Explore: Computersicherheit
Discover books, insights, and more — all in one place.
Learn more about Computersicherheit with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “computersicherheit”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Exploding The Phone The Untold Story Of The Teenagers And Outlaws Who Hacked Ma Bell
By Phil Lapsley

“Exploding The Phone The Untold Story Of The Teenagers And Outlaws Who Hacked Ma Bell” Metadata:
- Title: ➤ Exploding The Phone The Untold Story Of The Teenagers And Outlaws Who Hacked Ma Bell
- Author: Phil Lapsley
- Language: English
- Number of Pages: Median: 440
- Publisher: ➤ Grove Press - Grove/Atlantic, Incorporated
- Publish Date: 2013 - 2014
“Exploding The Phone The Untold Story Of The Teenagers And Outlaws Who Hacked Ma Bell” Subjects and Themes:
- Subjects: ➤ AT & T - Telecommunication systems - Counterculture - Telephone companies - Security measures - Telephone systems - American Telephone and Telegraph Company - History - Technology - Computer engineers - Hacker - Entreprises de te��le��phone - Te��le��communications - Computersicherheit - Gegenkultur - Telekommunikation - Mesures de se��curite�� - Histoire - Mesures de su��rete�� - Syste��mes de te��le��communications - AT & T (Firm) - Datenschutz - Computer engineering
Edition Identifiers:
- The Open Library ID: OL26030741M - OL27545574M - OL36201171M
- Online Computer Library Center (OCLC) ID: 873954169 - 805055474
- All ISBNs: ➤ 9780802122285 - 9780802193759 - 0802193757 - 0802122280 - 080212061X - 9780802120618
Author's Alternative Names:
"Philip Lapsley"Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Exploding The Phone The Untold Story Of The Teenagers And Outlaws Who Hacked Ma Bell at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Hack proofing your network
By Ryan Russell

“Hack proofing your network” Metadata:
- Title: Hack proofing your network
- Author: Ryan Russell
- Language: English
- Number of Pages: Median: 450
- Publisher: ➤ Elsevier Science & Technology Books - Syngress Media - Syngress
- Publish Date: 2000
- Publish Location: Rockland
“Hack proofing your network” Subjects and Themes:
- Subjects: ➤ Datensicherung - Computer networks - Computersicherheit - Computer security - Internet - Security measures
Edition Identifiers:
- The Open Library ID: OL35768806M - OL8778485M - OL24929268M
- Online Computer Library Center (OCLC) ID: 247666367
- All ISBNs: 1928994156 - 9781928994152 - 9781597496087 - 1597496081
First Setence:
"Before we launch into the meat of this book, we'd like a chance to explain ourselves."
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hack proofing your network at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Fatal Defect
Chasing Killer Computer Bugs
By Ivars Peterson

“Fatal Defect” Metadata:
- Title: Fatal Defect
- Author: Ivars Peterson
- Languages: ➤ Spanish; Castilian - español, castellano - English
- Number of Pages: Median: 268
- Publisher: ➤ Alianza Editorial Sa - Penguin Random House - Vantage Books - Random House Value Publishing - Vintage Books USA - Times Books - Alianza
- Publish Date: 1995 - 1996 - 1997 - 2001
- Publish Location: New York
“Fatal Defect” Subjects and Themes:
- Subjects: ➤ Computer software, reliability - Computers, reliability - Reliability - Computers - Computer software - Programmfehler - Software - Zuverla ssigkeit - Computersicherheit - Zuverlässigkeit
Edition Identifiers:
- The Open Library ID: ➤ OL7680823M - OL719119M - OL40337526M - OL13193082M - OL1115061M - OL9733992M
- Online Computer Library Center (OCLC) ID: 31604755
- Library of Congress Control Number (LCCN): 94041064 - 97105469
- All ISBNs: ➤ 9780679740278 - 9788420679488 - 0517193353 - 0099197421 - 0812920236 - 9780099197423 - 8420679488 - 9780812920239 - 0679740279 - 9780614126204 - 0614126207 - 9780517193358
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Fatal Defect at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Digital Contagions
A Media Archaeology of Computer Viruses (Digital Formations)
By Jussi Parikka

“Digital Contagions” Metadata:
- Title: Digital Contagions
- Author: Jussi Parikka
- Language: English
- Number of Pages: Median: 327
- Publisher: ➤ Peter Lang Inc., International Academic Publishers - Peter Lang - Brand: Peter Lang International Academic Publishers - Lang AG International Academic Publishers, Peter - Peter Lang Publishing
- Publish Date: 2007
- Publish Location: New York
“Digital Contagions” Subjects and Themes:
- Subjects: ➤ Computer viruses - Computer networks - Security measures - Computer security - Computer networks, security measures - Computer Security - Sécurité informatique - Virus informatiques - Réseaux d'ordinateurs - Sécurité - Mesures - Computersicherheit - Computervirus - Informationsgesellschaft - Neue Medien - Malware - Computervirussen - Culturele aspecten - IT-samhället - Datavirus
Edition Identifiers:
- The Open Library ID: OL11970583M - OL11398295M - OL17852798M
- Online Computer Library Center (OCLC) ID: 255964902 - 84903700
- Library of Congress Control Number (LCCN): 2007006863
- All ISBNs: 1433100932 - 9780820488370 - 9781433100932 - 0820488372
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Digital Contagions at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Hunting Security Bugs
By Tom; Jeffries, Bryan; Landauer, Lawrence Gallagher, Tom Gallagher, Lawrence Landauer and Bryan Jeffries

“Hunting Security Bugs” Metadata:
- Title: Hunting Security Bugs
- Authors: ➤ Tom; Jeffries, Bryan; Landauer, Lawrence GallagherTom GallagherLawrence LandauerBryan Jeffries
- Language: English
- Number of Pages: Median: 592
- Publisher: Microsoft Press
- Publish Date: 2006
- Publish Location: Redmond
“Hunting Security Bugs” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer networks - Testing - Security measures - Computer security - Computer software - Data security & data encryption - General - Computer Data Security - Computers - Computers - General Information - Computer Books: Internet General - Internet - Security - Computers / General - Security - General - Computersicherheit - Softwareentwicklung - Testen
Edition Identifiers:
- The Open Library ID: OL24302146M - OL7891194M
- Online Computer Library Center (OCLC) ID: 85789106
- Library of Congress Control Number (LCCN): 2006927197
- All ISBNs: 073562187X - 9780735621879
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hunting Security Bugs at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Computer and Information Security Handbook
By John R. Vacca

“Computer and Information Security Handbook” Metadata:
- Title: ➤ Computer and Information Security Handbook
- Author: John R. Vacca
- Number of Pages: Median: 1280
- Publisher: Morgan Kaufmann
- Publish Date: 2017
“Computer and Information Security Handbook” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Computer networks - Security measures - Data protection - Rechnernetz - Computersicherheit - Datensicherung - Informationssystem - Datenschutz
Edition Identifiers:
- The Open Library ID: OL26834035M
- Online Computer Library Center (OCLC) ID: 966205097
- Library of Congress Control Number (LCCN): 2016952601
- All ISBNs: 9780128038437 - 0128038438
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer and Information Security Handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Internet and Intranet security
By Rolf Oppliger

“Internet and Intranet security” Metadata:
- Title: Internet and Intranet security
- Author: Rolf Oppliger
- Language: English
- Number of Pages: Median: 403
- Publisher: ➤ Artech House Publishers - Artech House
- Publish Date: 1998 - 2002 - 2007
- Publish Location: Boston - Boston, MA
“Internet and Intranet security” Subjects and Themes:
- Subjects: ➤ Security measures - Intranets (Computer networks) - TCP/IP (Computer network protocol) - Access control - Internet - Computers - Mesures de sécurité - TCP/IP (protocoles de réseaux d'ordinateurs) - Datensicherung - Intranets - Computersicherheit - Sécurité informatique - Intranet - Connexion (informatique)
Edition Identifiers:
- The Open Library ID: OL8780142M - OL695466M - OL22464330M
- Online Computer Library Center (OCLC) ID: 37783068 - 47785638
- Library of Congress Control Number (LCCN): 2001045752 - 97042908
- All ISBNs: 9781580531665 - 1580531660 - 9780890068298 - 0890068291
First Setence:
"The field of computer science is filled with ill-defined terminology used by different persons in conflicting and sometimes even contradictory ways."
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Internet and Intranet security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Developing trust
By Matt Curtin and Peter G. Neumann

“Developing trust” Metadata:
- Title: Developing trust
- Authors: Matt CurtinPeter G. Neumann
- Language: English
- Number of Pages: Median: 293
- Publisher: ➤ Apress - Distributed to the book trade in the United States by Springer-Verlag New York
- Publish Date: 2001 - 2002
- Publish Location: New York, NY - Berkeley, CA
“Developing trust” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Right of Privacy - Security measures - Databases & data structures - Network security - Security - General - Computer Data Security - Computers - Computer - Internet - Computer Books: Database - Networking - General - Internet - Security - Internet, security measures - Computer Security - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - Computersicherheit - Internet
Edition Identifiers:
- The Open Library ID: OL22466534M - OL8720765M
- Online Computer Library Center (OCLC) ID: 48916376
- All ISBNs: 9781893115729 - 1893115720
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Developing trust at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Inside Internet security
By Jeff Crume

“Inside Internet security” Metadata:
- Title: Inside Internet security
- Author: Jeff Crume
- Language: English
- Number of Pages: Median: 270
- Publisher: Addison-Wesley
- Publish Date: 2000
- Publish Location: New York - Harlow, Eng
“Inside Internet security” Subjects and Themes:
- Subjects: ➤ Hacker - Internet - Security measures - Computersicherheit - Internet, security measures - Computer science
Edition Identifiers:
- The Open Library ID: OL24927046M - OL24833160M
- Online Computer Library Center (OCLC) ID: 44101136
- All ISBNs: 0201675161 - 9780201675160
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Inside Internet security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10The Art of Intrusion
By Kevin D. Mitnick and William L. Simon

“The Art of Intrusion” Metadata:
- Title: The Art of Intrusion
- Authors: Kevin D. MitnickWilliam L. Simon
- Language: English
- Number of Pages: Median: 279
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley Pub. - Wiley - John Wiley & Sons, Ltd.
- Publish Date: 2005 - 2009
- Publish Location: New York
“The Art of Intrusion” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer security - Hackers - Hacker - Networking - Computerkriminalität - Security - COMPUTERS - Aspect social - General - Pirates informatiques - Technologie de l'information - Internet - Sécurité informatique - Computersicherheit - Hacking - Computer hackers
Edition Identifiers:
- The Open Library ID: OL39897939M - OL8051417M - OL7621475M - OL24305802M
- Online Computer Library Center (OCLC) ID: 56876941
- Library of Congress Control Number (LCCN): 2004025697
- All ISBNs: ➤ 0470503823 - 0764569597 - 9780470503829 - 9780764589423 - 0471782661 - 0471469947 - 128025257X - 9780471782667 - 9780764569593 - 9781280252570 - 9780471469940 - 0764589423
First Setence:
"There comes a magical gambler's moment when simple thrills magnify to become 3-D fantasies - a moment when greed chews up ethics and the casino system is just another mountain waiting to be conquered."
Author's Alternative Names:
"Kevin David Mitnick", "Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "Kevin MITNICK" and "KD Mitnick"Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Intrusion at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Security Engineering
By Ross J. Anderson

“Security Engineering” Metadata:
- Title: Security Engineering
- Author: Ross J. Anderson
- Language: English
- Number of Pages: Median: 1000
- Publisher: ➤ Wiley Technology Pub. - Wiley Publishing - Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2001 - 2008 - 2010 - 2020 - 2021
- Publish Location: ➤ Indianapolis, IN - Indianapolis - New York
“Security Engineering” Subjects and Themes:
- Subjects: ➤ Electronic data processing - Distributed processing - Computer security - Electronic data processing, distributed processing - Verteiltes System - Monitoring - Criptologia - Computabilidade e complexidade - Redes e comunicação de dados - Traitement réparti - Computerbeveiliging - Beveiliging - Computersicherheit - Sécurité informatique - Geheimschrift - Segurança - Mathematics - IT-säkerhet
Edition Identifiers:
- The Open Library ID: ➤ OL39891943M - OL39883567M - OL35836994M - OL29490753M - OL29509472M - OL29509478M - OL24930003M - OL7616327M - OL18632587M - OL18844972M - OL18893289M - OL31957243M - OL29057215M - OL29057030M - OL29057006M - OL9387958M
- Online Computer Library Center (OCLC) ID: 192045774 - 45393984
- Library of Congress Control Number (LCCN): 2008006392 - 00068486
- All ISBNs: ➤ 9780470068526 - 9781118008362 - 1118008375 - 0470068523 - 1119644682 - 1118008383 - 9780470313114 - 1119642787 - 9781119642831 - 1119642833 - 1282822942 - 0471389226 - 9781118008386 - 9781119642817 - 9780471389224 - 1118008367 - 0470313110 - 1119642817 - 9781118008379 - 9781119642787 - 9781119644682 - 9781282822948
First Setence:
"For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters."
"Security engineering is about building systems to remain dependable in the face of malice, error, or mischance."
Author's Alternative Names:
"Ross John Anderson" and "Ross Anderson"Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security Engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Information Security
By Mark Stamp

“Information Security” Metadata:
- Title: Information Security
- Author: Mark Stamp
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons Canada, Limited, John - John Wiley & Sons, Ltd. - Wiley-Interscience - Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 2005 - 2006 - 2007 - 2011 - 2021 - 2022
- Publish Location: Hoboken, N.J - New York
“Information Security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer security - Nonfiction - Electronic data processing departments, security measures - Sécurité informatique - Ordinateurs - Accès - Contrôle - Logiciels - Protection - Protocoles de réseaux d'ordinateurs - Sécurité - Mesures - Cryptographie - Databescherming - Informatiesystemen - Computersicherheit - Datensicherung - Kommunikationsprotokoll - Kryptologie - Malware - Zugriffskontrolle - Data protection - Computer Security - Qa76.9.a25 s69 2006 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL48712508M - OL48647918M - OL39897508M - OL34977085M - OL33919263M - OL33919251M - OL33642192M - OL29229520M - OL29065438M - OL29065437M - OL9527643M - OL7620834M - OL24253402M - OL15978508M
- Online Computer Library Center (OCLC) ID: 57754240 - 85820655
- Library of Congress Control Number (LCCN): 2005005152
- All ISBNs: ➤ 1119505879 - 1119505887 - 1118027965 - 9781119505891 - 1283138875 - 1119505895 - 9780471744184 - 0470242442 - 9781283138871 - 9781280241444 - 0471744190 - 9780470242445 - 0471738484 - 1118027957 - 1280241446 - 1118027973 - 9781119505907 - 9781118027967 - 9780471738480 - 9781118027974 - 1119505909 - 0471744182 - 9781118027950 - 9781119505884 - 9781119505877 - 9780471744191
First Setence:
"The basic terminology of crypto includes the following."
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Cryptography engineering
Design Principles and Practical Applications
By Niels Ferguson, Bruce Schneier and Tadayoshi Kohno

“Cryptography engineering” Metadata:
- Title: Cryptography engineering
- Authors: Niels FergusonBruce SchneierTadayoshi Kohno
- Language: English
- Number of Pages: Median: 384
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - Wiley Pub., inc. - Wiley
- Publish Date: ➤ 2010 - 2011 - 2012 - 2014 - 2015
- Publish Location: Indianapolis, IN
“Cryptography engineering” Subjects and Themes:
- Subjects: ➤ Cryptography - Computer security - COMPUTERS - Security - Computersicherheit - Kryptologie - Methoden und Technik - Kryptologi - Kryptering - IT-säkerhet - General - Professional, career & trade -> computer science -> security - Long Now Manual for Civilization
Edition Identifiers:
- The Open Library ID: ➤ OL39902730M - OL34527035M - OL31909494M - OL29132490M - OL29074278M - OL29070153M - OL25280298M
- Online Computer Library Center (OCLC) ID: 806039884
- Library of Congress Control Number (LCCN): 2010920648
- All ISBNs: ➤ 1283592304 - 9781118082102 - 9781118080917 - 9780470474242 - 9781118722367 - 0470474246 - 9781283592307 - 1118722361 - 1118080912 - 9781118502822 - 1118082109 - 978111808091 - 1118502825
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cryptography engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Threat modeling
By Adam Shostack

“Threat modeling” Metadata:
- Title: Threat modeling
- Author: Adam Shostack
- Language: English
- Number of Pages: Median: 624
- Publisher: ➤ Wiley - Wiley & Sons, Incorporated, John
- Publish Date: 2014
“Threat modeling” Subjects and Themes:
- Subjects: ➤ Development - Computer networks - Security measures - Computer security - Computer software - Computer networks / Security measures - Computer software / Development - Computersicherheit - Software Engineering
Edition Identifiers:
- The Open Library ID: OL39923415M - OL27158675M - OL29177482M - OL29177490M
- Online Computer Library Center (OCLC) ID: 855043351 - 875668750
- Library of Congress Control Number (LCCN): 2013954095
- All ISBNs: ➤ 9781118810057 - 9781118822692 - 9781306427067 - 1118809998 - 1118822692 - 9781118809990 - 1306427061 - 1118810058
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Threat modeling at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Cybersecurity Ethics
By Mary Manjikian
“Cybersecurity Ethics” Metadata:
- Title: Cybersecurity Ethics
- Author: Mary Manjikian
- Language: English
- Number of Pages: Median: 246
- Publisher: ➤ Taylor & Francis Group - RoutledgeFalmer
- Publish Date: 2017 - 2022 - 2023
“Cybersecurity Ethics” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Internet - Computer crimes - Moral and ethical aspects - Computer networks - Security measures - BUSINESS & ECONOMICS - Business Ethics - Informationstechnik - Computersicherheit - Ethik
Edition Identifiers:
- The Open Library ID: ➤ OL28844917M - OL33757188M - OL46075323M - OL39644779M - OL46072560M - OL33592139M - OL33563193M - OL39658564M - OL39644762M - OL33580144M - OL28864084M
- Online Computer Library Center (OCLC) ID: 1023802306
- All ISBNs: ➤ 1138717525 - 9781000828207 - 9781351766555 - 1000828204 - 1315196271 - 9781351766562 - 1138717495 - 9781032164991 - 9781032164977 - 1351766562 - 1003248829 - 9781003248828 - 1032164999 - 9781000828252 - 1032164972 - 1351766554 - 9781138717497 - 9781138717527 - 9781351766548 - 1000828255 - 9781315196275 - 1351766546
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cybersecurity Ethics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Future crimes
By Marc Goodman

“Future crimes” Metadata:
- Title: Future crimes
- Author: Marc Goodman
- Language: English
- Number of Pages: Median: 392
- Publisher: Doubleday
- Publish Date: 2015
“Future crimes” Subjects and Themes:
- Subjects: ➤ Moral and ethical aspects - Computer crimes - Prevention - Computer security - Technological innovations - Data protection - nyt:business-books=2015-03-08 - New York Times bestseller - Technische Innovation - Computersicherheit - Datensicherung - Kriminalität - Data processing - Ethical aspects
Edition Identifiers:
- The Open Library ID: OL27173287M
- Online Computer Library Center (OCLC) ID: 893857964
- Library of Congress Control Number (LCCN): 2014038053
- All ISBNs: 9780385539005 - 0385539002
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Future crimes at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Cyber-Security and Threat Politics
By Myriam Dunn Cavelty

“Cyber-Security and Threat Politics” Metadata:
- Title: ➤ Cyber-Security and Threat Politics
- Author: Myriam Dunn Cavelty
- Language: English
- Number of Pages: Median: 192
- Publisher: ➤ Taylor & Francis Group - Routledge
- Publish Date: 2007 - 2009
- Publish Location: ➤ New York - Milton Park, Abingdon, Oxon
“Cyber-Security and Threat Politics” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Government policy - National security - Security measures - Threats - Computer networks, security measures - National security, united states - United states, politics and government - Extortion - Datensicherung - Innere Sicherheit - Internet - Computersicherheit - Sécurité informatique - Politique gouvernementale - Menaces - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Security - Networking - General
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL54025632M - OL33738738M - OL33577494M - OL33577422M - OL33462383M - OL28748737M - OL10206162M - OL17963098M
- Online Computer Library Center (OCLC) ID: 255479949 - 183601162 - 137331503
- Library of Congress Control Number (LCCN): 2007022679
- All ISBNs: ➤ 1134086652 - 9781134086672 - 9781134086658 - 9781134086702 - 9780415429818 - 9781134086696 - 9781281063908 - 1134086679 - 1281063908 - 1134086709 - 9780415569880 - 0415429811 - 1134086695 - 0415569885
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber-Security and Threat Politics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Firewalls for dummies
By Brian Komar

“Firewalls for dummies” Metadata:
- Title: Firewalls for dummies
- Author: Brian Komar
- Language: English
- Number of Pages: Median: 383
- Publisher: ➤ John Wiley & Sons, Ltd. - Hungry Minds - Transworld
- Publish Date: 2001 - 2003
- Publish Location: London - New York
“Firewalls for dummies” Subjects and Themes:
- Subjects: ➤ Firewalls (Computer security) - Computer Technology - Nonfiction - Computer programming - Computersicherheit - Firewall - Internet
Edition Identifiers:
- The Open Library ID: OL24287445M - OL3958023M
- Online Computer Library Center (OCLC) ID: 48023143
- Library of Congress Control Number (LCCN): 2001091984
- All ISBNs: 0764544284 - 9780764508844 - 9780764544286 - 0764508849
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Firewalls for dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Computer forensics
By Warren G. Kruse, Warren G. Kruse II and Jay G. Heiser

“Computer forensics” Metadata:
- Title: Computer forensics
- Authors: Warren G. KruseWarren G. Kruse IIJay G. Heiser
- Language: English
- Number of Pages: Median: 407
- Publisher: ➤ Addison-Wesley - Addison-Wesley Professional - Pearson Education, Limited
- Publish Date: 2001 - 2002 - 2020
- Publish Location: London - Boston, MA
“Computer forensics” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Forensic sciences - Computer security - Computer networks, security measures - Digital forensic science - Computerkriminalität - Computersicherheit - Rechnernetz - Computer networks--security measures
Edition Identifiers:
- The Open Library ID: OL28972028M - OL7408562M - OL18481564M - OL22070291M
- Online Computer Library Center (OCLC) ID: 738406399 - 52815421
- Library of Congress Control Number (LCCN): 00103410 - 2001034106
- All ISBNs: 0201707195 - 0321304535 - 9780321304537 - 9780201707199
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer forensics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Forbidden Code
By Jon Erickson

“Forbidden Code” Metadata:
- Title: Forbidden Code
- Author: Jon Erickson
- Language: ger
- Number of Pages: Median: 282
- Publisher: mitp-Verlag
- Publish Date: 2004 - 2006
- Publish Location: Bonn, Germany
“Forbidden Code” Subjects and Themes:
- Subjects: ➤ computer security - hacker - networks - computer - Netzwerk - Computersicherheit
Edition Identifiers:
- The Open Library ID: OL24636543M - OL26764469M
- All ISBNs: 3826614577 - 3826616677 - 9783826616679 - 9783826614576
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Forbidden Code at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Inside cyber warfare
By Jeffrey Carr

“Inside cyber warfare” Metadata:
- Title: Inside cyber warfare
- Author: Jeffrey Carr
- Language: English
- Number of Pages: Median: 265
- Publisher: ➤ O'Reilly Media, Incorporated - O'Reilly Media, Inc.
- Publish Date: 2009 - 2010 - 2011
- Publish Location: Sebastopol, Calif
“Inside cyber warfare” Subjects and Themes:
- Subjects: ➤ Cyberterrorism - Terrorism - Computer crimes - Information warfare - Databrott - Computerkriminalität - Computersicherheit - Society - Computer security - Terrorismus - Hackers
Edition Identifiers:
- The Open Library ID: OL36712771M - OL36706426M - OL29138992M - OL24480333M
- Online Computer Library Center (OCLC) ID: 606556225 - 495466713
- Library of Congress Control Number (LCCN): 2010282512
- All ISBNs: ➤ 9780596802158 - 1306812526 - 0596802153 - 1449389171 - 1449325467 - 9781449325466 - 9781449389178 - 9781306812528
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Inside cyber warfare at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Cloud security and privacy
By Tim Mather

“Cloud security and privacy” Metadata:
- Title: Cloud security and privacy
- Author: Tim Mather
- Language: English
- Number of Pages: Median: 312
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated
- Publish Date: 2009
- Publish Location: Beijing - Cambridge [Mass.]
“Cloud security and privacy” Subjects and Themes:
- Subjects: ➤ Sicherheitsmassnahme - Computer networks - Cloud computing - Security measures - Cloud Computing - Computersicherheit
Edition Identifiers:
- The Open Library ID: OL45224699M - OL36797501M - OL36717687M - OL36706410M - OL24792190M
- Online Computer Library Center (OCLC) ID: 419866951 - 496000431
- Library of Congress Control Number (LCCN): 2010281455
- All ISBNs: ➤ 9780596802769 - 0596806450 - 1449379516 - 9781306809191 - 9781449391881 - 0596802765 - 9781449379513 - 9780596806453 - 1306809193 - 1449391885
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cloud security and privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23SSH, the Secure Shell
The Definitive Guide
By Daniel J. Barret, Richard E. Silverman and Daniel J. Barrett

“SSH, the Secure Shell” Metadata:
- Title: SSH, the Secure Shell
- Authors: Daniel J. BarretRichard E. SilvermanDaniel J. Barrett
- Languages: English - ger
- Number of Pages: Median: 575
- Publisher: ➤ O'Reilly Media, Incorporated - O’Reilly Media - O'Reilly Media
- Publish Date: 2001 - 2002 - 2005 - 2009
- Publish Location: ➤ Tokyo - Taipei - Cambridge - Sebastopol - Paris - Beijing - Farnham - Köln
“SSH, the Secure Shell” Subjects and Themes:
- Subjects: ➤ SSH - Rechnernetz - (Informatik) - Protokoll - Protokoll (Informatik) - Computersicherheit - UNIX Shells - Computer networks - Security measures - Data encryption (Computer science) - Data encryption (computer science) - Unix shells (computer programs) - Computer networks, security measures - Computer networks--security measures - Qa76.76.o63 b369 2001 - 005.8
Edition Identifiers:
- The Open Library ID: OL36711711M - OL31946506M - OL7580870M - OL7581190M - OL25539589M
- Online Computer Library Center (OCLC) ID: 45835584 - 76334897
- Library of Congress Control Number (LCCN): 2001021089 - 2005283598
- All ISBNs: ➤ 9780596522384 - 0596000111 - 9780596008956 - 3897212870 - 0596008953 - 9780596556792 - 9783897212879 - 0596556799 - 059652238X - 9780596000110
First Setence:
"Der Schutz der Privatsphäre ist ein Grundrecht des Menschen."
"Privacy is a basic human right, but on today’s computer networks, privacy isn’t guaranteed."
"Let’s start with the basics."
Author's Alternative Names:
"Daniel j Barrett"Access and General Info:
- First Year Published: 2001
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find SSH, the Secure Shell at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Cyberthreats and the Decline of the Nation-State
By Susan W. Brenner
“Cyberthreats and the Decline of the Nation-State” Metadata:
- Title: ➤ Cyberthreats and the Decline of the Nation-State
- Author: Susan W. Brenner
- Language: English
- Number of Pages: Median: 177
- Publisher: ➤ Routledge - Taylor & Francis Group
- Publish Date: 2014 - 2016
“Cyberthreats and the Decline of the Nation-State” Subjects and Themes:
- Subjects: ➤ Terrorism, prevention - Computer networks, law and legislation - Computer crimes - National security - Cyberterrorism - Computer networks - Law and legislation - Criminal provisions - Prevention - Investigation - Bekämpfung - Computerkriminalität - Computersicherheit - Information warfare - Innere Sicherheit - Recht
Edition Identifiers:
- The Open Library ID: ➤ OL46053383M - OL28846224M - OL35500345M - OL53928062M - OL35531977M - OL28791619M - OL54028834M
- Online Computer Library Center (OCLC) ID: 858749612
- Library of Congress Control Number (LCCN): 2013036774
- All ISBNs: ➤ 9781134443963 - 9780415823760 - 9781134443826 - 9781138204492 - 1306505410 - 9781306505413 - 0415823765 - 1134443897 - 9780203709207 - 0203709209 - 113444396X - 113444382X - 1138204498 - 9781134443895
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cyberthreats and the Decline of the Nation-State at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Intercept
By Gordon Corera

“Intercept” Metadata:
- Title: Intercept
- Author: Gordon Corera
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ Orion Publishing Group, Limited
- Publish Date: 2015 - 2016
“Intercept” Subjects and Themes:
- Subjects: ➤ Espionage, british - Internet - Information warfare - Computer crimes - History - Electronic intelligence - Internet in espionage - Cyber intelligence (Computer security) - Security measures - Criminalité informatique - Histoire - Renseignement électronique - Internet dans l'espionnage - Surveillance des menaces informatiques - Sécurité - Mesures - Spionage - Computerkriminalität - Computersicherheit
Edition Identifiers:
- The Open Library ID: OL29307674M - OL48159409M - OL34609291M
- Online Computer Library Center (OCLC) ID: 912238357
- All ISBNs: ➤ 9780297871736 - 0297871730 - 0297609459 - 1780227841 - 9780297609452 - 9781780227849
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Intercept at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Protecting Information Assets and It Infrastructure in the Cloud
By Ravi Das

“Protecting Information Assets and It Infrastructure in the Cloud” Metadata:
- Title: ➤ Protecting Information Assets and It Infrastructure in the Cloud
- Author: Ravi Das
- Language: English
- Number of Pages: Median: 300
- Publisher: ➤ Taylor & Francis Group - Auerbach Publishers, Incorporated - CRC Press
- Publish Date: 2019 - 2023
“Protecting Information Assets and It Infrastructure in the Cloud” Subjects and Themes:
- Subjects: ➤ Cloud computing - Computer networks, security measures - Security measures - Computer networks - Infonuagique - Sécurité - Mesures - Réseaux d'ordinateurs - COMPUTERS / Computer Literacy - COMPUTERS / Computer Science - COMPUTERS / Data Processing - COMPUTERS / Hardware / General - COMPUTERS / Information Technology - COMPUTERS / Machine Theory - COMPUTERS / Reference - Cloud Computing - Computersicherheit - Datensicherung
Edition Identifiers:
- The Open Library ID: ➤ OL46071112M - OL34657133M - OL34748442M - OL49264576M - OL34724772M - OL49268561M
- Online Computer Library Center (OCLC) ID: 1098226690 - 1079848204
- Library of Congress Control Number (LCCN): 2019018387 - 2019016186
- All ISBNs: ➤ 1032605405 - 9780429523724 - 9781032605104 - 0429523726 - 1138393320 - 9781032605401 - 9781138393325 - 1032475617 - 9781032475615 - 0429537190 - 1032605103 - 9780429537196
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Protecting Information Assets and It Infrastructure in the Cloud at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Security and Usability
By Lorrie Faith Cranor and Simson Garfinkel

“Security and Usability” Metadata:
- Title: Security and Usability
- Authors: Lorrie Faith CranorSimson Garfinkel
- Language: English
- Number of Pages: Median: 726
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated - O'Reilly Media, Inc.
- Publish Date: 2005
- Publish Location: Beijing - Sebastapol, CA
“Security and Usability” Subjects and Themes:
- Subjects: ➤ Computer security - Logiciels - Cryptographie - Systèmes informatiques - Computersicherheit - Facteurs humains - Protection de l'information (informatique) - Mesures de sûreté - Mesures - Sécurité - General - Viruses - Com053000 - Cs.cmp_sc.app_sw - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: OL36803478M - OL17924344M - OL36712804M - OL7581154M - OL36707438M
- Online Computer Library Center (OCLC) ID: 61701862
- Library of Congress Control Number (LCCN): 2006271007
- All ISBNs: ➤ 0596008279 - 9780596008277 - 9780596514891 - 9781306815468 - 0596553854 - 1306815460 - 0596514891 - 9780596553852
Author's Alternative Names:
"Simson L. Garfinkel" and "Lorrie Cranor"Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security and Usability at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Database Nation <i>(Hardback)</i>
By Simson Garfinkel

“Database Nation <i>(Hardback)</i>” Metadata:
- Title: ➤ Database Nation <i>(Hardback)</i>
- Author: Simson Garfinkel
- Language: English
- Number of Pages: Median: 319
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated - O'Reilly Media, Inc.
- Publish Date: 2000 - 2001 - 2008
- Publish Location: Cambridge - Beijing
“Database Nation <i>(Hardback)</i>” Subjects and Themes:
- Subjects: ➤ Privacy, Right of - Privatheit - Informationsgesellschaft - Right of Privacy - Computersicherheit - Privatsphäre - Sécurité informatique - Computer security - Droit à la vie privée - Datenschutz - Law and legislation - Data protection - Gefährdung - New York Times reviewed - POLITICAL SCIENCE - Political Freedom & Security - Civil Rights - Human Rights - Social aspects - General - Security - Databases - Viruses - Com060040 - Cs.cmp_sc.app_sw.db - Cs.cmp_sc.intrn_www - Cs.cmp_sc.secur
- Places: United States - États-Unis
Edition Identifiers:
- The Open Library ID: ➤ OL8667326M - OL36807694M - OL36704156M - OL36712686M - OL15471435M - OL36803508M - OL7580901M
- Online Computer Library Center (OCLC) ID: 44964667 - 42888119
- Library of Congress Control Number (LCCN): 2001021108 - 99058637
- All ISBNs: ➤ 0596150121 - 0596106327 - 9780596106324 - 9780596804527 - 0596001053 - 9781306817684 - 9780596550646 - 1306817684 - 0596550642 - 9780596150129 - 0596804520 - 9781565926530 - 1565926536 - 9780596001056
Author's Alternative Names:
"Simson L. Garfinkel"Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Database Nation <i>(Hardback)</i> at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Mechanics of user identification and authentication
By Dobromir Todorov

“Mechanics of user identification and authentication” Metadata:
- Title: ➤ Mechanics of user identification and authentication
- Author: Dobromir Todorov
- Language: English
- Number of Pages: Median: 744
- Publisher: ➤ Auerbach Publications - Auerbach Pub - Auerbach Publishers, Incorporated - Taylor and Francis - AUERBACH
- Publish Date: 2007
- Publish Location: London - Boca Raton, FL
“Mechanics of user identification and authentication” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer networks - Security measures - Computers - Access control - Computer security - Computer networks, security measures - Computers, access control - Authentication - Computer Security - Réseaux d'ordinateurs - Sécurité - Mesures - Ordinateurs - Accès - Contrôle - Sécurité informatique - Systèmes d'exploitation (Ordinateurs) - Authentification - COMPUTERS - Internet - Security - Networking - General - Authentifikation - Computersicherheit - Zugriffskontrolle
Edition Identifiers:
- The Open Library ID: OL37980829M - OL37950430M - OL8484655M - OL22757383M - OL24278188M
- Online Computer Library Center (OCLC) ID: 263353270 - 77716961
- Library of Congress Control Number (LCCN): 2007060355
- All ISBNs: ➤ 9780429133138 - 1466546689 - 0429133138 - 9781420052206 - 1420052209 - 9781420052190 - 1420052195 - 9781466546684
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mechanics of user identification and authentication at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Information security policies, procedures, and standards
Guidelines for Effective Information Security Management
By Thomas R. Peltier

“Information security policies, procedures, and standards” Metadata:
- Title: ➤ Information security policies, procedures, and standards
- Author: Thomas R. Peltier
- Language: English
- Number of Pages: Median: 297
- Publisher: ➤ Taylor & Francis Group - Auerbach Publishers, Incorporated - Taylor and Francis - AUERBACH - Auerbach
- Publish Date: 2001 - 2002 - 2010 - 2016
- Publish Location: London - Boca Raton, FL
“Information security policies, procedures, and standards” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Computer Technology - Nonfiction - Sécurité informatique - Protection de l'information (Informatique) - COMPUTERS - Internet - Security - Networking - General - Datenschutz - Computersicherheit
Edition Identifiers:
- The Open Library ID: ➤ OL37978475M - OL37950426M - OL33483859M - OL24259867M - OL8258921M - OL22466566M
- Online Computer Library Center (OCLC) ID: 61106746
- Library of Congress Control Number (LCCN): 2001045194
- All ISBNs: ➤ 0429114710 - 9781466525023 - 9780849311376 - 9780429114717 - 0849311373 - 084939032X - 1281122289 - 9781281122285 - 1466525029 - 9780849390326
First Setence:
"The purpose of information protection is to protect the valuable resources of an organization, such as information, hardware, and software."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security policies, procedures, and standards at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31The Mac hacker's handbook
By Miller, Charles and Dino Dai Zovi

“The Mac hacker's handbook” Metadata:
- Title: The Mac hacker's handbook
- Authors: Miller, CharlesDino Dai Zovi
- Language: English
- Number of Pages: Median: 384
- Publisher: ➤ Wiley - Wiley & Sons, Incorporated, John
- Publish Date: 2009 - 2011
- Publish Location: Indianapolis, IN
“The Mac hacker's handbook” Subjects and Themes:
- Subjects: ➤ Computersicherheit - Mac OS - MacOS X. - Computer security - Macintosh - Macintosh (computer)
Edition Identifiers:
- The Open Library ID: OL33390987M - OL29074247M - OL29027854M - OL39889450M - OL25067695M
- Online Computer Library Center (OCLC) ID: 860805523 - 267187484
- Library of Congress Control Number (LCCN): 2011283731
- All ISBNs: ➤ 9781282114395 - 9780470481479 - 0470481471 - 9781118080337 - 111808182X - 9781118081822 - 0470395362 - 1282114395 - 1118080335 - 9780470395363
Author's Alternative Names:
"Zero Day Charlie", "Charlie Miller American computer security researcher", "Miller, Charlie.", "Miller, Charlie 1971-", "Charles Alfred Miller" and "Miller, Charles Alfred"Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Mac hacker's handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Carry On
By Bruce Schneier

“Carry On” Metadata:
- Title: Carry On
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 384
- Publisher: ➤ Wiley & Sons, Incorporated, John - John Wiley & Sons, Inc.
- Publish Date: 2013 - 2014
- Publish Location: Indianapolis, IN, USA
“Carry On” Subjects and Themes:
- Subjects: Security systems - Terrorism - Case studies - Computersicherheit
Edition Identifiers:
- The Open Library ID: OL29168451M - OL29168450M - OL26227754M
- Online Computer Library Center (OCLC) ID: 878078179
- Library of Congress Control Number (LCCN): 2013954201
- All ISBNs: ➤ 1118790839 - 9781118790823 - 9781118790816 - 1118790812 - 9781118790830 - 1118790820
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Carry On at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Mobile Device Security For Dummies
By Subbu Iyer

“Mobile Device Security For Dummies” Metadata:
- Title: ➤ Mobile Device Security For Dummies
- Author: Subbu Iyer
- Language: English
- Number of Pages: Median: 408
- Publisher: ➤ Wiley & Sons Canada, Limited, John - For Dummies - Wiley & Sons, Incorporated, John
- Publish Date: 2011
“Mobile Device Security For Dummies” Subjects and Themes:
- Subjects: ➤ Smartphones - Datensicherung - Mobilfunk - Mobile computing - Computersicherheit - Computer security - Kommunikationssystem - Security measures
Edition Identifiers:
- The Open Library ID: OL33396382M - OL39874870M - OL48629515M - OL26152690M - OL33413008M
- Online Computer Library Center (OCLC) ID: 876268646
- Library of Congress Control Number (LCCN): 2011932276
- All ISBNs: ➤ 9780470927533 - 9781283257848 - 1118093798 - 0470927534 - 9781118093795 - 9781118093801 - 9781118093993 - 1118093992 - 128325784X - 1118093801
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mobile Device Security For Dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Der IT Security Manager
By Heinrich Kersten, Gerhard Klett and Klaus-Dieter Wolfenstetter

“Der IT Security Manager” Metadata:
- Title: Der IT Security Manager
- Authors: Heinrich KerstenGerhard KlettKlaus-Dieter Wolfenstetter
- Language: ger
- Number of Pages: Median: 252
- Publisher: ➤ Vieweg Verlag, Friedr, & Sohn Verlagsgesellschaft mbH - Springer Fachmedien Wiesbaden GmbH - Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH - Vieweg + Teubner
- Publish Date: 2008 - 2009 - 2012 - 2015
- Publish Location: Wiesbaden
“Der IT Security Manager” Subjects and Themes:
- Subjects: Datensicherung - Unternehmen - Computersicherheit
Edition Identifiers:
- The Open Library ID: OL37151997M - OL37190074M - OL37202431M - OL37249318M - OL27030300M
- Online Computer Library Center (OCLC) ID: 244014066
- All ISBNs: ➤ 3658099747 - 3834882879 - 3834804290 - 3834892394 - 9783834804297 - 9783658099749 - 9783834882875 - 9783658099732 - 9783834892393 - 3658099739
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Der IT Security Manager at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Information security architecture
By Jan Killmeyer Tudor

“Information security architecture” Metadata:
- Title: ➤ Information security architecture
- Author: Jan Killmeyer Tudor
- Language: English
- Number of Pages: Median: 381
- Publisher: ➤ Auerbach Publications - Brand: Auerbach Publications - Taylor & Francis Group - Auerbach
- Publish Date: 2000 - 2001 - 2006 - 2010
- Publish Location: Boca Raton, FL
“Information security architecture” Subjects and Themes:
- Subjects: Computer architecture - Computer security - Computersicherheit - Computers, access control - Information science
Edition Identifiers:
- The Open Library ID: OL33454557M - OL33448761M - OL6785992M - OL22570481M - OL22344354M
- Library of Congress Control Number (LCCN): 00040399 - 2006273982
- All ISBNs: ➤ 0849399882 - 1280536942 - 9781280536946 - 9780849315497 - 0849315492 - 9780849399886 - 1280651202 - 9781280651205
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security architecture at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Sicherheit und Kryptographie im Internet
By Jörg Schwenk

“Sicherheit und Kryptographie im Internet” Metadata:
- Title: ➤ Sicherheit und Kryptographie im Internet
- Author: Jörg Schwenk
- Language: ger
- Number of Pages: Median: 366
- Publisher: ➤ Vieweg Verlag, Friedr, & Sohn Verlagsgesellschaft mbH - Springer Vieweg - Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH - Vieweg + Teubner
- Publish Date: 2010 - 2012 - 2014 - 2020
- Publish Location: Wiesbaden
“Sicherheit und Kryptographie im Internet” Subjects and Themes:
- Subjects: Datensicherung - Kryptologie - Computersicherheit - Rechnernetz - Internet
Edition Identifiers:
- The Open Library ID: ➤ OL51067088M - OL51030380M - OL51026056M - OL29615703M - OL28213052M - OL27087498M
- Online Computer Library Center (OCLC) ID: 631717519
- All ISBNs: ➤ 3658292598 - 9783658065447 - 3834808148 - 9783658292591 - 3658065435 - 9783322953216 - 9783834896650 - 3322953211 - 3834896659 - 3658065443 - 9783658065430 - 9783834808141
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Sicherheit und Kryptographie im Internet at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Fundamentals of network security
By Eric Maiwald

“Fundamentals of network security” Metadata:
- Title: ➤ Fundamentals of network security
- Author: Eric Maiwald
- Language: English
- Number of Pages: Median: 645
- Publisher: ➤ McGraw-Hill Technology Education
- Publish Date: 2004
- Publish Location: New York
“Fundamentals of network security” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer networks, security measures - Computersicherheit - Rechnernetz
Edition Identifiers:
- The Open Library ID: OL3320605M
- Online Computer Library Center (OCLC) ID: 54498362
- Library of Congress Control Number (LCCN): 2004272654
- All ISBNs: 9780072230932 - 0072230932
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Fundamentals of network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Mobile device security
By Stephen Fried

“Mobile device security” Metadata:
- Title: Mobile device security
- Author: Stephen Fried
- Language: English
- Number of Pages: Median: 274
- Publisher: ➤ Auerbach Publications - CRC Press
- Publish Date: 2010
- Publish Location: Boca Raton, FL
“Mobile device security” Subjects and Themes:
- Subjects: ➤ Mobile communication systems - Security measures - Data protection - Computer security - Mobile Telekommunikation - Datasäkerhet - Computersicherheit
Edition Identifiers:
- The Open Library ID: OL24033683M - OL24044967M - OL24002608M
- Online Computer Library Center (OCLC) ID: 466360799
- Library of Congress Control Number (LCCN): 2009052612
- All ISBNs: 1439820163 - 9781439820162
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mobile device security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39The myths of security
By John Viega

“The myths of security” Metadata:
- Title: The myths of security
- Author: John Viega
- Language: English
- Number of Pages: Median: 238
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated
- Publish Date: 2009
- Publish Location: Cambridge - Beijing [China]
“The myths of security” Subjects and Themes:
- Subjects: ➤ Computer security - Security measures - Data protection - Internet industry - Computersicherheit - General - Security - Viruses - Com060040 - Cs.cmp_sc.app_sw - Cs.cmp_sc.intrn_www - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: OL36795926M - OL36712723M - OL36707509M - OL24385395M
- Online Computer Library Center (OCLC) ID: 599824342 - 263978539
- Library of Congress Control Number (LCCN): 2010286045
- All ISBNs: ➤ 9780596555832 - 9781306814430 - 059655124X - 9780596551247 - 9780596523022 - 0596523025 - 130681443X - 0596555830
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The myths of security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Hacking Windows Vista
By Steve Sinchak

“Hacking Windows Vista” Metadata:
- Title: Hacking Windows Vista
- Author: Steve Sinchak
- Language: English
- Number of Pages: Median: 316
- Publisher: ➤ Wiley - John Wiley & Sons, Ltd. - Wiley Technology Pub.
- Publish Date: 2007
- Publish Location: Indianapolis, IN - New York
“Hacking Windows Vista” Subjects and Themes:
- Subjects: ➤ Computer Technology - Microsoft Windows (Computer file) - Nonfiction - Operating systems (Computers) - Hacker - Computerkriminalitat - Windows Vista - Operativsystem - Computersicherheit - Konfiguration - Tuning - Microsoft windows (computer program) - Computer security
Edition Identifiers:
- The Open Library ID: OL17891496M - OL7595259M - OL24247535M
- Library of Congress Control Number (LCCN): 2007014921
- All ISBNs: 0470046872 - 0470179058 - 9780470046876 - 9780470179055
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacking Windows Vista at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Googling security
By Greg Conti

“Googling security” Metadata:
- Title: Googling security
- Author: Greg Conti
- Language: English
- Number of Pages: Median: 332
- Publisher: ➤ Pearson Education, Limited - Addison-Wesley - Addison-Wesley Professional
- Publish Date: 2008 - 2009
- Publish Location: Upper Saddle River, NJ
“Googling security” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Google - Google (Firm) - Security measures - Rechnernetz - Computersicherheit - IT-sakerhet - Sakerhetsaspekter - Internet - Datenschutz - Google Inc - Sicherheitsmassnahme - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL23131985M - OL17010291M - OL35569168M
- Online Computer Library Center (OCLC) ID: 233547809
- Library of Congress Control Number (LCCN): 2008032687
- All ISBNs: 9780321564337 - 0321518667 - 0321564332 - 9780321518668
Author's Alternative Names:
"Gregory J. Conti"Access and General Info:
- First Year Published: 2008
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Googling security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Software Forensics
By Robert Slade

“Software Forensics” Metadata:
- Title: Software Forensics
- Author: Robert Slade
- Language: English
- Number of Pages: Median: 215
- Publisher: McGraw-Hill Professional
- Publish Date: 2004
“Software Forensics” Subjects and Themes:
- Subjects: ➤ Forensic sciences - Computer security - Datensicherung - Beweismittel - Data protection - Computersicherheit - Computer viruses
Edition Identifiers:
- The Open Library ID: OL9254917M - OL7300240M
- Library of Congress Control Number (LCCN): 2003070176
- All ISBNs: 9780071428040 - 0071428046
First Setence:
"You find an unknown file on a system for which you are responsible."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Software Forensics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Computer security
By John Millar Carroll

“Computer security” Metadata:
- Title: Computer security
- Author: John Millar Carroll
- Language: English
- Number of Pages: Median: 446
- Publisher: ➤ Butterworth-Heinemann - Security World Pub. Co. - Butterworths
- Publish Date: 1977 - 1987 - 1996
- Publish Location: ➤ Boston - Boston, Mass - Los Angeles
“Computer security” Subjects and Themes:
- Subjects: ➤ Computer crimes - Computer security - Electronic data processing departments - Security measures - Computers - Access control - Computerkriminalitat - Crimes par ordinateur - Surete - Securite informatique - Computersicherheit - Systemes informatiques - Mesures - Electronic data processing departments, security measures
Edition Identifiers:
- The Open Library ID: OL1273388M - OL4543361M - OL2735517M
- Online Computer Library Center (OCLC) ID: 262587274
- Library of Congress Control Number (LCCN): 86029901 - 77010615 - 95004797
- All ISBNs: ➤ 9780913708286 - 9780409900323 - 9780750696005 - 040990032X - 0750696001 - 0913708283
Access and General Info:
- First Year Published: 1977
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44The business case for network security
By Catherine Paquet and Warren Saxe

“The business case for network security” Metadata:
- Title: ➤ The business case for network security
- Authors: Catherine PaquetWarren Saxe
- Language: English
- Number of Pages: Median: 395
- Publisher: ➤ Pearson Education, Limited - Cisco Press
- Publish Date: 2004 - 2005
- Publish Location: Indianapolis, Ind
“The business case for network security” Subjects and Themes:
- Subjects: ➤ Management - Computer security - Data protection - Computer networks - Security measures - Computer networks, security measures - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - Gestion - Protection de l'information (Informatique) - Computersicherheit - Netzwerk - Electrical & Computer Engineering - Engineering & Applied Sciences - Telecommunications
- Places: United States
Edition Identifiers:
- The Open Library ID: OL8823136M - OL3699176M - OL34787323M
- Online Computer Library Center (OCLC) ID: 57556821
- Library of Congress Control Number (LCCN): 2003115153
- All ISBNs: 9781587201219 - 158705423X - 1587201216 - 9781587054235
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The business case for network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Cyberphobia
By Edward Lucas

“Cyberphobia” Metadata:
- Title: Cyberphobia
- Author: Edward Lucas
- Language: English
- Publisher: ➤ Bloomsbury Publishing Plc - Bloomsbury Publishing PLC - Bloomsbury
- Publish Date: 2015 - 2016
“Cyberphobia” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks, security measures - Computer crimes - Computer networks - Security measures - Prevention - Computersicherheit - Internetkriminalität - Prävention
Edition Identifiers:
- The Open Library ID: OL43381844M - OL43321713M - OL48663211M - OL27506713M
- All ISBNs: ➤ 9781408850152 - 9781408850138 - 1408850125 - 140885015X - 1408850141 - 9781408850121 - 9781408850145 - 1408850133
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyberphobia at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Forensic discovery
By Dan Farmer and Wietse Venema

“Forensic discovery” Metadata:
- Title: Forensic discovery
- Authors: Dan FarmerWietse Venema
- Language: English
- Number of Pages: Median: 240
- Publisher: ➤ Addison-Wesley Professional - Pearson Education, Limited - Addison-Wesley
- Publish Date: 2004 - 2005
- Publish Location: Upper Saddle River, NJ
“Forensic discovery” Subjects and Themes:
- Subjects: ➤ Data recovery (Computer science) - Forensic sciences - Computer security - Computerkriminalitat - Rechnernetz - Computersicherheit - Internet, security measures - Récupération des données (Informatique) - Sécurité informatique - Informatique judiciaire - Wiederherstellung <Informatik> - Computerforensik - Computerkriminalität
Edition Identifiers:
- The Open Library ID: OL7408345M - OL17150020M - OL29004861M
- Online Computer Library Center (OCLC) ID: 56798972
- Library of Congress Control Number (LCCN): 2004024189
- All ISBNs: 9780321703255 - 020163497X - 0321703251 - 9780201634976
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Forensic discovery at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Cloud Security and Privacy
By Tim Mather, Subra Kumaraswamy and Shahed Latif

“Cloud Security and Privacy” Metadata:
- Title: Cloud Security and Privacy
- Authors: Tim MatherSubra KumaraswamyShahed Latif
- Number of Pages: Median: 338
- Publisher: O'Reilly
- Publish Date: 2009
“Cloud Security and Privacy” Subjects and Themes:
- Subjects: ➤ Sicherheitsmassnahme - Computer networks - Cloud computing - Security measures - Cloud Computing - Computersicherheit - Réseaux informatiques - Informatique en nuage - Technologies de l'information et de la communication - Sécurité informatique - Délits informatiques - Sicherheitsmaßnahme - Computer networks, security measures - General - Distributed systems & computing - Security - Viruses - Com060040 - Cs.cmp_sc.intrn_www - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: OL24598371M - OL24598372M
- Library of Congress Control Number (LCCN): 2010281455
- All ISBNs: 9780596802769 - 0596807503 - 0596802765 - 9780596807504
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cloud Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Computer system security
By Gildas Avoine, Pascal Junod and Philippe Oechslin

“Computer system security” Metadata:
- Title: Computer system security
- Authors: Gildas AvoinePascal JunodPhilippe Oechslin
- Language: English
- Number of Pages: Median: 235
- Publisher: ➤ EFPL Press - Taylor & Francis Group
- Publish Date: 2007
“Computer system security” Subjects and Themes:
- Subjects: Computer security - Computersicherheit - Lehrbuch
Edition Identifiers:
- The Open Library ID: OL8484627M - OL33550713M
- All ISBNs: 9781420046205 - 1420046209 - 2940222142 - 9782940222148
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer system security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Die Kunst des Einbruchs
By Kevin D. Mitnick

“Die Kunst des Einbruchs” Metadata:
- Title: Die Kunst des Einbruchs
- Author: Kevin D. Mitnick
- Language: ger
- Number of Pages: Median: 334
- Publisher: mitp-Verlag
- Publish Date: 2006
- Publish Location: Heidelberg, Germany
“Die Kunst des Einbruchs” Subjects and Themes:
- Subjects: ➤ computer security - hacker - networks - computer - Netzwerk - Computersicherheit
Edition Identifiers:
- The Open Library ID: OL24636682M
- All ISBNs: 9783826616228 - 3826616227
Author's Alternative Names:
"Kevin David Mitnick", "KD Mitnick", "Kevin Mitnick", "Kevin D Mitnick", "Kevin MITNICK" and "Kevim Mitnick"Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Die Kunst des Einbruchs at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Introduction to modern cryptography
By Jonathan Katz and Yehuda Lindell

“Introduction to modern cryptography” Metadata:
- Title: ➤ Introduction to modern cryptography
- Authors: Jonathan KatzYehuda Lindell
- Language: English
- Number of Pages: Median: 603
- Publisher: ➤ Taylor & Francis Group - CRC Press/Taylor & Francis - CRC Press LLC - CRC PRESS - CRC Press - Chapman and Hall/CRC - Chapman & Hall/CRC
- Publish Date: ➤ 2007 - 2008 - 2012 - 2014 - 2015 - 2020 - 2025
- Publish Location: Boca Raton
“Introduction to modern cryptography” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Data security & data encryption - Privacy & data protection - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Security - Combinatorics - Operating Systems - General - COMPUTERS / Operating Systems / General - COMPUTERS / Security / Cryptography - MATHEMATICS / Combinatorics - Sécurité informatique - Cryptographie - COMPUTERS / Cryptography - MATHEMATICS / General - Kryptologie - Computersicherheit - Datensicherung - Cryptografie - Databescherming - Computerbeveiliging - 0 Gesamtdarstellung - IT-säkerhet - Datakryptering - Operating Systems - General - Security - MATHEMATICS - Qa76.9.a25 k36 2015 - 005.8/2 - Com046000 com083000 mat036000 - Professional, career & trade -> computer science -> operating systems - Mathematics & statistics -> post-calculus -> combinatorics - Professional, career & trade -> computer science -> security - Scec3530 - Scma103020 - Scma105010 - Mathematics & statistics -> mathematics -> mathematics general - Qa76.9.a25 k36 2008 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL57739808M - OL34636216M - OL33828933M - OL33828932M - OL33828930M - OL33828909M - OL33663114M - OL33542196M - OL33504012M - OL33412277M - OL26384970M - OL17256842M - OL29251749M - OL12313732M - OL17907388M
- Online Computer Library Center (OCLC) ID: 1202866342 - 137325053 - 893721520 - 1233181213
- Library of Congress Control Number (LCCN): 2014039042 - 2007017861 - 2024061363
- All ISBNs: ➤ 1351133020 - 0815354363 - 9781466570276 - 9781351133005 - 1584885513 - 9781466542839 - 9781351133012 - 9781032496795 - 1351133039 - 9781420010756 - 1032496797 - 1466570261 - 146657027X - 9780429101489 - 1351133004 - 1466570288 - 9781466570283 - 9781584885511 - 1351133012 - 9780815354369 - 0429101481 - 9781466570269 - 9781351133036 - 1466542837 - 1420010751 - 9781351133029
Author's Alternative Names:
"Jonathan Katz,Moti Yung"Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Introduction to modern cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.