Explore: Computers Networking Security

Discover books, insights, and more — all in one place.

Learn more about Computers Networking Security with top reads curated from trusted sources — all in one place.

Topic Search

Search for any topic

AI-Generated Overview About “computers----networking----security”:


Books Results

Source: The Open Library

The Open Library Search Results

Search results from The Open Library

1Penetration Testing: A Hands-On Introduction to Hacking

By

Book's cover

“Penetration Testing: A Hands-On Introduction to Hacking” Metadata:

  • Title: ➤  Penetration Testing: A Hands-On Introduction to Hacking
  • Author:
  • Number of Pages: Median: 528
  • Publisher: No Starch Press
  • Publish Date:

“Penetration Testing: A Hands-On Introduction to Hacking” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 2014
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Marketplaces

Find Penetration Testing: A Hands-On Introduction to Hacking at online marketplaces:


2Stealing the network

By

Book's cover

“Stealing the network” Metadata:

  • Title: Stealing the network
  • Authors:
  • Language: English
  • Number of Pages: Median: 448
  • Publisher: ➤  Elsevier Science & Technology Books - Syngress
  • Publish Date: ➤  
  • Publish Location: Rockland, Mass

“Stealing the network” Subjects and Themes:

Edition Identifiers:

Access and General Info:

  • First Year Published: 2004
  • Is Full Text Available: No
  • Is The Book Public: No
  • Access Status: No_ebook

Online Access

Downloads Are Not Available:

The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

Online Borrowing:

    Online Marketplaces

    Find Stealing the network at online marketplaces:


    3The tangled Web

    By

    Book's cover

    “The tangled Web” Metadata:

    • Title: The tangled Web
    • Author:
    • Language: English
    • Number of Pages: Median: 299
    • Publisher: No Starch Press
    • Publish Date:
    • Publish Location: San Francisco

    “The tangled Web” Subjects and Themes:

    Edition Identifiers:

    Access and General Info:

    • First Year Published: 2011
    • Is Full Text Available: No
    • Is The Book Public: No
    • Access Status: No_ebook

    Online Marketplaces

    Find The tangled Web at online marketplaces:


    4Build your own security lab

    a field guide for network testing

    By

    Book's cover

    “Build your own security lab” Metadata:

    • Title: Build your own security lab
    • Author:
    • Language: English
    • Number of Pages: Median: 456
    • Publisher: ➤  Wiley & Sons, Incorporated, John - Wiley
    • Publish Date:
    • Publish Location: Indianapolis, IN

    “Build your own security lab” Subjects and Themes:

    Edition Identifiers:

    Access and General Info:

    • First Year Published: 2008
    • Is Full Text Available: No
    • Is The Book Public: No
    • Access Status: Unclassified

    Online Access

    Downloads Are Not Available:

    The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

    Online Borrowing:

      Online Marketplaces

      Find Build your own security lab at online marketplaces:


      5Security Management Of Next Generation Telecommunications Networks And Services

      By

      Book's cover

      “Security Management Of Next Generation Telecommunications Networks And Services” Metadata:

      • Title: ➤  Security Management Of Next Generation Telecommunications Networks And Services
      • Author:
      • Language: English
      • Number of Pages: Median: 392
      • Publisher: ➤  IEEE Press/Wiley - Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - IEEE Computer Society Press
      • Publish Date:

      “Security Management Of Next Generation Telecommunications Networks And Services” Subjects and Themes:

      Edition Identifiers:

      Access and General Info:

      • First Year Published: 2013
      • Is Full Text Available: Yes
      • Is The Book Public: No
      • Access Status: Printdisabled

      Online Access

      Downloads Are Not Available:

      The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

      Online Borrowing:

        Online Marketplaces

        Find Security Management Of Next Generation Telecommunications Networks And Services at online marketplaces:


        6Iot Applications Security Threats and Countermeasures

        By

        Book's cover

        “Iot Applications Security Threats and Countermeasures” Metadata:

        • Title: ➤  Iot Applications Security Threats and Countermeasures
        • Authors:
        • Language: English
        • Number of Pages: Median: 261
        • Publisher: ➤  Taylor & Francis Group - CRC Press LLC
        • Publish Date:

        “Iot Applications Security Threats and Countermeasures” Subjects and Themes:

        Edition Identifiers:

        Access and General Info:

        • First Year Published: 2021
        • Is Full Text Available: No
        • Is The Book Public: No
        • Access Status: No_ebook

        Online Marketplaces

        Find Iot Applications Security Threats and Countermeasures at online marketplaces:


        7Managing Security Services in Heterogenous Networks

        By

        “Managing Security Services in Heterogenous Networks” Metadata:

        • Title: ➤  Managing Security Services in Heterogenous Networks
        • Authors:
        • Language: English
        • Number of Pages: Median: 186
        • Publisher: ➤  Taylor & Francis Group - CRC Press LLC
        • Publish Date:

        “Managing Security Services in Heterogenous Networks” Subjects and Themes:

        Edition Identifiers:

        Access and General Info:

        • First Year Published: 2020
        • Is Full Text Available: No
        • Is The Book Public: No
        • Access Status: No_ebook

        Online Marketplaces

        Find Managing Security Services in Heterogenous Networks at online marketplaces:


        8Combating spyware in the enterprise

        By

        Book's cover

        “Combating spyware in the enterprise” Metadata:

        • Title: ➤  Combating spyware in the enterprise
        • Authors:
        • Language: English
        • Number of Pages: Median: 417
        • Publisher: ➤  Syngress - Elsevier Science & Technology Books
        • Publish Date:
        • Publish Location: Rockland, MA

        “Combating spyware in the enterprise” Subjects and Themes:

        Edition Identifiers:

        Access and General Info:

        • First Year Published: 2006
        • Is Full Text Available: Yes
        • Is The Book Public: No
        • Access Status: Printdisabled

        Online Access

        Downloads Are Not Available:

        The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

        Online Borrowing:

          Online Marketplaces

          Find Combating spyware in the enterprise at online marketplaces:


          9Hacking Exposed Mobile: Security Secrets & Solutions

          By

          Book's cover

          “Hacking Exposed Mobile: Security Secrets & Solutions” Metadata:

          • Title: ➤  Hacking Exposed Mobile: Security Secrets & Solutions
          • Authors: ➤  
          • Number of Pages: Median: 320
          • Publisher: McGraw-Hill Education
          • Publish Date:

          “Hacking Exposed Mobile: Security Secrets & Solutions” Subjects and Themes:

          Edition Identifiers:

          Access and General Info:

          • First Year Published: 2013
          • Is Full Text Available: No
          • Is The Book Public: No
          • Access Status: No_ebook

          Online Marketplaces

          Find Hacking Exposed Mobile: Security Secrets & Solutions at online marketplaces:


          10Computer forensics

          By

          Book's cover

          “Computer forensics” Metadata:

          • Title: Computer forensics
          • Author:
          • Language: English
          • Number of Pages: Median: 75
          • Publisher: IT Governance Pub.
          • Publish Date:
          • Publish Location: Ely

          “Computer forensics” Subjects and Themes:

          Edition Identifiers:

          Access and General Info:

          • First Year Published: 2010
          • Is Full Text Available: No
          • Is The Book Public: No
          • Access Status: Unclassified

          Online Access

          Downloads Are Not Available:

          The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

          Online Borrowing:

            Online Marketplaces

            Find Computer forensics at online marketplaces:


            11CompTIA CySA+ practice tests

            By

            “CompTIA CySA+ practice tests” Metadata:

            • Title: CompTIA CySA+ practice tests
            • Author:
            • Language: English
            • Number of Pages: Median: 442
            • Publisher: ➤  Wiley & Sons, Incorporated, John
            • Publish Date:

            “CompTIA CySA+ practice tests” Subjects and Themes:

            Edition Identifiers:

            Access and General Info:

            • First Year Published: 2018
            • Is Full Text Available: No
            • Is The Book Public: No
            • Access Status: No_ebook

            Online Marketplaces

            Find CompTIA CySA+ practice tests at online marketplaces:


            12SSCP Systems Security Certified Practitioner

            By

            Book's cover

            “SSCP Systems Security Certified Practitioner” Metadata:

            • Title: ➤  SSCP Systems Security Certified Practitioner
            • Author:
            • Language: English
            • Number of Pages: Median: 576
            • Publisher: ➤  Wiley & Sons, Incorporated, John
            • Publish Date:

            “SSCP Systems Security Certified Practitioner” Subjects and Themes:

            Edition Identifiers:

            Access and General Info:

            • First Year Published: 2015
            • Is Full Text Available: Yes
            • Is The Book Public: No
            • Access Status: Printdisabled

            Online Access

            Downloads Are Not Available:

            The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.

            Online Borrowing:

              Online Marketplaces

              Find SSCP Systems Security Certified Practitioner at online marketplaces:



              Wiki

              Source: Wikipedia

              Wikipedia Results

              Search Results from Wikipedia

              Network security

              denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled

              Network security policy

              A network security policy (NSP) is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out

              Computer security

              subdiscipline within the field of information security. It focuses on protecting computer software, systems and networks from threats that can lead to unauthorized

              Microsegmentation (network security)

              Microsegmentation is a network security approach that enables security architects to construct network security zones boundaries per machine in data centers

              Air gap (networking)

              gapping or disconnected network is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated

              Security hacker

              computer networks, and that cracker is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security

              Wireless security

              Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term

              Network access control

              user or system authentication and network security enforcement. Network access control is a computer networking solution that uses a set of protocols

              Data center security

              to monitor and check their network securities. Craig Wolff (December 13, 1989). "Report Finds Fault With E.M.S. Computers". The New York Times. too many

              Zero trust architecture

              Zero trust architecture (ZTA) or perimeterless security is a design and implementation strategy of IT systems. The principle is that users and devices