Explore: Computers Security General
Discover books, insights, and more — all in one place.
Learn more about Computers Security General with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computers----security----general”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1IT Governance
By Alan Calder and Steve Watkins

“IT Governance” Metadata:
- Title: IT Governance
- Authors: Alan CalderSteve Watkins
- Language: English
- Number of Pages: Median: 360
- Publisher: ➤ Kogan Page, Limited - IT Governance Ltd - IT Governance Publishing - Kogan Page
- Publish Date: ➤ 2005 - 2007 - 2009 - 2015 - 2019
“IT Governance” Subjects and Themes:
- Subjects: ➤ Data protection - Business enterprises, computer networks - Computer networks - COMPUTERS / Security / General - COMPUTERS / Information Technology - Business enterprises - Computer security - BUSINESS & ECONOMICS / Information Management - Security measures - BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management - Information technology - Management - Evaluation - Auditing - Standards
Edition Identifiers:
- The Open Library ID: ➤ OL50506887M - OL39577367M - OL33535395M - OL46564465M - OL27512211M - OL39580475M - OL28718195M - OL28561388M - OL28718192M - OL39575269M
- Online Computer Library Center (OCLC) ID: 912140774 - 856889493
- Library of Congress Control Number (LCCN): 2015024691
- All ISBNs: ➤ 9781905356904 - 0749496959 - 9780749496968 - 9780749474065 - 9780749476021 - 9781905356027 - 0749476028 - 9781905356911 - 1905356021 - 1905356307 - 1905356919 - 9780749496951 - 9781905356300 - 0749496967 - 074947405X - 9780749474058 - 1789660300 - 9781789660302 - 0749474068 - 1905356900
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find IT Governance at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Penetration Testing: A Hands-On Introduction to Hacking
By Georgia Weidman

“Penetration Testing: A Hands-On Introduction to Hacking” Metadata:
- Title: ➤ Penetration Testing: A Hands-On Introduction to Hacking
- Author: Georgia Weidman
- Number of Pages: Median: 528
- Publisher: No Starch Press
- Publish Date: 2014
“Penetration Testing: A Hands-On Introduction to Hacking” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Kali Linux - Hackers - Computer security - COMPUTERS / Internet / Security - COMPUTERS / Networking / Security - COMPUTERS / Security / General - Penetration testing (computer security) - Computers / internet / security - Computers / networking / security - Computers / security / general
Edition Identifiers:
- The Open Library ID: OL26838292M
- Online Computer Library Center (OCLC) ID: 881503059
- Library of Congress Control Number (LCCN): 2014001066
- All ISBNs: 9781593275648 - 1593275641
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Penetration Testing: A Hands-On Introduction to Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
By Kim Zetter

“Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon” Metadata:
- Title: ➤ Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
- Author: Kim Zetter
- Language: English
- Number of Pages: Median: 448
- Publisher: Crown Publishers - Crown
- Publish Date: 2014
“Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon” Subjects and Themes:
- Subjects: ➤ Rootkits (Computer software) - Nuclear arms control - Network-centric operations (Military science) - Uranium enrichment - United States - Equipment and supplies - Computer crimes - Investigation - Information technology - Nuclear nonproliferation - Sabotage - Cyberspace operations (Military science) - Foreign relations - Case studies - POLITICAL SCIENCE / Political Freedom & Security / Intelligence - COMPUTERS / Security / General - COMPUTERS / General - Armed Forces
Edition Identifiers:
- The Open Library ID: OL26782079M
- Online Computer Library Center (OCLC) ID: 894938304 - 858126251
- Library of Congress Control Number (LCCN): 2014016640
- All ISBNs: 077043617X - 9780770436179
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Metasploit
By David Kennedy

“Metasploit” Metadata:
- Title: Metasploit
- Author: David Kennedy
- Language: English
- Number of Pages: Median: 299
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco, Calif
“Metasploit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - COMPUTERS / Internet / Security - Computer networks - Computers - COMPUTERS / Security / General - COMPUTERS / Internet / General - Metasploit (Electronic resource) - Security measures - COMPUTERS / Security / Viruses - Computer networks, security measures - Open source software
Edition Identifiers:
- The Open Library ID: OL24896075M
- Online Computer Library Center (OCLC) ID: 754641929
- Library of Congress Control Number (LCCN): 2011020166
- All ISBNs: 9781593272883 - 159327288X
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Metasploit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Ethical Hacking and Penetration Testing Guide
By Rafay Baloch

“Ethical Hacking and Penetration Testing Guide” Metadata:
- Title: ➤ Ethical Hacking and Penetration Testing Guide
- Author: Rafay Baloch
- Language: English
- Number of Pages: Median: 531
- Publisher: ➤ CRC Press, Taylor & Francis Group - Routledge - Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2014 - 2017
“Ethical Hacking and Penetration Testing Guide” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - COMPUTERS / Security / General - COMPUTERS / Networking / General - LAW / Forensic Science - Computer security - Computer networks - Security measures - Tests d'intrusion - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Security - General - Networking - LAW - Forensic Science - Penetration testing (computer security) - Computers / security / general - Computers / networking / general - Law / forensic science
Edition Identifiers:
- The Open Library ID: ➤ OL26838148M - OL37959692M - OL37980186M - OL37984263M - OL37971507M - OL33574903M - OL33517337M
- Online Computer Library Center (OCLC) ID: 868641489 - 1011595255
- Library of Congress Control Number (LCCN): 2014006695
- All ISBNs: ➤ 1351381334 - 9781315145891 - 1138436828 - 1322638594 - 9781351381345 - 1351381342 - 9781138436824 - 9781351381338 - 148223162X - 9781482231618 - 9781322638591 - 9781482231625 - 1315145898 - 1482231611
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Ethical Hacking and Penetration Testing Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Metasploit
By David Kennedy

“Metasploit” Metadata:
- Title: Metasploit
- Author: David Kennedy
- Language: English
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco, Calif
“Metasploit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - COMPUTERS / Internet / Security - Computer networks - Computers - COMPUTERS / Security / General - COMPUTERS / Internet / General - Metasploit (Electronic resource) - Security measures - COMPUTERS / Security / Viruses
Edition Identifiers:
- The Open Library ID: OL24906341M
- Library of Congress Control Number (LCCN): 2011020166
- All ISBNs: 9781593272883 - 159327288X
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Metasploit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Cyber security policy guidebook
By Jennifer L. Bayuk

“Cyber security policy guidebook” Metadata:
- Title: ➤ Cyber security policy guidebook
- Author: Jennifer L. Bayuk
- Language: English
- Number of Pages: Median: 288
- Publisher: ➤ Wiley - Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: 2012 - 2014
- Publish Location: Hoboken, NJ
“Cyber security policy guidebook” Subjects and Themes:
- Subjects: Government policy - COMPUTERS / Security / General - Computer security - Data protection - Information technology
Edition Identifiers:
- The Open Library ID: ➤ OL39903549M - OL39881735M - OL35501533M - OL29091126M - OL29091122M - OL25054019M
- Online Computer Library Center (OCLC) ID: 694396524
- Library of Congress Control Number (LCCN): 2011036017
- All ISBNs: ➤ 1299189326 - 9781118241325 - 1118241320 - 9781118657966 - 9781118241530 - 1118657969 - 9781118241486 - 1118027809 - 1118241533 - 1118241487 - 9781299189324 - 9781118027806
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cyber security policy guidebook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8The tangled Web
By Michal Zalewski

“The tangled Web” Metadata:
- Title: The tangled Web
- Author: Michal Zalewski
- Language: English
- Number of Pages: Median: 299
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco
“The tangled Web” Subjects and Themes:
- Subjects: ➤ COMPUTERS / Networking / Security - COMPUTERS / Internet / Security - Computer networks - Browsers (Computer programs) - COMPUTERS / Web / Browsers - COMPUTERS / Networking / General - COMPUTERS / Security / Cryptography - COMPUTERS / Security / General - Computer security - COMPUTERS / Networking / Network Protocols - Security measures - COMPUTERS / Web / Web Programming - COMPUTERS / Security / Viruses - Computer networks, security measures - Web sites - Computer networks--security measures - Browsers (computer programs)
Edition Identifiers:
- The Open Library ID: OL25078214M
- Online Computer Library Center (OCLC) ID: 714726106 - 786166335
- Library of Congress Control Number (LCCN): 2011039636
- All ISBNs: 9781593273880 - 1593273886
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The tangled Web at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Introduction to Computer Networks and Cybersecurity
By Chwan-Hwa (John) Wu and J. David Irwin

“Introduction to Computer Networks and Cybersecurity” Metadata:
- Title: ➤ Introduction to Computer Networks and Cybersecurity
- Authors: Chwan-Hwa (John) WuJ. David Irwin
- Language: English
- Number of Pages: Median: 1336
- Publisher: Taylor & Francis Group
- Publish Date: 2013 - 2016 - 2017
“Introduction to Computer Networks and Cybersecurity” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer networks - COMPUTERS / Networking / General - COMPUTERS / Security / General - COMPUTERS / Information Technology - Security measures
Edition Identifiers:
- The Open Library ID: ➤ OL28489043M - OL29232952M - OL29291183M - OL33679256M - OL28843777M - OL33542893M
- Online Computer Library Center (OCLC) ID: 899501242
- Library of Congress Control Number (LCCN): 2012036920
- All ISBNs: ➤ 9781466572133 - 9780429101311 - 1466572140 - 9781466572140 - 9781498760133 - 9781138071896 - 1466572132 - 1138071897 - 1498760139 - 9781466575400 - 1466575409 - 0429101317
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Introduction to Computer Networks and Cybersecurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Cold cases
By James M. Adcock

“Cold cases” Metadata:
- Title: Cold cases
- Author: James M. Adcock
- Language: English
- Number of Pages: Median: 265
- Publisher: ➤ Taylor & Francis Group - CRC Press
- Publish Date: ➤ 2010 - 2011 - 2014 - 2015 - 2017 - 2019
- Publish Location: Boca Raton, FL
“Cold cases” Subjects and Themes:
- Subjects: ➤ Cold cases (Criminal investigation) - Criminal investigations - Criminal Law - COMPUTERS - General - Security - LAW - Forensic Science - Criminal investigation - COMPUTERS / Security / General - LAW / Criminal Law / General - LAW / Forensic Science - Crimes non résolus - Enquêtes criminelles - BUSINESS & ECONOMICS - Infrastructure - SOCIAL SCIENCE
Edition Identifiers:
- The Open Library ID: ➤ OL57534859M - OL52547289M - OL37954183M - OL33782385M - OL33657005M - OL33517448M - OL33394033M - OL28882471M - OL27791412M - OL25106844M
- Online Computer Library Center (OCLC) ID: 890310192 - 897874033 - 649079834
- Library of Congress Control Number (LCCN): 2010029757 - 2014032654
- All ISBNs: ➤ 9780429255960 - 1322624119 - 1482221454 - 1040082033 - 1482221446 - 9781138113404 - 9781322624112 - 9781040082034 - 1439826900 - 9781482221442 - 1138113409 - 9780367869090 - 0429246277 - 1439826919 - 9781439826904 - 9781439826911 - 0367869098 - 9781482221459 - 9780429246272 - 0429255969
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cold cases at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Android malware and analysis
By Ken Dunham

“Android malware and analysis” Metadata:
- Title: Android malware and analysis
- Author: Ken Dunham
- Language: English
- Number of Pages: Median: 227
- Publisher: ➤ CRC Press, Taylor & Francis Group - Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2014
- Publish Location: Boca Raton
“Android malware and analysis” Subjects and Themes:
- Subjects: ➤ Android (Electronic resource) - Smartphones - Security measures - Mobile computing - Malware (Computer software) - Operating systems (Computers) - COMPUTERS / Software Development & Engineering / General - COMPUTERS / Security / General - LAW / Forensic Science - Android (electronic resource) - Malware (computer software) - Operating systems (computers) - Téléphones intelligents - Sécurité - Mesures - Informatique mobile - Logiciels malveillants - Systèmes d'exploitation (Ordinateurs) - Operating systems - COMPUTERS - Security - Viruses & Malware
Edition Identifiers:
- The Open Library ID: OL37960786M - OL33499365M - OL31041426M - OL37984089M
- Online Computer Library Center (OCLC) ID: 893735799 - 879245959
- Library of Congress Control Number (LCCN): 2014034060
- All ISBNs: ➤ 9781482252200 - 9781322636603 - 0429094833 - 9781482252194 - 1482252198 - 1322636605 - 9780429094835 - 1482252201
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Android malware and analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Electronically stored information
By David R. Matthews

“Electronically stored information” Metadata:
- Title: ➤ Electronically stored information
- Author: David R. Matthews
- Language: English
- Number of Pages: Median: 379
- Publisher: ➤ Auerbach Publishers, Incorporated - Auerbach Publications - Taylor & Francis Group
- Publish Date: ➤ 2012 - 2013 - 2016 - 2017 - 2020
- Publish Location: Boca Raton [Fla.]
“Electronically stored information” Subjects and Themes:
- Subjects: ➤ Electronic records - Management - Electronic data processing - Law and legislation - COMPUTERS / Security / General - LAW / Forensic Science - Electronic discovery (Law) - COMPUTERS / Information Technology - Database management - Information retrieval - Computer security - COMPUTERS - Data Processing - Communication électronique des pièces
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL34626768M - OL25307449M - OL36237096M - OL37983229M - OL34681306M - OL37972627M - OL33535695M - OL36224168M
- Online Computer Library Center (OCLC) ID: 951623875
- Library of Congress Control Number (LCCN): 2012016098
- All ISBNs: ➤ 9781315369297 - 0367658488 - 9781439877265 - 149873958X - 9781322618968 - 9781315352299 - 1439877262 - 9781498739580 - 131536929X - 1322618968 - 131535229X - 9780367658489 - 9781315333243 - 1315333244 - 1498739598 - 9781498739597
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Electronically stored information at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Cybersecurity
By Kim J. Andreasson

“Cybersecurity” Metadata:
- Title: Cybersecurity
- Author: Kim J. Andreasson
- Language: English
- Number of Pages: Median: 392
- Publisher: ➤ Taylor & Francis - Taylor & Francis Group - CRC Press
- Publish Date: 2011 - 2012
- Publish Location: Boca Raton, FL
“Cybersecurity” Subjects and Themes:
- Subjects: ➤ Government information - Government policy - Computer networks - COMPUTERS / Security / General - Computer crimes - POLITICAL SCIENCE / Public Policy / General - POLITICAL SCIENCE / Public Policy / City Planning & Urban Development - Security measures - Prevention - Computer security - Corporation law - Information technology: general issues - Réseaux d'ordinateurs - Sécurité - Mesures - Politique gouvernementale - Information sur l'État - COMPUTERS - Security - General - POLITICAL SCIENCE - Public Policy - City Planning & Urban Development - Public Affairs & Administration
Edition Identifiers:
- The Open Library ID: ➤ OL33770127M - OL33531890M - OL33504540M - OL33413106M - OL31373890M - OL25078161M
- Online Computer Library Center (OCLC) ID: 587104252 - 773036079
- Library of Congress Control Number (LCCN): 2011038756
- All ISBNs: ➤ 9781466551237 - 9781466541863 - 9781439846643 - 1466541865 - 9780429251153 - 0429251157 - 1439846642 - 1466551232 - 9781439846636 - 11363 - 1439846634
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cybersecurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Android security
By Anmol Misra

“Android security” Metadata:
- Title: Android security
- Author: Anmol Misra
- Language: English
- Number of Pages: Median: 272
- Publisher: ➤ Taylor & Francis Group - Taylor & Francis - Auerbach Publishers, Incorporated
- Publish Date: 2013 - 2016 - 2019
- Publish Location: Boca Raton
“Android security” Subjects and Themes:
- Subjects: ➤ Operating systems (Computers) - Security measures - Smartphones - Mobile computing - COMPUTERS / Networking / General - COMPUTERS / Software Development & Engineering / General - COMPUTERS / Security / General - Android (Electronic resource) - Application software, development - Systèmes d'exploitation (Ordinateurs) - Sécurité - Mesures - Téléphones intelligents - Informatique mobile - COMPUTERS - Networking - General - Software Development & Engineering - Security - Internet
Edition Identifiers:
- The Open Library ID: OL33530796M - OL44161304M - OL33680552M - OL31131299M - OL44161854M
- Online Computer Library Center (OCLC) ID: 895913691 - 847525199
- Library of Congress Control Number (LCCN): 2013008016
- All ISBNs: ➤ 1498759661 - 129970400X - 143989647X - 9781439896464 - 9781439896471 - 1439896461 - 9781498759663 - 0367380188 - 9781299704008 - 9780367380182
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Android security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Responsive Security
By Meng Chow Kang
“Responsive Security” Metadata:
- Title: Responsive Security
- Author: Meng Chow Kang
- Language: English
- Number of Pages: Median: 259
- Publisher: Taylor & Francis Group
- Publish Date: 2013 - 2017
“Responsive Security” Subjects and Themes:
- Subjects: ➤ Business enterprises, computer networks - Electronic data processing departments - Information technology - Data protection - Risk management - Business enterprises - Computer networks - Security measures - BUSINESS & ECONOMICS / Management - COMPUTERS / Information Technology - COMPUTERS / Security / General - Computer security - Management - Technologie de l'information - Sécurité - Mesures - Sécurité informatique - Gestion - Réseaux d'ordinateurs - Protection de l'information (Informatique)
Edition Identifiers:
- The Open Library ID: ➤ OL28775608M - OL33731659M - OL33779621M - OL34611649M - OL33513758M - OL33717927M - OL28883589M - OL33763553M
- Online Computer Library Center (OCLC) ID: 1019734121 - 869224516
- Library of Congress Control Number (LCCN): 2013031816
- All ISBNs: ➤ 9781351381284 - 1466584300 - 1138436852 - 129999086X - 9781351381277 - 1351381296 - 1351381288 - 9781466584303 - 9781138436855 - 135138127X - 9781466584310 - 1315145901 - 9781299990869 - 9781351381291 - 9781315145907 - 1466584319
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Responsive Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Breaking and Entering
By Jeremy N. Smith and Smith, Jeremy N.

“Breaking and Entering” Metadata:
- Title: Breaking and Entering
- Authors: Jeremy N. SmithSmith, Jeremy N.
- Language: English
- Number of Pages: Median: 304
- Publisher: ➤ Houghton Mifflin Harcourt Publishing Company - Houghton Mifflin Harcourt Trade & Reference Publishers - Mariner Books - Eamon Dolan/Houghton Mifflin Harcourt - Houghton Mifflin Harcourt
- Publish Date: 2019 - 2020
“Breaking and Entering” Subjects and Themes:
- Subjects: ➤ Computer crimes - Computer security - Hackers - New York Times reviewed - Biography - COMPUTERS / Security / General - TRUE CRIME / Hoaxes & Deceptions - BIOGRAPHY & AUTOBIOGRAPHY / Science & Technology - Computer hackers
Edition Identifiers:
- The Open Library ID: OL29786088M - OL28894961M - OL27330605M
- Online Computer Library Center (OCLC) ID: 1016650492
- Library of Congress Control Number (LCCN): 2018024873
- All ISBNs: ➤ 0544911229 - 0544903218 - 9780544911222 - 9780358108504 - 9780544903210 - 0358108500
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Breaking and Entering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Information security governance simplified
By Todd Fitzgerald
“Information security governance simplified” Metadata:
- Title: ➤ Information security governance simplified
- Author: Todd Fitzgerald
- Language: English
- Number of Pages: Median: 431
- Publisher: ➤ CRC Press - Taylor & Francis Group - Taylor & Francis
- Publish Date: 2011 - 2013 - 2016 - 2020
- Publish Location: Boca Raton
“Information security governance simplified” Subjects and Themes:
- Subjects: ➤ BUSINESS & ECONOMICS / Commerce - COMPUTERS / Security / General - Information resources management - Business intelligence - Security measures - COMPUTERS / Information Technology - Information technology - Information networks - Business enterprises, computer networks - Réseaux d'information - Sécurité - Mesures - Gestion de l'information - Technologie de l'information - BUSINESS & ECONOMICS - Commerce - COMPUTERS - Information Technology - Security - General - Internet - Networking
Edition Identifiers:
- The Open Library ID: ➤ OL34682186M - OL33444820M - OL31375261M - OL29028560M - OL33469832M - OL33733099M - OL33458533M - OL25109529M
- Online Computer Library Center (OCLC) ID: 880372906 - 773298336
- Library of Congress Control Number (LCCN): 2011043463
- All ISBNs: ➤ 0429131909 - 1466551283 - 1439811636 - 9781439811658 - 11357 - 1280121637 - 9780429131905 - 9781466551282 - 0367659220 - 9781439811634 - 9781466532922 - 9780367659226 - 1439811652 - 9781280121630 - 1466532920
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information security governance simplified at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Implementing Digital Forensic Readiness
By Jason Sachowski
“Implementing Digital Forensic Readiness” Metadata:
- Title: ➤ Implementing Digital Forensic Readiness
- Author: Jason Sachowski
- Language: English
- Number of Pages: Median: 504
- Publisher: ➤ Elsevier Science & Technology Books - Taylor & Francis Group
- Publish Date: 2016 - 2019 - 2021
“Implementing Digital Forensic Readiness” Subjects and Themes:
- Subjects: ➤ Computer crimes - Criminal investigation - Forensic sciences - Investigation - Electronics in criminal investigation - Data processing - Criminalité informatique - Enquêtes - Électronique dans les enquêtes criminelles - Criminalistique - Informatique - BUSINESS & ECONOMICS / Infrastructure - SOCIAL SCIENCE / General - LAW / Forensic Science - COMPUTERS / Security / General - COMPUTERS / Information Technology
Edition Identifiers:
- The Open Library ID: ➤ OL34704474M - OL34665906M - OL34524634M - OL33752826M - OL33720860M - OL33689331M - OL33657295M - OL28595117M
- Online Computer Library Center (OCLC) ID: 1082292356 - 1082332959
- Library of Congress Control Number (LCCN): 2019001379 - 2018060970
- All ISBNs: ➤ 9780429805813 - 0429805810 - 9780429805820 - 0128044543 - 0128045019 - 0367778629 - 0429441363 - 9780429805837 - 9780367778620 - 9780128044544 - 1138338958 - 9780128045015 - 0429805837 - 9781138338951 - 0429805829 - 9780429441363
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Implementing Digital Forensic Readiness at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19No-Body Homicide Cases
By Thomas A. (Tad) DiBiase
“No-Body Homicide Cases” Metadata:
- Title: No-Body Homicide Cases
- Author: Thomas A. (Tad) DiBiase
- Language: English
- Number of Pages: Median: 338
- Publisher: Taylor & Francis Group
- Publish Date: 2014 - 2023
“No-Body Homicide Cases” Subjects and Themes:
- Subjects: ➤ Criminal investigation, united states - Criminal procedure, united states - Criminal investigation - Criminal procedure - Murder - Investigation - Trials (Murder) - Homicide investigation - Victims of crimes - Criminal Evidence - Forensic sciences - COMPUTERS / Security / General - LAW / Criminal Law / General - LAW / Forensic Science
Edition Identifiers:
- The Open Library ID: ➤ OL49268401M - OL49264700M - OL33523935M - OL33770120M - OL49270404M - OL49270320M - OL28791073M
- Library of Congress Control Number (LCCN): 2014039483
- All ISBNs: ➤ 1032618043 - 9781482260076 - 1482260077 - 9781482260069 - 1482260069 - 9781032618043 - 9781003805632 - 0429256973 - 1032618086 - 9781003805656 - 1003805639 - 9781032618081 - 1003805655 - 9780429256974
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find No-Body Homicide Cases at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Fraud Auditing Using Caatt
By Shaun Aghili
“Fraud Auditing Using Caatt” Metadata:
- Title: Fraud Auditing Using Caatt
- Author: Shaun Aghili
- Language: English
- Publisher: ➤ Taylor & Francis Group - Auerbach Publishers, Incorporated
- Publish Date: 2019 - 2022
“Fraud Auditing Using Caatt” Subjects and Themes:
- Subjects: ➤ Auditing, internal - Fraud, prevention - Internal Auditing - Fraud - Prevention - Vérification interne - BUSINESS & ECONOMICS / Management Science - COMPUTERS / Information Technology - COMPUTERS / Security / General
Edition Identifiers:
- The Open Library ID: ➤ OL37969406M - OL39559005M - OL34657131M - OL34738841M - OL34738844M - OL37977454M
- Online Computer Library Center (OCLC) ID: 1098217785
- Library of Congress Control Number (LCCN): 2019018386
- All ISBNs: ➤ 0367145618 - 0429032323 - 9780429032325 - 9780429626388 - 9780429629662 - 9781032401553 - 1032401559 - 0429629664 - 9780367145613 - 9780429628023 - 042962638X - 0429628021
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Fraud Auditing Using Caatt at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Multimedia security
By Frank Y. Shih
“Multimedia security” Metadata:
- Title: Multimedia security
- Author: Frank Y. Shih
- Language: English
- Number of Pages: Median: 423
- Publisher: ➤ Taylor & Francis Group - Taylor & Francis
- Publish Date: 2012 - 2017
- Publish Location: Boca Raton, FL
“Multimedia security” Subjects and Themes:
- Subjects: ➤ Multimedia communicatios - Security measures - COMPUTERS / Computer Graphics - COMPUTERS / Security / General - TECHNOLOGY & ENGINEERING / Electrical - Computer security - Multimedia systems - Intellectual property - Watermarks - Cryptography - Multimedia communications - Réseaux multimédias - Sécurité - Mesures - COMPUTERS - Computer Graphics - Security - General - TECHNOLOGY & ENGINEERING - Electrical - Digital Media - Interactive & Multimedia - Web - Site Design - User Generated Content
Edition Identifiers:
- The Open Library ID: ➤ OL28856410M - OL33512532M - OL33470750M - OL25340058M - OL33654272M - OL33746949M - OL33699092M
- Online Computer Library Center (OCLC) ID: 806041937 - 863221667
- Library of Congress Control Number (LCCN): 2012021069
- All ISBNs: ➤ 9781351824125 - 1439873313 - 1315216922 - 9781439873311 - 9781315216928 - 9781138072541 - 1351832816 - 1351824120 - 1299992285 - 9781439873328 - 9781351832816 - 1138072540 - 9781299992283 - 1439873321
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Multimedia security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Professional Security Management
By Charles Swanson
“Professional Security Management” Metadata:
- Title: ➤ Professional Security Management
- Author: Charles Swanson
- Language: English
- Number of Pages: Median: 288
- Publisher: ➤ Routledge, Chapman & Hall, Incorporated - Taylor & Francis Group
- Publish Date: 2020 - 2023
“Professional Security Management” Subjects and Themes:
- Subjects: ➤ Sociology - Financial risk management - Risk (insurance) - Computer security - Private security services - Management - Risk management - Planning - Risk managers - Industries - Security measures - Services privés de sécurité - Gestion - Gestion du risque - Planification - Gestionnaires de risques - Industrie - Sécurité - Mesures - COMPUTERS / Security / General - BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management
Edition Identifiers:
- The Open Library ID: ➤ OL28082514M - OL28082756M - OL28082544M - OL49607151M - OL28082694M - OL29498342M
- Online Computer Library Center (OCLC) ID: 1141922842
- Library of Congress Control Number (LCCN): 2020007321
- All ISBNs: ➤ 9780367513092 - 1000080587 - 0367513099 - 9781000080582 - 9780429323065 - 1000080579 - 1000080560 - 0367339617 - 9781000080575 - 9781000080568 - 9780367339616 - 0429323069
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Professional Security Management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Blockchain Technology and Applications
By Ahmed Banafa

“Blockchain Technology and Applications” Metadata:
- Title: ➤ Blockchain Technology and Applications
- Author: Ahmed Banafa
- Language: English
- Number of Pages: Median: 200
- Publisher: River Publishers
- Publish Date: 2020 - 2022 - 2024
“Blockchain Technology and Applications” Subjects and Themes:
- Subjects: ➤ Blockchains (databases) - Electronic funds transfers - Blockchains (Databases) - Distributed databases - Computer security - Chaînes de blocs - Transferts électroniques de fonds - Bases de données réparties - Sécurité informatique - COMPUTERS / Security / General
Edition Identifiers:
- The Open Library ID: ➤ OL29818007M - OL57754807M - OL40153692M - OL40133730M - OL40173967M - OL28056093M
- Online Computer Library Center (OCLC) ID: 1224527152
- All ISBNs: ➤ 9788770043274 - 8770221065 - 8770043272 - 1000795543 - 9781000795547 - 9788770221054 - 9781003337393 - 1000792226 - 9788770221061 - 9781000792225 - 8770221057 - 1003337392
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Blockchain Technology and Applications at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Automatic Defense Against Zeroday Polymorphic Worms In Communication Networks
By Mohssen Mohammed

“Automatic Defense Against Zeroday Polymorphic Worms In Communication Networks” Metadata:
- Title: ➤ Automatic Defense Against Zeroday Polymorphic Worms In Communication Networks
- Author: Mohssen Mohammed
- Language: English
- Number of Pages: Median: 317
- Publisher: ➤ Auerbach Publishers, Incorporated - Taylor & Francis Group - Taylor & Francis Ltd
- Publish Date: 2013 - 2016 - 2019
“Automatic Defense Against Zeroday Polymorphic Worms In Communication Networks” Subjects and Themes:
- Subjects: ➤ Computer viruses - Machine theory - COMPUTERS / Machine Theory - Computer networks - COMPUTERS / Security / General - Computer algorithms - Security measures - COMPUTERS / Software Development & Engineering / General - Computer networks, security measures - Algorithms - Virus informatiques - Algorithmes - Réseaux d'ordinateurs - Sécurité - Mesures - Théorie des automates - COMPUTERS - Software Development & Engineering - General - Security - Internet - Networking
Edition Identifiers:
- The Open Library ID: ➤ OL26184938M - OL33664488M - OL37953485M - OL37956391M - OL33485498M - OL37982488M - OL37953117M
- Online Computer Library Center (OCLC) ID: 847526827 - 859349296
- Library of Congress Control Number (LCCN): 2012044400
- All ISBNs: ➤ 9780367380038 - 9781466557284 - 9781482219043 - 9781299710948 - 1482219042 - 036738003X - 1466557273 - 9780429098147 - 1482219050 - 1466557281 - 9781466557277 - 1299710948 - 0429098146 - 9781482219050
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Automatic Defense Against Zeroday Polymorphic Worms In Communication Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Noiseless steganography
By Abdelrahman Desoky
“Noiseless steganography” Metadata:
- Title: Noiseless steganography
- Author: Abdelrahman Desoky
- Language: English
- Number of Pages: Median: 288
- Publisher: ➤ Auerbach Publishers, Incorporated - Taylor & Francis Group - Auerbach Publications
- Publish Date: 2012 - 2016
- Publish Location: Boca Raton
“Noiseless steganography” Subjects and Themes:
- Subjects: ➤ COMPUTERS / Security / General - Electronics in espionage - Data transmission systems - COMPUTERS / Security / Cryptography - Coding theory - Data encryption (Computer science) - Confidential communications - BUSINESS & ECONOMICS / Management - Cryptography - Confidentiality - Électronique dans l'espionnage - Secret professionnel - Chiffrement (Informatique) - BUSINESS & ECONOMICS - Management - COMPUTERS - Security - General - Information Theory
Edition Identifiers:
- The Open Library ID: ➤ OL37950432M - OL34635243M - OL37980003M - OL37949611M - OL33550343M - OL25139115M - OL37951230M
- Online Computer Library Center (OCLC) ID: 778447730 - 869214382
- Library of Congress Control Number (LCCN): 2011046670
- All ISBNs: ➤ 1439846227 - 9781439846216 - 146655911X - 1439846219 - 0429063210 - 1466541857 - 9780429063213 - 9781138199361 - 9781439846223 - 1306535344 - 9781466559110 - 9781466541856 - 9781306535342 - 1138199362
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Noiseless steganography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Policing global movement
By S. Caroline Taylor, Daniel Joseph Torpy and Das, Dilip K.

“Policing global movement” Metadata:
- Title: Policing global movement
- Authors: S. Caroline TaylorDaniel Joseph TorpyDas, Dilip K.
- Language: English
- Number of Pages: Median: 288
- Publisher: ➤ CRC Press/Taylor & Francis Group - CRC Press - Taylor & Francis Group
- Publish Date: 2012 - 2019
- Publish Location: Boca Raton, FL
“Policing global movement” Subjects and Themes:
- Subjects: ➤ LAW / Criminal Law / General - POLITICAL SCIENCE / Political Freedom & Security / Terrorism - Emigration and immigration - Human trafficking - Terrorism - COMPUTERS / Security / General - Tourist trade - Police - Tourism - Terrorism, prevention - Émigration et immigration - Traite des êtres humains - Terrorisme - Emigration - Migration period (Medieval culture or period) - Migrations (events) - Immigration - COMPUTERS - Security - General - LAW - Criminal Law - POLITICAL SCIENCE - Political Freedom & Security - SOCIAL SCIENCE - Emigration & Immigration
Edition Identifiers:
- The Open Library ID: ➤ OL49678162M - OL33544767M - OL53924103M - OL33782391M - OL53995506M - OL25376715M - OL51024058M
- Online Computer Library Center (OCLC) ID: 800446413 - 809041661
- Library of Congress Control Number (LCCN): 2012025865
- All ISBNs: ➤ 0429253419 - 1466581247 - 1322622663 - 9781466581234 - 1466507268 - 9780429253416 - 9781466507272 - 9780367867096 - 0367867095 - 1466507276 - 9781466507265 - 1466581239 - 9781322622668 - 9781466581241
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Policing global movement at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27The practical guide to HIPAA privacy and security compliance
By Kevin Beaver

“The practical guide to HIPAA privacy and security compliance” Metadata:
- Title: ➤ The practical guide to HIPAA privacy and security compliance
- Author: Kevin Beaver
- Language: English
- Number of Pages: Median: 496
- Publisher: ➤ Auerbach Publications - Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2003 - 2004 - 2014 - 2021
- Publish Location: Boca Raton
“The practical guide to HIPAA privacy and security compliance” Subjects and Themes:
- Subjects: ➤ Access control - Continuation coverage - Health Insurance - Law and legislation - Medical care - Medical records - Security measures - Health insurance continuation coverage - BUSINESS & ECONOMICS / Management - COMPUTERS / Information Technology - COMPUTERS / Security / General - Health insurance, law and legislation - Medical care, united states - Dossiers médicaux - Accès - Contrôle - BUSINESS & ECONOMICS - Management - COMPUTERS - Information Technology - Security - General - LAW - Administrative Law & Regulatory Practice - Medical Records - Legislation & jurisprudence - Confidentiality - Guideline Adherence - United States
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL37980027M - OL37960785M - OL34009582M - OL33920433M - OL33448182M - OL29030678M - OL3689668M
- Online Computer Library Center (OCLC) ID: 892491827 - 52594735 - 888026424
- Library of Congress Control Number (LCCN): 2014033165 - 2003057900
- All ISBNs: ➤ 042910782X - 9781439855591 - 1439855587 - 1280098767 - 9781439855584 - 9781280098765 - 0849319536 - 9780849319532 - 1135493871 - 9780429107825 - 1032098937 - 9781135493875 - 9781032098937 - 1439855595
Author's Alternative Names:
"Kevin M. Beaver" and "Kevin Michael Beaver"Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The practical guide to HIPAA privacy and security compliance at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Build your own security lab
a field guide for network testing
By Michael Gregg

“Build your own security lab” Metadata:
- Title: Build your own security lab
- Author: Michael Gregg
- Language: English
- Number of Pages: Median: 456
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley
- Publish Date: 2008 - 2010 - 2011
- Publish Location: Indianapolis, IN
“Build your own security lab” Subjects and Themes:
- Subjects: ➤ Computer networks - Testing - Security measures - COMPUTERS / Networking / Security - Computer networks / Security measures / Testing - COMPUTERS / Internet / Security - COMPUTERS / Security / General - Réseaux d'ordinateurs - Wireless communication systems - Networking - COMPUTERS - General - Internet - Security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL29103933M - OL29047277M - OL19141879M - OL18893654M - OL10294432M - OL19999522M
- Online Computer Library Center (OCLC) ID: 699852569
- Library of Congress Control Number (LCCN): 2008009610
- All ISBNs: ➤ 9780470179864 - 1118080637 - 9780470379479 - 9781118080634 - 0470379472 - 0470179864
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Build your own security lab at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Enhancing Business Continuity and IT Capability
By Nijaz Bajgorić, Lejla Turulja, Semir Ibrahimović and Amra Alagic
“Enhancing Business Continuity and IT Capability” Metadata:
- Title: ➤ Enhancing Business Continuity and IT Capability
- Authors: Nijaz BajgorićLejla TuruljaSemir IbrahimovićAmra Alagic
- Language: English
- Number of Pages: Median: 280
- Publisher: ➤ Taylor & Francis Group - CRC Press LLC - Auerbach Publishers, Incorporated
- Publish Date: 2020 - 2023
“Enhancing Business Continuity and IT Capability” Subjects and Themes:
- Subjects: ➤ Management information systems - Operating systems (Computers) - Information technology - Management - Management Information Systems - Systèmes d'information de gestion - Systèmes d'exploitation (Ordinateurs) - Technologie de l'information - Gestion - Operating systems - COMPUTERS / Security / General - BUSINESS & ECONOMICS / Production & Operations Management - COMPUTERS / Information Technology
Edition Identifiers:
- The Open Library ID: ➤ OL30184543M - OL49607168M - OL30184653M - OL34679389M - OL30184743M - OL30185042M
- Online Computer Library Center (OCLC) ID: 1204135934
- All ISBNs: ➤ 036761698X - 1000289419 - 1003106099 - 1000289451 - 9781000289459 - 9780367652616 - 9781003106098 - 9780367616984 - 0367652617 - 1000289435 - 9781000289435 - 9781000289411
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Enhancing Business Continuity and IT Capability at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Security without obscurity
By Jeffrey James Stapleton
“Security without obscurity” Metadata:
- Title: Security without obscurity
- Author: Jeffrey James Stapleton
- Language: English
- Number of Pages: Median: 340
- Publisher: ➤ CRC Press, Taylor & Francis Group - Taylor & Francis Group
- Publish Date: 2014 - 2020 - 2021 - 2024
- Publish Location: Boca Raton, FL
“Security without obscurity” Subjects and Themes:
- Subjects: ➤ Data protection - Standards - Information technology - Security measures - Computer security - Computer networks - BUSINESS & ECONOMICS / Management - COMPUTERS / Information Technology - COMPUTERS / Security / General - Computer networks, security measures - Computer Security - Protection de l'information (Informatique) - Normes - Technologie de l'information - Sécurité - Mesures - Sécurité informatique - Réseaux d'ordinateurs - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: ➤ OL33807602M - OL33807321M - OL50643835M - OL50654659M - OL34690275M - OL31017382M
- Online Computer Library Center (OCLC) ID: 880637949
- Library of Congress Control Number (LCCN): 2014006006
- All ISBNs: ➤ 9781466592148 - 9781032545257 - 036765864X - 9781032545226 - 9780367658649 - 1032545259 - 0367657201 - 9780367657208 - 1032545224 - 0367486121 - 9780367486129 - 1466592141
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Security without obscurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Introduction to Crime and Crime Causation
By Robert C. Winters, Julie L. Globokar and Roberson, Cliff
“Introduction to Crime and Crime Causation” Metadata:
- Title: ➤ Introduction to Crime and Crime Causation
- Authors: Robert C. WintersJulie L. GlobokarRoberson, Cliff
- Language: English
- Number of Pages: Median: 323
- Publisher: Taylor & Francis Group
- Publish Date: 2014 - 2020
“Introduction to Crime and Crime Causation” Subjects and Themes:
- Subjects: ➤ Forensic sciences - Criminal behavior - Crime prevention - COMPUTERS / Security / General - LAW / Criminal Law / General - LAW / Forensic Science
Edition Identifiers:
- The Open Library ID: OL39336847M - OL28781559M - OL34681980M - OL29232262M - OL39348976M
- Library of Congress Control Number (LCCN): 2014009430
- All ISBNs: ➤ 9781466597105 - 1466597119 - 9780429255465 - 1466597100 - 9781466597129 - 9780367669775 - 9781466597112 - 0429255462 - 0367669773 - 1466597127
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Introduction to Crime and Crime Causation at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Logical Investigative Methods
By Robert J. Girod

“Logical Investigative Methods” Metadata:
- Title: Logical Investigative Methods
- Author: Robert J. Girod
- Language: English
- Number of Pages: Median: 289
- Publisher: ➤ Routledge - Taylor & Francis Group
- Publish Date: 2014 - 2019
“Logical Investigative Methods” Subjects and Themes:
- Subjects: ➤ Criminal investigation - Forensic sciences - Psychological aspects - COMPUTERS / Security / General - LAW / Criminal Law / General - LAW / Forensic Science - Enquêtes criminelles - Aspect psychologique - Criminalistique - Forensic science - BUSINESS & ECONOMICS - Infrastructure - SOCIAL SCIENCE - General
Edition Identifiers:
- The Open Library ID: OL28790764M - OL37961118M - OL40090678M - OL33782421M
- Online Computer Library Center (OCLC) ID: 894632682
- Library of Congress Control Number (LCCN): 2014012377
- All ISBNs: ➤ 9781482243130 - 0429256477 - 9780429256479 - 0367870142 - 9781482243147 - 148224313X - 1482243148 - 9780367870140
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Logical Investigative Methods at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Cyber security essentials
By James Graham, Richard Howard and Ryan Olson

“Cyber security essentials” Metadata:
- Title: Cyber security essentials
- Authors: James GrahamRichard HowardRyan Olson
- Language: English
- Number of Pages: Median: 325
- Publisher: Auerbach Publications
- Publish Date: 2010
- Publish Location: Boca Raton
“Cyber security essentials” Subjects and Themes:
- Subjects: ➤ BUSINESS & ECONOMICS / Management - COMPUTERS / Security / General - COMPUTERS / Information Technology - Computer security
Edition Identifiers:
- The Open Library ID: OL25074757M
- Online Computer Library Center (OCLC) ID: 635486985
- Library of Congress Control Number (LCCN): 2010044845
- All ISBNs: 1439851239 - 9781439851234
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber security essentials at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Asset protection through security awareness
By Tyler Justin Speed
“Asset protection through security awareness” Metadata:
- Title: ➤ Asset protection through security awareness
- Author: Tyler Justin Speed
- Language: English
- Number of Pages: Median: 337
- Publisher: ➤ CRC Press - Taylor & Francis Group - Auerbach Publishers, Incorporated
- Publish Date: 2011 - 2016 - 2019
- Publish Location: Boca Raton, FL
“Asset protection through security awareness” Subjects and Themes:
- Subjects: ➤ BUSINESS & ECONOMICS / Commerce - Business enterprises - Computer networks - COMPUTERS / Security / General - COMPUTERS / Information Technology - Information technology - Security measures - Security systems - Réseaux d'ordinateurs - Sécurité - Mesures - Technologie de l'information - Entreprises - BUSINESS & ECONOMICS - Commerce - COMPUTERS - Information Technology - Security - General - Corporate Governance - Leadership - Organizational Development - Workplace Culture
Edition Identifiers:
- The Open Library ID: ➤ OL36192188M - OL25102140M - OL33728017M - OL36199854M - OL37952047M - OL37979185M
- Online Computer Library Center (OCLC) ID: 773317062
- Library of Congress Control Number (LCCN): 2011045952
- All ISBNs: ➤ 9781439809839 - 1439809836 - 9780429093463 - 9781439809822 - 1439809828 - 0367381818 - 9781466551411 - 0429093462 - 1466532769 - 9780367381813 - 9781466532762 - 1466551410
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Asset protection through security awareness at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Cyber Arms
By Stanislav Abaimov and Maurizio Martellini
“Cyber Arms” Metadata:
- Title: Cyber Arms
- Authors: Stanislav AbaimovMaurizio Martellini
- Language: English
- Number of Pages: Median: 238
- Publisher: Taylor & Francis Group
- Publish Date: 2020 - 2022
“Cyber Arms” Subjects and Themes:
- Subjects: ➤ Engineering - Internet - Security measures - Electronic countermeasures - International Security - Cyberterrorism - Military weapons - Technological innovations - Cyberinfrastructure - Computer security - Sécurité - Mesures - Contre-mesures électroniques - Cyberterrorisme - Armes de guerre - Innovations - Sécurité informatique - COMPUTERS / Security / General
Edition Identifiers:
- The Open Library ID: ➤ OL28081391M - OL28081452M - OL28080726M - OL28081448M - OL28081385M - OL37325455M
- Online Computer Library Center (OCLC) ID: 1173714988
- All ISBNs: ➤ 0367424959 - 9781000081039 - 1000081036 - 0367853868 - 1000081176 - 0367895854 - 9781000081176 - 9780367895853 - 9780367424954 - 9780367853860 - 1000081109 - 9781000081107
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cyber Arms at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Wireless Multimedia Communication Systems
By Kamisetty Ramamohan Rao, Zoran S. Bojkovic and Bojan M. Bakmaz

“Wireless Multimedia Communication Systems” Metadata:
- Title: ➤ Wireless Multimedia Communication Systems
- Authors: Kamisetty Ramamohan RaoZoran S. BojkovicBojan M. Bakmaz
- Language: English
- Number of Pages: Median: 492
- Publisher: ➤ CRC Press - Taylor & Francis Group - CRC Press, Taylor and Francis Group
- Publish Date: 2014 - 2017
“Wireless Multimedia Communication Systems” Subjects and Themes:
- Subjects: ➤ Wireless communication systems - Multimedia communications - COMPUTERS / Security / General - COMPUTERS / Internet / General - TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications - Réseaux multimédias - Transmission sans fil - TECHNOLOGY & ENGINEERING - Mechanical
Edition Identifiers:
- The Open Library ID: ➤ OL33780821M - OL33586032M - OL33540305M - OL28774961M - OL33685177M - OL28881888M
- Online Computer Library Center (OCLC) ID: 794041164 - 1016108013 - 880825322
- Library of Congress Control Number (LCCN): 2014007345
- All ISBNs: ➤ 9781351823258 - 9781466566019 - 9781138076143 - 9781315216058 - 1351831941 - 9781466566002 - 978-1466566002 - 1351823256 - 1138076147 - 1315216051 - 1466566019 - 1466566000 - 9781351831949
Author's Alternative Names:
"K.R. Rao", "K. Ramamohan Rao" and "Kamisetty Ramamohan Rao"Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Wireless Multimedia Communication Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Combating Human Trafficking
By Michael J. Palmiotto

“Combating Human Trafficking” Metadata:
- Title: Combating Human Trafficking
- Author: Michael J. Palmiotto
- Language: English
- Number of Pages: Median: 333
- Publisher: ➤ Routledge - Taylor & Francis Group
- Publish Date: 2014 - 2020
“Combating Human Trafficking” Subjects and Themes:
- Subjects: ➤ Human trafficking - Human smuggling - Slavery, history - Prevention - Slavery - History - LAW / Forensic Science - LAW / Criminal Law / General - COMPUTERS / Security / General - Sociology - Traite des êtres humains - LAW - Forensic Science - Criminal Law - General - COMPUTERS - Security
Edition Identifiers:
- The Open Library ID: OL32024419M - OL39357088M - OL39244367M - OL33490294M - OL28800405M
- Online Computer Library Center (OCLC) ID: 895008937 - 880966566
- Library of Congress Control Number (LCCN): 2014039467
- All ISBNs: ➤ 9780429256431 - 1482240394 - 9781322637198 - 9780367669751 - 0429256434 - 9781482240405 - 9781482240399 - 0367669757 - 1322637199 - 1482240408
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Combating Human Trafficking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Information Assurance Handbook
By Steven Hernandez and Corey Schou

“Information Assurance Handbook” Metadata:
- Title: Information Assurance Handbook
- Authors: Steven HernandezCorey Schou
- Language: English
- Number of Pages: Median: 480
- Publisher: McGraw-Hill Education
- Publish Date: 2014
“Information Assurance Handbook” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks - Handbooks, manuals - Security measures - Data protection - Information storage and retrieval systems - COMPUTERS / Security / General
Edition Identifiers:
- The Open Library ID: OL28538371M
- Online Computer Library Center (OCLC) ID: 864700506 - 894514710
- Library of Congress Control Number (LCCN): 2014031481
- All ISBNs: 0071821651 - 9780071821650
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Assurance Handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Casino and Gaming Resort Investigations
By Derk J. Boss and Alan W. Zajic
“Casino and Gaming Resort Investigations” Metadata:
- Title: ➤ Casino and Gaming Resort Investigations
- Authors: Derk J. BossAlan W. Zajic
- Language: English
- Number of Pages: Median: 266
- Publisher: Taylor & Francis Group
- Publish Date: 2019
“Casino and Gaming Resort Investigations” Subjects and Themes:
- Subjects: ➤ Casinos - Gambling - Electronic surveillance - Handbooks, manuals - Security measures - Corrupt practices - Criminal investigation - Guides, manuels - Sécurité - Mesures - Surveillance électronique - Jeux de hasard - Pratiques déloyales - Enquêtes criminelles - BUSINESS & ECONOMICS / Industries / Hospitality, Travel & Tourism - COMPUTERS / Security / General - LAW / Forensic Science
Edition Identifiers:
- The Open Library ID: ➤ OL28841540M - OL54019616M - OL36741306M - OL54019704M - OL36734312M - OL34654231M
- Online Computer Library Center (OCLC) ID: 1089840807
- Library of Congress Control Number (LCCN): 2019012036
- All ISBNs: ➤ 1315118734 - 9781482246360 - 1351635522 - 1482246368 - 9781482246377 - 0367259540 - 1482246376 - 9780367259549 - 9781351645010 - 9781315118734 - 1351645013 - 9781351635523
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Casino and Gaming Resort Investigations at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Security Risk Models for Cyber Insurance
By David Rios Insua, Caroline Baylon and Jose Vila
“Security Risk Models for Cyber Insurance” Metadata:
- Title: ➤ Security Risk Models for Cyber Insurance
- Authors: David Rios InsuaCaroline BaylonJose Vila
- Language: English
- Number of Pages: Median: 149
- Publisher: ➤ Taylor & Francis Group - CRC Press LLC
- Publish Date: 2020 - 2022
“Security Risk Models for Cyber Insurance” Subjects and Themes:
- Subjects: ➤ Computer insurance - Computer security - Risk management - COMPUTERS / Security / General - MATHEMATICS / Probability & Statistics / General - COMPUTERS / Internet / Security
Edition Identifiers:
- The Open Library ID: ➤ OL34686425M - OL54015717M - OL33815248M - OL33815233M - OL33815332M - OL33815279M
- Online Computer Library Center (OCLC) ID: 1226565273
- All ISBNs: ➤ 9781000336221 - 9780367672638 - 1000336190 - 9781000336191 - 9781000336160 - 0367672634 - 0429329482 - 1000336166 - 0367339498 - 9780367339494 - 1000336220 - 9780429329487
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Security Risk Models for Cyber Insurance at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Managing Security Services in Heterogenous Networks
By R. Thandeeswaran, Thinagaran Perumal, Kun Ma and N. Jeyanthi
“Managing Security Services in Heterogenous Networks” Metadata:
- Title: ➤ Managing Security Services in Heterogenous Networks
- Authors: R. ThandeeswaranThinagaran PerumalKun MaN. Jeyanthi
- Language: English
- Number of Pages: Median: 186
- Publisher: ➤ Taylor & Francis Group - CRC Press LLC
- Publish Date: 2020 - 2023
“Managing Security Services in Heterogenous Networks” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Management - Heterogeneous distributed computing systems - Réseaux d'ordinateurs - Sécurité - Mesures - Gestion - COMPUTERS / Networking / Security - COMPUTERS / Security / General
Edition Identifiers:
- The Open Library ID: ➤ OL33804446M - OL34690173M - OL33804414M - OL33804445M - OL33804464M - OL46312906M
- Online Computer Library Center (OCLC) ID: 1228889365
- All ISBNs: ➤ 1000285065 - 9781000285062 - 1000285057 - 1000285073 - 9780367457341 - 0367457342 - 9781000285079 - 9780367647452 - 0367647451 - 9781000285055 - 1003034047 - 9781003034049
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Managing Security Services in Heterogenous Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Multimodal Biometric Systems
By Rashmi Gupta and Manju Khari

“Multimodal Biometric Systems” Metadata:
- Title: Multimodal Biometric Systems
- Authors: Rashmi GuptaManju Khari
- Language: English
- Number of Pages: Median: 176
- Publisher: ➤ CRC Press LLC - CRC Press - Taylor & Francis Group
- Publish Date: 2021
“Multimodal Biometric Systems” Subjects and Themes:
- Subjects: Engineering - Biometric identification - Identification biométrique - COMPUTERS / Security / General
Edition Identifiers:
- The Open Library ID: OL33932300M - OL50704084M - OL32460607M - OL33932298M - OL33932296M
- Online Computer Library Center (OCLC) ID: 1246674290
- Library of Congress Control Number (LCCN): 2021015971
- All ISBNs: ➤ 1000453774 - 9781003138068 - 1003138063 - 9780367685577 - 9781000453782 - 0367685574 - 1000453782 - 0367685566 - 9781000453775 - 9780367685560
Access and General Info:
- First Year Published: 2021
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Multimodal Biometric Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43PHYSICAL SECURITY AND SAFETY
A FIELD GUIDE FOR THE PRACTITIONER
By Truett A. Ricks and Jeffrey Dingle

“PHYSICAL SECURITY AND SAFETY” Metadata:
- Title: PHYSICAL SECURITY AND SAFETY
- Authors: Truett A. RicksJeffrey Dingle
- Language: English
- Number of Pages: Median: 179
- Publisher: ➤ Taylor & Francis Group - CRC PRESS
- Publish Date: 2014 - 2015 - 2017
“PHYSICAL SECURITY AND SAFETY” Subjects and Themes:
- Subjects: ➤ Buildings, security measures - Buildings - Security measures - BUSINESS & ECONOMICS / Management - COMPUTERS / Security / General - TECHNOLOGY & ENGINEERING / Industrial Health & Safety
Edition Identifiers:
- The Open Library ID: OL25753779M - OL33499479M - OL33586756M - OL33713431M - OL33531196M
- Online Computer Library Center (OCLC) ID: 1080589001
- Library of Congress Control Number (LCCN): 2014020108
- All ISBNs: ➤ 9781482227024 - 1482227029 - 9780429170263 - 9781322636818 - 0429170262 - 1482227037 - 9781482227031 - 1138430900 - 1322636818 - 9781138430907
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find PHYSICAL SECURITY AND SAFETY at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44The death of the Internet
By Markus Jakobsson

“The death of the Internet” Metadata:
- Title: The death of the Internet
- Author: Markus Jakobsson
- Language: English
- Number of Pages: Median: 386
- Publisher: ➤ IEEE Computer Society Press - Higher Education Press - John Wiley & Sons, Inc. - Wiley & Sons, Limited, John
- Publish Date: 2012 - 2013
- Publish Location: Beijing - Hoboken, New Jersey
“The death of the Internet” Subjects and Themes:
- Subjects: ➤ Electronic commerce - COMPUTERS / Security / General - Data protection - Computer crimes - Internet - Security measures - Computer related crime - Säkerhetsaspekter - COMPUTERS - Databrott - General - Smartphones - Security - Computer privacy and security - Internet, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL29115290M - OL39883122M - OL29115291M - OL43326448M - OL29138191M - OL25121915M
- Online Computer Library Center (OCLC) ID: 881013008
- Library of Congress Control Number (LCCN): 2011047198
- All ISBNs: ➤ 1118488164 - 1118312554 - 9787040301175 - 9781118312544 - 1118312546 - 9781118312537 - 9781118312551 - 9781118488164 - 1118062418 - 7040301172 - 9781118062418 - 1118312538
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The death of the Internet at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45New York City Police Department
By John A. Eterno
“New York City Police Department” Metadata:
- Title: ➤ New York City Police Department
- Author: John A. Eterno
- Language: English
- Number of Pages: Median: 230
- Publisher: Taylor & Francis Group
- Publish Date: 2014 - 2017
“New York City Police Department” Subjects and Themes:
- Subjects: ➤ Police, new york (state), new york - Police administration - Crime, united states - Police - Crime - COMPUTERS / Security / General - LAW / Criminal Law / General - LAW / Forensic Science - New York (N.Y.). Police Department - New York (N.Y.).
Edition Identifiers:
- The Open Library ID: OL54045895M - OL34502867M - OL33623520M - OL33517365M - OL28764367M
- Online Computer Library Center (OCLC) ID: 806017161 - 894457388 - 1080588558
- Library of Congress Control Number (LCCN): 2014028242
- All ISBNs: ➤ 9781466575936 - 1466575840 - 1322638403 - 1138458597 - 9781138458598 - 146657593X - 9781322638409 - 9781466575844 - 042925444X - 9780429254444
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find New York City Police Department at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46The Terrorists of Iraq
By Malcolm W. Nance

“The Terrorists of Iraq” Metadata:
- Title: The Terrorists of Iraq
- Author: Malcolm W. Nance
- Language: English
- Number of Pages: Median: 404
- Publisher: ➤ CRC Press - BookSurge Publishing - Taylor & Francis Group
- Publish Date: 2007 - 2014
“The Terrorists of Iraq” Subjects and Themes:
- Subjects: ➤ Insurgency - Terrorism - Iraq, history - History - COMPUTERS / Security / General - POLITICAL SCIENCE / Political Freedom & Security / International Security - POLITICAL SCIENCE / Political Freedom & Security / Terrorism - Iraq war, 2003-2011 - Terrorists - Postwar reconstruction
Edition Identifiers:
- The Open Library ID: OL33515072M - OL33674851M - OL9562062M - OL28124654M
- Online Computer Library Center (OCLC) ID: 182540377
- Library of Congress Control Number (LCCN): 2014030285
- All ISBNs: ➤ 1419661108 - 9781498706919 - 0429257503 - 1498706916 - 9781419661105 - 9781498706896 - 1498706894 - 9780429257506
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Terrorists of Iraq at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47IS Security Auditing
By Bel G. Raggad

“IS Security Auditing” Metadata:
- Title: IS Security Auditing
- Author: Bel G. Raggad
- Language: English
- Number of Pages: Median: 832
- Publisher: ➤ Taylor & Francis - CRC Press/Taylor & Francis - CRC
- Publish Date: 2009 - 2010
- Publish Location: Boca Raton
“IS Security Auditing” Subjects and Themes:
- Subjects: ➤ Management - Computer security - Data protection - Electronic data processing, auditing - Management information systems - Sécurité informatique - Gestion - Protection de l'information (Informatique) - BUSINESS & ECONOMICS / Information Management - COMPUTERS / Information Technology - COMPUTERS / Security / General
Edition Identifiers:
- The Open Library ID: OL23918829M - OL11817469M
- Online Computer Library Center (OCLC) ID: 226357396 - 779881808
- Library of Congress Control Number (LCCN): 2009043226
- All ISBNs: 9781420078541 - 1420078542
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find IS Security Auditing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Case studies in intelligent computing
By Biju Issac and Nauman Israr
“Case studies in intelligent computing” Metadata:
- Title: ➤ Case studies in intelligent computing
- Authors: Biju IssacNauman Israr
- Language: English
- Number of Pages: Median: 572
- Publisher: ➤ Auerbach Publishers, Incorporated - CRC Press, Taylor & Francis Group, CRC Press is an imprint of the Taylor & Francis Group, an informa business - Taylor & Francis Group
- Publish Date: 2014 - 2015 - 2016
- Publish Location: Boca Raton
“Case studies in intelligent computing” Subjects and Themes:
- Subjects: ➤ Artificial intelligence - Case studies - Industrial applications - Research - Computational intelligence - Intelligent agents (Computer software) - COMPUTERS / Security / General - COMPUTERS / Software Development & Engineering / Systems Analysis & Design - COMPUTERS / Software Development & Engineering / General - Intelligent agents (computer software) - Intelligence artificielle - Études de cas - Applications industrielles - Recherche - Intelligence informatique - Agents intelligents (Logiciels) - COMPUTERS - Security - General - Software Development & Engineering - Systems Analysis & Design
Edition Identifiers:
- The Open Library ID: OL33553891M - OL31018132M - OL37955296M - OL37980810M - OL34637157M
- Online Computer Library Center (OCLC) ID: 888056050
- Library of Congress Control Number (LCCN): 2014008394
- All ISBNs: ➤ 1482207044 - 0429074336 - 1138034126 - 9781482207033 - 9781138034129 - 9781322636726 - 9780429074332 - 1482207036 - 9781482207040 - 1322636729
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Case studies in intelligent computing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Managing trust in cyberspace
By Sabu M. Thampi, Bharat K. Bhargava and Pradeep K. Atrey
“Managing trust in cyberspace” Metadata:
- Title: Managing trust in cyberspace
- Authors: Sabu M. ThampiBharat K. BhargavaPradeep K. Atrey
- Language: English
- Number of Pages: Median: 492
- Publisher: ➤ Taylor & Francis Group - Taylor & Francis
- Publish Date: 2013 - 2014 - 2018
- Publish Location: Boca Raton
“Managing trust in cyberspace” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Cyberspace - Information technology - Management - Trust - Economic aspects - COMPUTERS / Networking / General - COMPUTERS / Security / General - COMPUTERS / Security / Cryptography - Computer simulation - Open source software - Réseaux d'ordinateurs - Sécurité - Mesures - Technologie de l'information - Gestion - Confiance - Aspect économique - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: OL33541240M - OL31179325M - OL33657464M - OL33663200M - OL34628307M
- Online Computer Library Center (OCLC) ID: 879683579 - 868795580
- Library of Congress Control Number (LCCN): 2013045329
- All ISBNs: ➤ 0429099282 - 1466568445 - 9781306180191 - 1466568453 - 9781466568457 - 1138374776 - 9781466568440 - 9781138374775 - 9780429099281 - 1306180198
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Managing trust in cyberspace at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Introduction to Corrections
By David H. McElreath, Linda Keena, Greg Etter and Ellis Stuart Jr.
“Introduction to Corrections” Metadata:
- Title: Introduction to Corrections
- Authors: David H. McElreathLinda KeenaGreg EtterEllis Stuart Jr.
- Language: English
- Number of Pages: Median: 291
- Publisher: ➤ Taylor & Francis Group - CRC Press LLC
- Publish Date: 2011 - 2012
“Introduction to Corrections” Subjects and Themes:
- Subjects: ➤ Corrections - United states, social conditions - COMPUTERS / Security / General - LAW / Criminal Law / General - LAW / Forensic Science
Edition Identifiers:
- The Open Library ID: OL39307830M - OL39354368M - OL50607027M - OL50572117M - OL34510291M
- Online Computer Library Center (OCLC) ID: 908077545
- All ISBNs: ➤ 9781466538191 - 9781439896389 - 1439860149 - 1439896380 - 9780429252440 - 1466538198 - 0429252447 - 9781439896877 - 9781439860144 - 1439896879
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Introduction to Corrections at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
Wiki
Source: Wikipedia
Wikipedia Results
Search Results from Wikipedia
Computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security
Security hacker
appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts (white hats). A 2014 article noted
Hacker
prototypical computer security hacker had access exclusively to a home computer and a modem. However, since the mid-1990s, with home computers that could
Computer
electronic computers can perform generic sets of operations known as programs, which enable computers to perform a wide range of tasks. The term computer system
List of computer security companies
There are various companies that provide computer security services, develop computer security software or resell software exploits. ADF Solutions Altor
Computer security conference
A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network
Outline of computer security
topical guide to computer security: Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline
Nessus (software)
Project as a free remote security scanner. On October 5 2005, with the release of Nessus 3, the project changed from the GNU General Public License to a proprietary
Computer Security Institute
The Computer Security Institute (CSI) was a professional membership organization serving practitioners of information, network, and computer-enabled physical
Bitdefender
(December 2021). "On the Effectiveness of Ransomware Decryption Tools". Computers & Security. 111. doi:10.1016/j.cose.2021.102469. Retrieved 27 June 2025.{{cite