
- All ISBNs: 9781849280396 - 9781849280402 - 1849280398 - 1849280401
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer forensics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Online child safety
By Joseph Savirimuthu

“Online child safety” Metadata:
- Title: Online child safety
- Author: Joseph Savirimuthu
- Language: English
- Number of Pages: Median: 348
- Publisher: Palgrave Macmillan
- Publish Date: 2012
- Publish Location: New York
“Online child safety” Subjects and Themes:
- Subjects: ➤ Internet and children - Safety measures - Computers and children - SOCIAL SCIENCE / Media Studies - COMPUTERS / Internet / Security - Law and legislation - LAW / Science & Technology - SOCIAL SCIENCE / Children's Studies - Child pornography - Child sexual abuse - Computer crimes
Edition Identifiers:
- The Open Library ID: OL39511472M - OL37188925M - OL25132136M
- Online Computer Library Center (OCLC) ID: 724657331
- Library of Congress Control Number (LCCN): 2011048096
- All ISBNs: ➤ 0230241522 - 0230361005 - 9780230361003 - 9781283381444 - 9780230241527 - 1283381443
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Online child safety at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Cisco NAC appliance
By Jamey Heary, Chad Sullivan, Alok Agrawal and Jerry Lin

“Cisco NAC appliance” Metadata:
- Title: Cisco NAC appliance
- Authors: Jamey HearyChad SullivanAlok AgrawalJerry Lin
- Language: English
- Number of Pages: Median: 559
- Publisher: ➤ Pearson Education, Limited - Cisco Press
- Publish Date: 2007 - 2008
- Publish Location: Indianapolis, Ind
“Cisco NAC appliance” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Computers - Security measures - Network security - Computer - Internet - Computers - Computer Security - Computer Books: Internet General - Internet - Security - Networking - General - Security - General - Computers / Internet / Security - Computer networks, security measures - Computers, access control
Edition Identifiers:
- The Open Library ID: OL34787475M - OL8822285M - OL18276748M
- Online Computer Library Center (OCLC) ID: 153597810 - 172622796
- Library of Congress Control Number (LCCN): 2007026204
- All ISBNs: 9781587054808 - 1587054809 - 1587053063 - 9781587053061
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cisco NAC appliance at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Cisco Network Admission Control
By Jazib Frahim, Denise Helfrich, Lou Ronnau, Jason Frazier and Paul Forbes

“Cisco Network Admission Control” Metadata:
- Title: ➤ Cisco Network Admission Control
- Authors: Jazib FrahimDenise HelfrichLou RonnauJason FrazierPaul Forbes
- Language: English
- Number of Pages: Median: 264
- Publisher: Cisco - Cisco Press
- Publish Date: 2006 - 2007
- Publish Location: London - Indianapolis, Ind
“Cisco Network Admission Control” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Security measures - Network security - Internet - Security - Data Transmission Standards And Protocols - Computers - Computers - Communications / Networking - Computer Books: General - Networking - General - Computers / Internet / Security - Networking - Network Protocols
Edition Identifiers:
- The Open Library ID: OL8822269M - OL17983868M - OL17939212M
- Online Computer Library Center (OCLC) ID: 85872627 - 72150672 - 85872629
- Library of Congress Control Number (LCCN): 2004114756 - 2005923482
- All ISBNs: 9781587052255 - 1587052253 - 9781587052415 - 1587052415
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cisco Network Admission Control at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29SSL and Remote Access VPNs
By Jazib Frahim, Quiang Huang and Aamir Waheed

“SSL and Remote Access VPNs” Metadata:
- Title: SSL and Remote Access VPNs
- Authors: Jazib FrahimQuiang HuangAamir Waheed
- Language: English
- Number of Pages: Median: 349
- Publisher: Cisco Systems - Cisco Press
- Publish Date: 2008
- Publish Location: ➤ Indianapolis, IN - Indianapolis, Ind
“SSL and Remote Access VPNs” Subjects and Themes:
- Subjects: ➤ Computer networks - Extranets (Computer networks) - Remote access - Security measures - Network security - Computers - Computer - Internet - Computer Books: Internet General - Internet - Security - Computers / Internet / Security - World wide web - Computer network protocols - Extranets (computer networks)
Edition Identifiers:
- The Open Library ID: OL50173775M - OL12320490M - OL21478268M
- Online Computer Library Center (OCLC) ID: 297574696
- Library of Congress Control Number (LCCN): 2005923483
- All ISBNs: 1587052423 - 0768681952 - 9781587052422 - 9780768681956
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find SSL and Remote Access VPNs at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Challenges in Cybersecurity and Privacy
By Jorge Bernal Bernabe and Antonio Skarmeta

“Challenges in Cybersecurity and Privacy” Metadata:
- Title: ➤ Challenges in Cybersecurity and Privacy
- Authors: Jorge Bernal BernabeAntonio Skarmeta
- Language: English
- Number of Pages: Median: 250
- Publisher: River Publishers
- Publish Date: 2019 - 2020
“Challenges in Cybersecurity and Privacy” Subjects and Themes:
- Subjects: ➤ Computer security - Right of Privacy - Computer crimes - Prevention - Sécurité informatique - COMPUTERS / Security / General - COMPUTERS / Internet / Security
Edition Identifiers:
- The Open Library ID: OL34657604M - OL29816698M
- Online Computer Library Center (OCLC) ID: 1145279603
- All ISBNs: 9788770220880 - 8770220883 - 8770220875 - 9788770220873
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Challenges in Cybersecurity and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Cyber self-defense
By Alexis Moore

“Cyber self-defense” Metadata:
- Title: Cyber self-defense
- Author: Alexis Moore
- Language: English
- Publisher: Lyons Press
- Publish Date: 2014
- Publish Location: Guilford, Connecticut
“Cyber self-defense” Subjects and Themes:
- Subjects: ➤ Internet - Safety measures - Computer security - Cyberbullying - Online identity theft - Prevention - COMPUTERS / Internet / Security - REFERENCE / Personal & Practical Guides - SELF-HELP / General - COMPUTERS - Security - REFERENCE - Personal & Practical Guides - SELF-HELP - General - Computerkriminalitat - Computersicherheit - Pravention - Internet, safety measures
Edition Identifiers:
- The Open Library ID: OL31033407M
- Library of Congress Control Number (LCCN): 2014027221
- All ISBNs: 9781493005697 - 1493005693
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber self-defense at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Inside network perimeter security
By Stephen Northcutt, Mark T. Edmead, Lenny Zeltser, Scott Winters, Karen Fredrick and Ronald W. Ritchey

“Inside network perimeter security” Metadata:
- Title: ➤ Inside network perimeter security
- Authors: ➤ Stephen NorthcuttMark T. EdmeadLenny ZeltserScott WintersKaren FredrickRonald W. Ritchey
- Language: English
- Number of Pages: Median: 664
- Publisher: New Riders - Sams
- Publish Date: 2002 - 2003
- Publish Location: Indianapolis, Ind
“Inside network perimeter security” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Network security - Networking - General - Computer Data Security - Computers - Computers - Communications / Networking - Computers - Computer Security - Computer Books: General - Computer security - Security - General - Computers / Internet / Security - Firewall - Firewalls (Computer security) - Virtual Private Network (VPN)
Edition Identifiers:
- The Open Library ID: OL7891514M - OL18210683M
- Library of Congress Control Number (LCCN): 2001096722
- All ISBNs: 0735712328 - 9780735712324
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Inside network perimeter security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Social media risk and governance
By Phil Mennie

“Social media risk and governance” Metadata:
- Title: ➤ Social media risk and governance
- Author: Phil Mennie
- Language: English
- Number of Pages: Median: 220
- Publisher: ➤ Kogan Page - Kogan Page, Limited
- Publish Date: 2015
“Social media risk and governance” Subjects and Themes:
- Subjects: ➤ Risk management - Business enterprises - Computer programs - Computer networks - Internet - Security measures - Personnel management - Internet marketing - Social media - Business, computer network resources - COMPUTERS / Web / Social Networking - BUSINESS & ECONOMICS / Human Resources & Personnel Management - COMPUTERS / Internet / Security - COMPUTERS / Internet / General - BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
Edition Identifiers:
- The Open Library ID: OL27203235M - OL35502181M
- Online Computer Library Center (OCLC) ID: 906658498
- Library of Congress Control Number (LCCN): 2015027327
- All ISBNs: 9780749474584 - 0749474580 - 0749474572 - 9780749474577
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Social media risk and governance at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34SSCP Systems Security Certified Practitioner
By George Murphy

“SSCP Systems Security Certified Practitioner” Metadata:
- Title: ➤ SSCP Systems Security Certified Practitioner
- Author: George Murphy
- Language: English
- Number of Pages: Median: 576
- Publisher: ➤ Wiley & Sons, Incorporated, John
- Publish Date: 2015
“SSCP Systems Security Certified Practitioner” Subjects and Themes:
- Subjects: ➤ Electronic data processing personnel, certification - Computer networks - Study guides - Security measures - Examinations - Telecommunications engineers - Certification - Réseaux d'ordinateurs - Guides de l'étudiant - Sécurité - Mesures - Examens - COMPUTERS / Internet / Security - COMPUTERS / Networking / Security - COMPUTERS / Security / General
Edition Identifiers:
- The Open Library ID: OL28563889M
- Online Computer Library Center (OCLC) ID: 919719580
- All ISBNs: 1119059658 - 9781119059653
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find SSCP Systems Security Certified Practitioner at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Online File Sharing
By Jonas Andersson Schwartz

“Online File Sharing” Metadata:
- Title: Online File Sharing
- Author: Jonas Andersson Schwartz
- Language: English
- Number of Pages: Median: 248
- Publisher: Taylor & Francis Group
- Publish Date: 2013
“Online File Sharing” Subjects and Themes:
- Subjects: ➤ Social media - Computer network architectures - Peer-to-peer architecture - Social aspects - Computer file sharing - Technological innovations - SOCIAL SCIENCE / Media Studies - COMPUTERS / Social Aspects / General - COMPUTERS / Internet / Security - Social Media - Partage de fichiers (Informatique) - Innovations - Médias sociaux - SOCIAL SCIENCE - Media Studies - COMPUTERS - General - Internet - Security - BUSINESS & ECONOMICS - Industries - Media & Communications - TECHNOLOGY & ENGINEERING - Telecommunications - Fildelning - Sociala aspekter - Datanät - Sociala medier
Edition Identifiers:
- The Open Library ID: OL28762391M
- Online Computer Library Center (OCLC) ID: 858659757
- Library of Congress Control Number (LCCN): 2013013177
- All ISBNs: 9780415854306 - 041585430X
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Online File Sharing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Internet censorship
By Bernadette H. Schell

“Internet censorship” Metadata:
- Title: Internet censorship
- Author: Bernadette H. Schell
- Language: English
- Number of Pages: Median: 333
- Publisher: ABC-CLIO
- Publish Date: 2014
“Internet censorship” Subjects and Themes:
- Subjects: ➤ Cyberspace - Government policy - Access control - Social aspects - Law and legislation - Censorship - Internet - Freedom of information - COMPUTERS / Internet / General - COMPUTERS / Internet / Security - COMPUTERS / Information Technology - Internet, law and legislation - Internet, social aspects
- Places: United States
Edition Identifiers:
- The Open Library ID: OL27172355M
- Online Computer Library Center (OCLC) ID: 1410483200 - 860943831
- Library of Congress Control Number (LCCN): 2014005277
- All ISBNs: 1610694813 - 9781610694810
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Internet censorship at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.