Explore: Computers Networking Security
Discover books, insights, and more — all in one place.
Learn more about Computers Networking Security with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computers----networking----security”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Penetration Testing: A Hands-On Introduction to Hacking
By Georgia Weidman

“Penetration Testing: A Hands-On Introduction to Hacking” Metadata:
- Title: ➤ Penetration Testing: A Hands-On Introduction to Hacking
- Author: Georgia Weidman
- Number of Pages: Median: 528
- Publisher: No Starch Press
- Publish Date: 2014
“Penetration Testing: A Hands-On Introduction to Hacking” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Kali Linux - Hackers - Computer security - COMPUTERS / Internet / Security - COMPUTERS / Networking / Security - COMPUTERS / Security / General - Penetration testing (computer security) - Computers / internet / security - Computers / networking / security - Computers / security / general
Edition Identifiers:
- The Open Library ID: OL26838292M
- Online Computer Library Center (OCLC) ID: 881503059
- Library of Congress Control Number (LCCN): 2014001066
- All ISBNs: 9781593275648 - 1593275641
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Penetration Testing: A Hands-On Introduction to Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Stealing the network
By Johnny Long, Tim Mullen and Ryan Russell

“Stealing the network” Metadata:
- Title: Stealing the network
- Authors: Johnny LongTim MullenRyan Russell
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ Elsevier Science & Technology Books - Syngress
- Publish Date: ➤ 2004 - 2005 - 2007 - 2009 - 2011
- Publish Location: Rockland, Mass
“Stealing the network” Subjects and Themes:
- Subjects: ➤ Computer hackers - Computer security - Cyberterrorism - Fiction - Crime & mystery - Computers - Communications / Networking - Computer Bks - General Information - Computers - Computer Books: General - Social Aspects - General - Networking - Security - Computers / Communications / Networking - Computers / Networking / Security - Computers / Security - Identity theft, hack, hacker, hacking, cyber crime, fraud, Interpol, federal intelligence, law enforcement, forensic investigation, Nessus, Nmap, proxy, social security number, fake ID, driver' license, FBI, open source, information gathering, denial of service, brute force, keystroke logger, intrusion detection, intrusion prevention - Computer networks - Hackers
Edition Identifiers:
- The Open Library ID: ➤ OL35770420M - OL35759711M - OL35751340M - OL34420221M - OL8894037M - OL17218094M
- Online Computer Library Center (OCLC) ID: 878078102 - 82899565
- All ISBNs: ➤ 1597490814 - 0080517757 - 9781597490818 - 9780080481104 - 9780080517759 - 0080517749 - 0080481108 - 9780080949208 - 0080949207 - 9780080517742
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Stealing the network at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3The tangled Web
By Michal Zalewski

“The tangled Web” Metadata:
- Title: The tangled Web
- Author: Michal Zalewski
- Language: English
- Number of Pages: Median: 299
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco
“The tangled Web” Subjects and Themes:
- Subjects: ➤ COMPUTERS / Networking / Security - COMPUTERS / Internet / Security - Computer networks - Browsers (Computer programs) - COMPUTERS / Web / Browsers - COMPUTERS / Networking / General - COMPUTERS / Security / Cryptography - COMPUTERS / Security / General - Computer security - COMPUTERS / Networking / Network Protocols - Security measures - COMPUTERS / Web / Web Programming - COMPUTERS / Security / Viruses - Computer networks, security measures - Web sites - Computer networks--security measures - Browsers (computer programs)
Edition Identifiers:
- The Open Library ID: OL25078214M
- Online Computer Library Center (OCLC) ID: 714726106 - 786166335
- Library of Congress Control Number (LCCN): 2011039636
- All ISBNs: 9781593273880 - 1593273886
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The tangled Web at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Build your own security lab
a field guide for network testing
By Michael Gregg

“Build your own security lab” Metadata:
- Title: Build your own security lab
- Author: Michael Gregg
- Language: English
- Number of Pages: Median: 456
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley
- Publish Date: 2008 - 2010 - 2011
- Publish Location: Indianapolis, IN
“Build your own security lab” Subjects and Themes:
- Subjects: ➤ Computer networks - Testing - Security measures - COMPUTERS / Networking / Security - Computer networks / Security measures / Testing - COMPUTERS / Internet / Security - COMPUTERS / Security / General - Réseaux d'ordinateurs - Wireless communication systems - Networking - COMPUTERS - General - Internet - Security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL29103933M - OL29047277M - OL19141879M - OL18893654M - OL10294432M - OL19999522M
- Online Computer Library Center (OCLC) ID: 699852569
- Library of Congress Control Number (LCCN): 2008009610
- All ISBNs: ➤ 9780470179864 - 1118080637 - 9780470379479 - 9781118080634 - 0470379472 - 0470179864
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Build your own security lab at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Security Management Of Next Generation Telecommunications Networks And Services
By Stuart Jacobs

“Security Management Of Next Generation Telecommunications Networks And Services” Metadata:
- Title: ➤ Security Management Of Next Generation Telecommunications Networks And Services
- Author: Stuart Jacobs
- Language: English
- Number of Pages: Median: 392
- Publisher: ➤ IEEE Press/Wiley - Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - IEEE Computer Society Press
- Publish Date: 2013
“Security Management Of Next Generation Telecommunications Networks And Services” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - COMPUTERS / Networking / Security - Telecommunication systems - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL34486824M - OL26032958M - OL39903343M - OL29162392M - OL29162391M - OL29162272M
- Online Computer Library Center (OCLC) ID: 844073449
- Library of Congress Control Number (LCCN): 2013011611
- All ISBNs: ➤ 1118741587 - 1118741668 - 9781118741580 - 9781306028646 - 1306028647 - 9781118741634 - 1118741633 - 9781118746981 - 9780470565131 - 0470565136 - 9781118741665 - 1118746988
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security Management Of Next Generation Telecommunications Networks And Services at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Iot Applications Security Threats and Countermeasures
By Padmalaya Nayak, Niranjan K. Ray and P. Ravichandran

“Iot Applications Security Threats and Countermeasures” Metadata:
- Title: ➤ Iot Applications Security Threats and Countermeasures
- Authors: Padmalaya NayakNiranjan K. RayP. Ravichandran
- Language: English
- Number of Pages: Median: 261
- Publisher: ➤ Taylor & Francis Group - CRC Press LLC
- Publish Date: 2021
“Iot Applications Security Threats and Countermeasures” Subjects and Themes:
- Subjects: ➤ Engineering - Internet of things - Security measures - Internet des objets - Sécurité - Mesures - COMPUTERS / Information Technology - COMPUTERS / Networking / Security - COMPUTERS / Cryptography
Edition Identifiers:
- The Open Library ID: OL33908366M - OL36835637M - OL33911529M - OL33910147M - OL33910015M
- Online Computer Library Center (OCLC) ID: 1243909847
- Library of Congress Control Number (LCCN): 2021010118
- All ISBNs: ➤ 1003124259 - 9781003124252 - 1000431649 - 9781000431650 - 9781000431643 - 1000431657 - 0367643820 - 0367491850 - 9780367491857 - 9780367643829
Access and General Info:
- First Year Published: 2021
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Iot Applications Security Threats and Countermeasures at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Managing Security Services in Heterogenous Networks
By R. Thandeeswaran, Thinagaran Perumal, Kun Ma and N. Jeyanthi
“Managing Security Services in Heterogenous Networks” Metadata:
- Title: ➤ Managing Security Services in Heterogenous Networks
- Authors: R. ThandeeswaranThinagaran PerumalKun MaN. Jeyanthi
- Language: English
- Number of Pages: Median: 186
- Publisher: ➤ Taylor & Francis Group - CRC Press LLC
- Publish Date: 2020 - 2023
“Managing Security Services in Heterogenous Networks” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Management - Heterogeneous distributed computing systems - Réseaux d'ordinateurs - Sécurité - Mesures - Gestion - COMPUTERS / Networking / Security - COMPUTERS / Security / General
Edition Identifiers:
- The Open Library ID: ➤ OL33804446M - OL34690173M - OL33804414M - OL33804445M - OL33804464M - OL46312906M
- Online Computer Library Center (OCLC) ID: 1228889365
- All ISBNs: ➤ 1000285065 - 9781000285062 - 1000285057 - 1000285073 - 9780367457341 - 0367457342 - 9781000285079 - 9780367647452 - 0367647451 - 9781000285055 - 1003034047 - 9781003034049
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Managing Security Services in Heterogenous Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Combating spyware in the enterprise
By Brian Baskin, Tony Piltzecker, Paul Piccard and Jeremy Faircloth

“Combating spyware in the enterprise” Metadata:
- Title: ➤ Combating spyware in the enterprise
- Authors: Brian BaskinTony PiltzeckerPaul PiccardJeremy Faircloth
- Language: English
- Number of Pages: Median: 417
- Publisher: ➤ Syngress - Elsevier Science & Technology Books
- Publish Date: 2006
- Publish Location: Rockland, MA
“Combating spyware in the enterprise” Subjects and Themes:
- Subjects: ➤ Spyware (Computer software) - Computer security - Computer viruses - Data security & data encryption - Internet - Security - Computers - Computers - Communications / Networking - Computer Books: General - Networking - Security - Security - General - Computers / Communications / Networking - Computers / Networking / Security - Computers / Security - Computers/Security - General - Computer crimes
Edition Identifiers:
- The Open Library ID: OL35751398M - OL8894032M - OL23079606M
- Online Computer Library Center (OCLC) ID: 71012129 - 824882238
- All ISBNs: 0080502229 - 9781597490641 - 1597490644 - 9780080502229
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Combating spyware in the enterprise at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Hacking Exposed Mobile: Security Secrets & Solutions
By Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven and Mike Price

“Hacking Exposed Mobile: Security Secrets & Solutions” Metadata:
- Title: ➤ Hacking Exposed Mobile: Security Secrets & Solutions
- Authors: ➤ Neil BergmanMike StanfieldJason RouseJoel ScambraySarath GeethakumarSwapnil DeshmukhScott MatsumotoJohn StevenMike Price
- Number of Pages: Median: 320
- Publisher: McGraw-Hill Education
- Publish Date: 2013
“Hacking Exposed Mobile: Security Secrets & Solutions” Subjects and Themes:
- Subjects: ➤ Cell phone systems - Mobile computing - Computer security - Computer networks - Security measures - Mobile communication systems - Hackers - Computer crimes - Prevention - COMPUTERS / Networking / Security - Computer hackers
Edition Identifiers:
- The Open Library ID: OL26838256M
- Online Computer Library Center (OCLC) ID: 865474288
- Library of Congress Control Number (LCCN): 2013024712
- All ISBNs: 9780071817011 - 0071817018
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Hacking Exposed Mobile: Security Secrets & Solutions at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Computer forensics
By Nathan Clarke

“Computer forensics” Metadata:
- Title: Computer forensics
- Author: Nathan Clarke
- Language: English
- Number of Pages: Median: 75
- Publisher: IT Governance Pub.
- Publish Date: 2010
- Publish Location: Ely
“Computer forensics” Subjects and Themes:
- Subjects: ➤ COMPUTERS / Networking / Security - Forensic sciences - COMPUTERS / Internet / Security - Computer networks - COMPUTERS / Security / General - IT - Computer crimes - Investigation - Computer Science - Computer security - Security measures - Re seaux d'ordinateurs - Criminalistique - Criminalite informatique - Enque tes - Enquêtes - Réseaux d'ordinateurs - Criminalité informatique
Edition Identifiers:
- The Open Library ID: OL25542894M
- Online Computer Library Center (OCLC) ID: 857307614 - 662258332
- All ISBNs: 9781849280396 - 9781849280402 - 1849280398 - 1849280401
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer forensics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11CompTIA CySA+ practice tests
By Mike Chapple
“CompTIA CySA+ practice tests” Metadata:
- Title: CompTIA CySA+ practice tests
- Author: Mike Chapple
- Language: English
- Number of Pages: Median: 442
- Publisher: ➤ Wiley & Sons, Incorporated, John
- Publish Date: 2018
“CompTIA CySA+ practice tests” Subjects and Themes:
- Subjects: ➤ COMPUTERS / Networking / Security - Examinations - Computer networks - COMPUTERS / Security / General - COMPUTERS / Security / Online Safety & Privacy - Computer security - Study guides - Security measures
Edition Identifiers:
- The Open Library ID: OL26946437M
- Online Computer Library Center (OCLC) ID: 1029842961
- All ISBNs: 9781119433200 - 1119433207
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find CompTIA CySA+ practice tests at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12SSCP Systems Security Certified Practitioner
By George Murphy

“SSCP Systems Security Certified Practitioner” Metadata:
- Title: ➤ SSCP Systems Security Certified Practitioner
- Author: George Murphy
- Language: English
- Number of Pages: Median: 576
- Publisher: ➤ Wiley & Sons, Incorporated, John
- Publish Date: 2015
“SSCP Systems Security Certified Practitioner” Subjects and Themes:
- Subjects: ➤ Electronic data processing personnel, certification - Computer networks - Study guides - Security measures - Examinations - Telecommunications engineers - Certification - Réseaux d'ordinateurs - Guides de l'étudiant - Sécurité - Mesures - Examens - COMPUTERS / Internet / Security - COMPUTERS / Networking / Security - COMPUTERS / Security / General
Edition Identifiers:
- The Open Library ID: OL28563889M
- Online Computer Library Center (OCLC) ID: 919719580
- All ISBNs: 1119059658 - 9781119059653
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find SSCP Systems Security Certified Practitioner at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.