Explore: Security
Discover books, insights, and more — all in one place.
Learn more about Security with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “security”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Gray Hat Hacking
The Ethical Hacker's Handbook
By Shon Harris, Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, Michael Baucom, Chris Eagle and Jonathan Ness

“Gray Hat Hacking” Metadata:
- Title: Gray Hat Hacking
- Authors: ➤ Shon HarrisAllen HarperDaniel RegaladoRyan LinnStephen SimsBranko SpasojevicLinda MartinezMichael BaucomChris EagleJonathan Ness
- Language: English
- Number of Pages: Median: 595
- Publisher: ➤ McGraw Hill - McGraw-Hill Osborne Media - McGraw-Hill/Osborne - McGraw-Hill - McGraw-Hill Education
- Publish Date: ➤ 2004 - 2005 - 2008 - 2011 - 2015 - 2018 - 2022
- Publish Location: New York
“Gray Hat Hacking” Subjects and Themes:
- Subjects: ➤ Computer hackers - Computer security - Hackers - Computer crimes - Networking - Internet - Security - COMPUTERS - General - Penetration testing (Computer security) - Handbooks, manuals - Hacking - Engineering & Applied Sciences - Computer Science - Computing & information technology - Computer networking & communications - Ethical & social aspects of IT - Computer fraud & hacking - Network security - Computers and IT
Edition Identifiers:
- The Open Library ID: ➤ OL36144432M - OL26837931M - OL26833180M - OL23906038M - OL25016642M - OL3440123M - OL9257247M - OL7302570M
- Online Computer Library Center (OCLC) ID: 748265658 - 659756242 - 182552993 - 57688548
- Library of Congress Control Number (LCCN): 2005299894 - 2007047838 - 2010053295
- All ISBNs: ➤ 9780071495684 - 9781264268948 - 0071742557 - 9780071832380 - 0072257091 - 0071832386 - 0071495681 - 1264268947 - 9780072257090 - 9780071742559 - 9781260108415 - 1260108414
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Gray Hat Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2SAS(R) 9.1.3 Intelligence Platform
By SAS Publishing

“SAS(R) 9.1.3 Intelligence Platform” Metadata:
- Title: ➤ SAS(R) 9.1.3 Intelligence Platform
- Author: SAS Publishing
- Language: English
- Number of Pages: Median: 228
- Publisher: ➤ SAS Pub. - SAS Institute - SAS - Brand: SAS Institute
- Publish Date: 2006 - 2007
- Publish Location: Cary, NC
“SAS(R) 9.1.3 Intelligence Platform” Subjects and Themes:
- Subjects: ➤ SAS (Computer file) - Integrated software - Web servers - Application software - SAS Institute - Data structures (Computer science) - Database management - Computer security - Development - Servlets - Web site development - Management information systems - Management - Networking - Computer networks - COMPUTERS - Data protection - General - Internet - Security - Security measures - System design
Edition Identifiers:
- The Open Library ID: ➤ OL21812906M - OL20988937M - OL19968881M - OL17993805M - OL17993790M - OL17977470M - OL17993801M - OL17977475M - OL17993794M - OL17993788M - OL17993796M - OL12502666M - OL12502674M - OL12502678M - OL8902488M - OL12502681M - OL12502677M - OL12502665M - OL12502673M - OL12502676M - OL12502675M
- Online Computer Library Center (OCLC) ID: ➤ 227000261 - 225961942 - 144548800 - 144333195 - 144548804 - 144548802 - 144548803 - 144548806 - 144333171 - 144548799
- Library of Congress Control Number (LCCN): ➤ 2007275864 - 2007275858 - 2008273243 - 2007275860 - 2007275861 - 2007275859 - 2007275862 - 2007275863 - 2007275865 - 2006278738
- All ISBNs: ➤ 9781599942889 - 9781599942872 - 9781599942834 - 9781599941554 - 1599940078 - 9781599943763 - 1599942852 - 1599942860 - 1599941678 - 1599942887 - 9781599942827 - 1599942836 - 1599942879 - 159994376X - 1599942828 - 1599941554 - 9781599942865 - 9781599940076 - 9781599942858 - 9781599941677
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find SAS(R) 9.1.3 Intelligence Platform at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Computer Security Basics
By Deborah Russell, Sr. G.T Gangemi and Rick Lehtinen

“Computer Security Basics” Metadata:
- Title: Computer Security Basics
- Authors: Deborah RussellSr. G.T GangemiRick Lehtinen
- Language: English
- Number of Pages: Median: 448
- Publisher: ➤ O'Reilly & Associates - O'Reilly Media, Incorporated - O'Reilly - O'Reilly Media, Inc.
- Publish Date: 1991 - 1992 - 2006
- Publish Location: ➤ Sebastopol, Calif - Sebastopol, CA - Cambridge, MA
“Computer Security Basics” Subjects and Themes:
- Subjects: ➤ Computer security - Data security & data encryption - Privacy & data protection - Computers - Computer Data Security - Computers - Computer Security - Computer Books: General - Security - General - Computers / Computer Security - Computers / Security - Electronic data processing departments, security measures - Computer Security - Sécurité informatique - COMPUTERS - Security - General - Computadores (software) - Computer networks - Security measures - Viruses - Com053000 - Cs.cmp_sc.app_sw - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: ➤ OL36799042M - OL17157910M - OL17455894M - OL36706430M - OL1237444M - OL24961154M - OL36717671M - OL8414532M - OL7581091M
- Online Computer Library Center (OCLC) ID: 44958507 - 71665969 - 664376113
- Library of Congress Control Number (LCCN): 94241137 - 93118560 - 2006287147
- All ISBNs: ➤ 9781449317423 - 9781449317058 - 9781306813495 - 1449317057 - 1306813492 - 0596006691 - 0937175714 - 9780596006693 - 9780937175712 - 1449317421
Access and General Info:
- First Year Published: 1991
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer Security Basics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Hacking exposed
By Stuart McClure, Joel Scambray and George Kurtz

“Hacking exposed” Metadata:
- Title: Hacking exposed
- Authors: Stuart McClureJoel ScambrayGeorge Kurtz
- Language: English
- Number of Pages: Median: 484
- Publisher: Computing Mcgraw-Hill
- Publish Date: 1999
“Hacking exposed” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks - Hacking - Computerbeveiliging - Security measures - Data protection - Computer fraud & hacking - Data security & data encryption - Network security - Reference works - Security measures - Computer security - Computer Data Security - Computers - Computers - Communications / Networking - Security - General - Computer Books And Software - Security - Networking - General - Computer Bks - Communications / Networking - Computer networks - Security measures
Edition Identifiers:
- The Open Library ID: OL7302141M - OL9256818M
- All ISBNs: 0072121270 - 9780072121278
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking exposed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Hacking exposed
By Joel Scambray, Stuart McClure and George Kurtz

“Hacking exposed” Metadata:
- Title: Hacking exposed
- Authors: Joel ScambrayStuart McClureGeorge Kurtz
- Language: English
- Number of Pages: Median: 628
- Publisher: ➤ McGraw-Hill/OsborneMedia - Osborne/McGraw-Hill - McGraw-Hill/Osborne - McGraw-Hill Osborne Media
- Publish Date: ➤ 2000 - 2001 - 2002 - 2003 - 2006
- Publish Location: New York - Berkeley, Calif
“Hacking exposed” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Design - Microsoft Windows (Computer file) - Security measures - Web sites - Computernetwerken - Hacking - Computerbeveiliging - Microsoft windows (computer program) - Computer networks, security measures - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - COMPUTERS - Internet - Security - Networking - General - Literary collections
Edition Identifiers:
- The Open Library ID: ➤ OL9256905M - OL7302228M - OL7302492M - OL3319073M - OL6901297M - OL17840891M - OL3657306M
- Online Computer Library Center (OCLC) ID: 50055885 - 50557718 - 53968784
- Library of Congress Control Number (LCCN): 00712033 - 2004270118 - 2002512020
- All ISBNs: ➤ 9780072230611 - 9780072224382 - 0072127481 - 0072230614 - 007222438X - 9780072127485
First Setence:
"It's difficult to talk about any system in a vacuum, especially one that is so widely deployed in so many roles as Windows Server in all of its flavors."
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking exposed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6Understanding Network Hacks
By Bastian Ballmann

“Understanding Network Hacks” Metadata:
- Title: Understanding Network Hacks
- Author: Bastian Ballmann
- Language: English
- Number of Pages: Median: 192
- Publisher: ➤ Springer Berlin / Heidelberg - Springer
- Publish Date: 2015 - 2016 - 2021 - 2022
“Understanding Network Hacks” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Python (computer program language) - Computer networks - Security measures - Access control - Python (Computer program language) - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - Python (Langage de programmation) - COMPUTERS - Networking - Security
Edition Identifiers:
- The Open Library ID: OL37269197M - OL37332320M - OL37312955M - OL28266079M - OL37416972M
- Online Computer Library Center (OCLC) ID: 900539794
- All ISBNs: ➤ 9783662444368 - 9783662444375 - 9783662508626 - 9783662621592 - 3662444372 - 3662621568 - 3662508621 - 3662621592 - 9783662621561 - 3662444364
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Understanding Network Hacks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Hacking the Xbox
An Introduction to Reverse Engineering
By Andrew "Bunnie" Huang

“Hacking the Xbox” Metadata:
- Title: Hacking the Xbox
- Author: Andrew "Bunnie" Huang
- Language: English
- Number of Pages: Median: 288
- Publisher: ➤ Tandem Library - Xenatera Press - No Starch Press
- Publish Date: 2003
“Hacking the Xbox” Subjects and Themes:
- Subjects: ➤ Reverse engineering - Computer hackers - Computer security - Trusted computing - DRM - DMCA - Security research - Hackers - xbox - hardware - reverse - hacking - power - rom - security - soldering - solder - engineering - reverse engineering - power supply - flash rom - soldering iron - circuit board - front panel - xbox security - hard drive - boot rom - xbox motherboard
Edition Identifiers:
- The Open Library ID: OL9690551M - OL8581092M - OL8871395M
- Online Computer Library Center (OCLC) ID: 52471476 - 54613988
- Library of Congress Control Number (LCCN): 2003013303
- All ISBNs: ➤ 1593270291 - 9780613920391 - 0974057509 - 9780974057507 - 0613920392 - 9781593270292
First Setence:
"Hardware hacking may seem daunting at first because of the sophisticated tools that are required for some projects."
Author's Alternative Names:
"Andrew Huang"Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Hacking the Xbox at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Computer Forensics
By John R. Vacca and John Vacca

“Computer Forensics” Metadata:
- Title: Computer Forensics
- Authors: John R. VaccaJohn Vacca
- Language: English
- Number of Pages: Median: 666
- Publisher: Charles River Media
- Publish Date: 2002
- Publish Location: Hingham, Mass
“Computer Forensics” Subjects and Themes:
- Subjects: ➤ Computer Software Packages - Data security & data encryption - Internet - Network security - Internet - Security - Computer security - Computer Books: General - Security - General - Computers - Computer Bks - General Information - Computers - General Information - Forensic sciences - Computer Books And Software - Forensic Science - Security - Security measures - Computer Science - Computer networks
Edition Identifiers:
- The Open Library ID: OL8793288M - OL22134096M
- Online Computer Library Center (OCLC) ID: 49260440
- Library of Congress Control Number (LCCN): 2002002583
- All ISBNs: 9781584500186 - 1584500182
First Setence:
"Electronic evidence and information gathering have become central issues in an increasing number of conflicts and crimes."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Computer Forensics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Information warfare
By Michael Erbschloe

“Information warfare” Metadata:
- Title: Information warfare
- Author: Michael Erbschloe
- Language: English
- Number of Pages: Median: 315
- Publisher: ➤ McGraw-Hill - Osborne/McGraw-Hill
- Publish Date: 2001
- Publish Location: New York
“Information warfare” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer crimes - Cyberterrorism - Information warfare - Nonfiction - Guerre de l'information - Cyberterrorisme - Criminalité informatique - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: OL24296644M - OL3971019M
- Online Computer Library Center (OCLC) ID: 47888713 - 49570070
- Library of Congress Control Number (LCCN): 2001278342
- All ISBNs: 9780072132601 - 0072132604 - 0072194537 - 9780072194531
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Information warfare at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Hacking for Dummies
By Kevin Beaver and Jutta Schmidt

“Hacking for Dummies” Metadata:
- Title: Hacking for Dummies
- Authors: Kevin BeaverJutta Schmidt
- Languages: English - ger
- Number of Pages: Median: 396
- Publisher: ➤ For Dummies - John Wiley & Sons, Inc. - Wiley - Wiley Pub. - John Wiley & Sons, Ltd. - Wiley & Sons, Limited, John - Brand: Wiley-VCH Verlag GmbH - John Wiley & Son inc. - Wiley & Sons Canada, Limited, John - John Wiley &Sons - Wiley & Sons, Incorporated, John
- Publish Date: ➤ 2004 - 2006 - 2007 - 2009 - 2010 - 2012 - 2013 - 2015 - 2016 - 2018 - 2019 - 2020 - 2022
- Publish Location: ➤ Hoboken, NJ - New York - Chichester
“Hacking for Dummies” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer hackers - Computer networks - Computer security - Nonfiction - Security measures - Networking - Data protection - General - Internet - Security - Hackers - Computer networks, security measures - Engineering & Applied Sciences - Computer Science
Edition Identifiers:
- The Open Library ID: ➤ OL39938989M - OL39984549M - OL33467708M - OL33643196M - OL33721332M - OL33814272M - OL33835394M - OL40053258M - OL40077759M - OL33415963M - OL26961199M - OL26838501M - OL29131004M - OL29131005M - OL29304324M - OL33645424M - OL33645425M - OL34529389M - OL35584459M - OL35853272M - OL35881789M - OL39849032M - OL39856690M - OL39863911M - OL39900428M - OL40050877M - OL48632739M - OL48635334M - OL48638700M - OL26319294M - OL25353392M - OL24256462M - OL18498113M - OL24276588M - OL23072865M - OL8050918M - OL7595409M
- Online Computer Library Center (OCLC) ID: ➤ 1043392947 - 858027983 - 219607826 - 908805314 - 614432840 - 437082945
- Library of Congress Control Number (LCCN): 2006932690 - 2004101971 - 2012955723 - 2009942371 - 2018944084
- All ISBNs: ➤ 1118380932 - 9780764557842 - 9780470550939 - 3527677232 - 9781118380949 - 9781118380956 - 9781119174714 - 1283941120 - 1118380967 - 9780470602560 - 0470602562 - 1118380940 - 0470550937 - 9783527819041 - 9781118380932 - 9781119485476 - 9780470199268 - 9780470052358 - 9783527715510 - 9780470113073 - 3527805001 - 3527819045 - 1119872200 - 3527677224 - 9781119154686 - 1119872197 - 9780764573781 - 9781119872214 - 9781280649691 - 0470113073 - 9781118380963 - 3527715517 - 1119872219 - 1119485517 - 352780501X - 1119154707 - 9781119872207 - 9783527805006 - 9781119872191 - 9783527708307 - 9783527717958 - 1119485479 - 3527708308 - 9781119154693 - 9780470602683 - 0470602678 - 0470602686 - 9783527677238 - 1119485541 - 1280649690 - 9781119485513 - 1119154685 - 9781280350320 - 1280350326 - 1118380959 - 0470199261 - 3527829229 - 1119174716 - 9781283941129 - 9781119154709 - 9783527829224 - 076455784X - 0764573780 - 9783527677221 - 1119154693 - 9781119485544 - 9780470602676 - 9783527805013 - 3527717951 - 047005235X
First Setence:
"This book is about hacking ethically - the science of testing your computers and network for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit them."
Author's Alternative Names:
"Kevin M. Beaver" and "Kevin Michael Beaver"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacking for Dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11The Art of Deception
By Kevin D. Mitnick and William L. Simon

“The Art of Deception” Metadata:
- Title: The Art of Deception
- Authors: Kevin D. MitnickWilliam L. Simon
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Tantor and Blackstone Publishing - Wiley Publishing - Wiley - John Wiley & Sons, Ltd.
- Publish Date: ➤ 2001 - 2002 - 2003 - 2007 - 2021
- Publish Location: USA - New York
“The Art of Deception” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Social aspects - Computer hackers - Computer security - Information technology - Deception - Hackers - Business and economics - Computer networks, security measures - Security systems - Internal security - Social Engineering - Sécurité informatique - Sûreté de l'État - COMPUTERS - Internet - Security - Networking - General - Dispositifs de sécurité - Facteurs humains - Aspects psychologiques - Désinformation - Computerbeveiliging - Computercriminaliteit - Psychologische aspecten
- People: Kevin Mitnick
Edition Identifiers:
- Google Books ID: vRG7QgAACAAJ
- The Open Library ID: ➤ OL51730261M - OL35272573M - OL7613854M - OL8042481M - OL24328570M - OL24321037M
- Online Computer Library Center (OCLC) ID: 50494246 - 51209751 - 428739808
- Library of Congress Control Number (LCCN): 2002512977
- All ISBNs: ➤ 9781665197052 - 9780471237129 - 0471237124 - 9780764542800 - 1665197056 - 076454280X - 0471432288 - 9780471432289
First Setence:
"a company may have purchased the best security technologies that money can buy, trained their people so well that they lock up all their secrets before going home at night, and hired building guards from the best security firm in the business."
Author's Alternative Names:
"Kevin David Mitnick", "Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "Kevin MITNICK" and "KD Mitnick"Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Deception at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12The Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
By Kevin D. Mitnick

“The Art of Invisibility” Metadata:
- Title: The Art of Invisibility
- Author: Kevin D. Mitnick
- Language: English
- Number of Pages: Median: 309
- Publisher: ➤ Little, Brown and Company - Hachette Book Group USA
- Publish Date: 2017
- Publish Location: New York
“The Art of Invisibility” Subjects and Themes:
- Subjects: ➤ Personal Computers - TECHNOLOGY & ENGINEERING - Web - Social Aspects - Online Safety & Privacy - Social Media - COMPUTERS - Right of Privacy - Data protection - Mobile Devices - Hardware - Computer security - Internet - Security - Security measures - Telecommunications - Mobile & Wireless Communications - Internet, security measures - Privacy, right of
Edition Identifiers:
- The Open Library ID: OL26241338M - OL27732598M
- Online Computer Library Center (OCLC) ID: 951711109
- Library of Congress Control Number (LCCN): 2016024302
- All ISBNs: 0316554545 - 9780316380508 - 9780316554541 - 0316380504
Author's Alternative Names:
"Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "KD Mitnick", "Kevin David Mitnick" and "Kevin MITNICK"Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Invisibility at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Hands on Hacking
Become an Expert at Next Gen Penetration Testing and Purple Teaming
By Jennifer Arcuri, Matthew Hickey and James McAlonan

“Hands on Hacking” Metadata:
- Title: Hands on Hacking
- Authors: Jennifer ArcuriMatthew HickeyJames McAlonan
- Language: English
- Number of Pages: Median: 400
- Publisher: ➤ Wiley - Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John - John Wiley and Sons
- Publish Date: 2019 - 2020
“Hands on Hacking” Subjects and Themes:
- Subjects: ➤ Security - Cryptography - Viruses - Professional, career & trade -> computer science -> networking - Professional, career & trade -> computer science -> security - Cs41 - Csi0
Edition Identifiers:
- The Open Library ID: OL35552621M - OL29432197M - OL29432194M - OL28708320M
- Library of Congress Control Number (LCCN): 2020937933
- All ISBNs: ➤ 9781119561484 - 1119561450 - 9781119561514 - 9781119561453 - 1119561485 - 1119561507 - 9781119561507 - 1119561515
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Hands on Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14The Art of Intrusion
By Kevin D. Mitnick and William L. Simon

“The Art of Intrusion” Metadata:
- Title: The Art of Intrusion
- Authors: Kevin D. MitnickWilliam L. Simon
- Language: English
- Number of Pages: Median: 279
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley Pub. - Wiley - John Wiley & Sons, Ltd.
- Publish Date: 2005 - 2009
- Publish Location: New York
“The Art of Intrusion” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Computer security - Hackers - Hacker - Networking - Computerkriminalität - Security - COMPUTERS - Aspect social - General - Pirates informatiques - Technologie de l'information - Internet - Sécurité informatique - Computersicherheit - Hacking - Computer hackers
Edition Identifiers:
- The Open Library ID: OL39897939M - OL8051417M - OL7621475M - OL24305802M
- Online Computer Library Center (OCLC) ID: 56876941
- Library of Congress Control Number (LCCN): 2004025697
- All ISBNs: ➤ 0470503823 - 0764569597 - 9780470503829 - 9780764589423 - 0471782661 - 0471469947 - 128025257X - 9780471782667 - 9780764569593 - 9781280252570 - 9780471469940 - 0764589423
First Setence:
"There comes a magical gambler's moment when simple thrills magnify to become 3-D fantasies - a moment when greed chews up ethics and the casino system is just another mountain waiting to be conquered."
Author's Alternative Names:
"Kevin David Mitnick", "Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "Kevin MITNICK" and "KD Mitnick"Access and General Info:
- First Year Published: 2005
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Intrusion at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Data and Goliath
By Bruce Schneier

“Data and Goliath” Metadata:
- Title: Data and Goliath
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 383
- Publisher: ➤ W. W. Norton - W.W. Norton & Company - Recorded Books, Inc. and Blackstone Publishing - Norton & Company, Incorporated, W. W.
- Publish Date: 2015 - 2016
- Publish Location: New York, New York, USA
“Data and Goliath” Subjects and Themes:
- Subjects: ➤ privacy - National Security Agency - signal intelligence - Internet - data surveillance - security - Social control - Electronic surveillance - Big data - Social aspects - Computer security - Right of Privacy - Information technology - Technology, social aspects - Privacy, right of - Data protection - nyt:combined-print-and-e-book-nonfiction=2015-03-22 - New York Times bestseller - Personenbezogene Daten - Datenerfassung - Elektronische Überwachung - Elektronisk övervakning - Sociala aspekter - Informationsteknik - Dataskydd - Personlig integritet - Right of privacy - Computers and IT
- People: Edward Snowdon
- Places: cyberspace
- Time: 2000-2015
Edition Identifiers:
- The Open Library ID: OL33881885M - OL25748235M - OL28578045M
- Online Computer Library Center (OCLC) ID: 904399710
- Library of Congress Control Number (LCCN): 2014048365
- All ISBNs: ➤ 9780393244816 - 9781664442412 - 039335217X - 1664442413 - 9780393352177 - 0393244814
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Data and Goliath at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Extreme Privacy
By Michael Bazzell

“Extreme Privacy” Metadata:
- Title: Extreme Privacy
- Author: Michael Bazzell
- Language: English
- Number of Pages: Median: 378
- Publisher: ➤ Independently published - unknown - Independently Published
- Publish Date: 2019 - 2021
“Extreme Privacy” Subjects and Themes:
- Subjects: ➤ privacy - online privacy - off grid - security - technology - computers - educational
Edition Identifiers:
- The Open Library ID: OL42298195M - OL32252251M - OL27993034M
- All ISBNs: 9798729419395 - 9781093757620 - 1093757620
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Extreme Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Ethical Hacking and Penetration Testing Guide
By Rafay Baloch

“Ethical Hacking and Penetration Testing Guide” Metadata:
- Title: ➤ Ethical Hacking and Penetration Testing Guide
- Author: Rafay Baloch
- Language: English
- Number of Pages: Median: 531
- Publisher: ➤ CRC Press, Taylor & Francis Group - Routledge - Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2014 - 2017
“Ethical Hacking and Penetration Testing Guide” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - COMPUTERS / Security / General - COMPUTERS / Networking / General - LAW / Forensic Science - Computer security - Computer networks - Security measures - Tests d'intrusion - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Security - General - Networking - LAW - Forensic Science - Penetration testing (computer security) - Computers / security / general - Computers / networking / general - Law / forensic science
Edition Identifiers:
- The Open Library ID: ➤ OL26838148M - OL37959692M - OL37980186M - OL37984263M - OL37971507M - OL33574903M - OL33517337M
- Online Computer Library Center (OCLC) ID: 868641489 - 1011595255
- Library of Congress Control Number (LCCN): 2014006695
- All ISBNs: ➤ 1351381334 - 9781315145891 - 1138436828 - 1322638594 - 9781351381345 - 1351381342 - 9781138436824 - 9781351381338 - 148223162X - 9781482231618 - 9781322638591 - 9781482231625 - 1315145898 - 1482231611
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Ethical Hacking and Penetration Testing Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18CompTIA Security+ Study Guide
By Mike Chapple and David Seidl

“CompTIA Security+ Study Guide” Metadata:
- Title: CompTIA Security+ Study Guide
- Authors: Mike ChappleDavid Seidl
- Language: English
- Number of Pages: Median: 672
- Publisher: ➤ Sybex - Wiley & Sons, Incorporated, John
- Publish Date: 2021
“CompTIA Security+ Study Guide” Subjects and Themes:
- Subjects: ➤ Computer networks - Study guides - Security measures - Examinations - Electronic data processing personnel - Certification - Computer security - Réseaux d'ordinateurs - Guides de l'étudiant - Sécurité - Mesures - Examens - Sécurité informatique - General - Security - Professional, career & trade -> computer science -> certification - Professional, career & trade -> computer science -> networking - Professional, career & trade -> computer science -> security - Tp20 - Cs41
Edition Identifiers:
- The Open Library ID: OL29544535M - OL29544538M - OL30740320M
- Online Computer Library Center (OCLC) ID: 1230120949
- All ISBNs: ➤ 9781119736271 - 1119736269 - 1119736250 - 9781119736264 - 1119736277 - 9781119736257
Access and General Info:
- First Year Published: 2021
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CompTIA Security+ Study Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Cryptography engineering
Design Principles and Practical Applications
By Niels Ferguson, Bruce Schneier and Tadayoshi Kohno

“Cryptography engineering” Metadata:
- Title: Cryptography engineering
- Authors: Niels FergusonBruce SchneierTadayoshi Kohno
- Language: English
- Number of Pages: Median: 384
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John - Wiley Pub., inc. - Wiley
- Publish Date: ➤ 2010 - 2011 - 2012 - 2014 - 2015
- Publish Location: Indianapolis, IN
“Cryptography engineering” Subjects and Themes:
- Subjects: ➤ Cryptography - Computer security - COMPUTERS - Security - Computersicherheit - Kryptologie - Methoden und Technik - Kryptologi - Kryptering - IT-säkerhet - General - Professional, career & trade -> computer science -> security - Long Now Manual for Civilization
Edition Identifiers:
- The Open Library ID: ➤ OL39902730M - OL34527035M - OL31909494M - OL29132490M - OL29074278M - OL29070153M - OL25280298M
- Online Computer Library Center (OCLC) ID: 806039884
- Library of Congress Control Number (LCCN): 2010920648
- All ISBNs: ➤ 1283592304 - 9781118082102 - 9781118080917 - 9780470474242 - 9781118722367 - 0470474246 - 9781283592307 - 1118722361 - 1118080912 - 9781118502822 - 1118082109 - 978111808091 - 1118502825
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cryptography engineering at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Cybersecurity Essentials
By Charles J. Brooks, Christopher Grow, Philip Craig and Donald Short

“Cybersecurity Essentials” Metadata:
- Title: Cybersecurity Essentials
- Authors: Charles J. BrooksChristopher GrowPhilip CraigDonald Short
- Language: English
- Number of Pages: Median: 784
- Publisher: ➤ Sybex - Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: 2018
“Cybersecurity Essentials” Subjects and Themes:
- Subjects: Computer networks - Security measures - Computer security - Security - Professional, career & trade -> computer science -> networking
Edition Identifiers:
- The Open Library ID: OL26835179M - OL29329598M - OL33570710M - OL33576185M
- All ISBNs: ➤ 1119362393 - 1119369142 - 1119362431 - 9781119362395 - 9781119369141 - 9781119362456 - 1119362458 - 9781119362432
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cybersecurity Essentials at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21The perfect weapon
By David E. Sanger

“The perfect weapon” Metadata:
- Title: The perfect weapon
- Author: David E. Sanger
- Language: English
- Number of Pages: Median: 379
- Publisher: ➤ Scribe Publications - Crown - Crown/Archetype - Profil Kitap
- Publish Date: 2018 - 2019
“The perfect weapon” Subjects and Themes:
- Subjects: ➤ Cyberterrorism - Military surveillance - Terrorism - Prevention - Military intelligence - New York Times reviewed - Sociology - Internet and international relations - Technology and international relations - Internet in espionage - Cyberspace - Political aspects - Hacking - COMPUTERS - Security - HISTORY - 21st Century - POLITICAL SCIENCE - International Relations - Diplomacy - Computer crimes
- Places: United States
Edition Identifiers:
- The Open Library ID: OL43337865M - OL35398698M - OL28895915M - OL26955858M
- Online Computer Library Center (OCLC) ID: 1038453249 - 1039082430
- Library of Congress Control Number (LCCN): 2018285788
- All ISBNs: ➤ 9786057525581 - 0451497902 - 9780451497901 - 6057525582 - 9781911617723 - 9780451497895 - 1911617729 - 0451497899
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The perfect weapon at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22CISSP
By James Michael Stewart, Mike Chapple and Ed Tittel

“CISSP” Metadata:
- Title: CISSP
- Authors: James Michael StewartMike ChappleEd Tittel
- Language: English
- Number of Pages: Median: 832
- Publisher: ➤ Sybex - Wiley & Sons, Limited, John - SYBEX - John Wiley & Sons, Ltd. - Brand: Sybex - Wiley & Sons, Incorporated, John - Wiley Pub.
- Publish Date: ➤ 2004 - 2005 - 2006 - 2008 - 2011 - 2012 - 2016
- Publish Location: ➤ San Francisco, Calif - New York - London - Indianapolis, Ind
“CISSP” Subjects and Themes:
- Subjects: ➤ Examinations - Study guides - Computer security - Certification - Computer networks - Electronic data processing personnel - Computer Technology - Nonfiction - Study Guide - COMPUTERS / Certification Guides / General - Networking - COMPUTERS - General - Internet - Security - Electronic data processing personnel, certification - Computer networks, security measures - Examinations, study guides - Security measures
Edition Identifiers:
- Google Books ID: _9ndf7S9oUoC
- The Open Library ID: ➤ OL40095163M - OL40074252M - OL39839935M - OL34601306M - OL30619555M - OL3699153M - OL8096739M - OL24323673M - OL25557062M - OL29064152M - OL28988317M - OL29118666M - OL24249248M - OL16873867M
- Online Computer Library Center (OCLC) ID: 56751851 - 817706363 - 748329415 - 614432867 - 781717660
- Library of Congress Control Number (LCCN): 2012940018 - 2008022835 - 2005929270 - 2003115091 - 2010047238
- All ISBNs: ➤ 0782151205 - 1118028260 - 9780470276884 - 1119384141 - 1118332105 - 9781118028261 - 9781118028278 - 9781118314173 - 9780471779810 - 9781118075005 - 0782144438 - 9781118463895 - 1118028252 - 9780470944981 - 9781119384144 - 0470395915 - 0470276886 - 9780470395912 - 9781118332108 - 0782151558 - 1118463897 - 9780782144437 - 0470944986 - 1118314174 - 1118028279 - 9781119384182 - 1119384184 - 0782143350 - 9780782151558 - 9780782151206 - 0471779814 - 9781118028254 - 1118075005 - 9780782143355
First Setence:
"The Access Control Systems and Methodology domain of the Common Body of Knowledge (CBK) for the CISSP certification exam deals with topics and issues related to the monitoring, identification, and authorization of granting or restricting user access to resources."
Author's Alternative Names:
"James M. Stewart"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CISSP at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Designing The Internet Of Things
By Adrian McEwen and Hakim Cassimally

“Designing The Internet Of Things” Metadata:
- Title: ➤ Designing The Internet Of Things
- Authors: Adrian McEwenHakim Cassimally
- Language: English
- Number of Pages: Median: 336
- Publisher: ➤ Wiley & Sons, Incorporated, John - John Wiley & Sons
- Publish Date: 2012 - 2013
“Designing The Internet Of Things” Subjects and Themes:
- Subjects: ➤ Ubiquitous computing - Electronic apparatus and appliances - Design and construction - Internet of Things - Electronic apparatus and appliances, design and construction - General - Security - Java - Professional, career & trade -> computer science -> networking - Professional, career & trade -> computer science -> java - Professional, career & trade -> computer science -> security - Programmable controllers - Wireless sensor networks - Sensor networks - Technology - Appareils électroniques - Conception et construction - Informatique omniprésente - Internet des objets - Technologie électronique - Informatique - Internet der Dinge
Edition Identifiers:
- The Open Library ID: OL39929780M - OL33478080M - OL26056412M - OL29155158M - OL29187527M
- Online Computer Library Center (OCLC) ID: 812072192
- All ISBNs: ➤ 9781118430620 - 1118430654 - 1118430638 - 9781118430644 - 1299988652 - 9781118430637 - 9781299988651 - 111843062X - 9781118430651 - 1118430646
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Designing The Internet Of Things at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24The Ethical Hack
By James S. Tiller

“The Ethical Hack” Metadata:
- Title: The Ethical Hack
- Author: James S. Tiller
- Language: English
- Number of Pages: Median: 322
- Publisher: ➤ Taylor and Francis - Taylor & Francis Group - Auerbach Publishers, Incorporated - AUERBACH
- Publish Date: 2004 - 2005 - 2019
- Publish Location: London
“The Ethical Hack” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Penetration testing (Computer security) - Computer hackers - Computer networks - Testing - Security measures - Business enterprises - Hackers - Computer networks, security measures - Business enterprises, computer networks - Réseaux d'ordinateurs - Sécurité - Mesures - Pirates informatiques - Entreprises - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: ➤ OL33461822M - OL54207446M - OL8259205M - OL37979189M - OL34724651M - OL37980819M - OL24246119M - OL34664878M
- Online Computer Library Center (OCLC) ID: 61362977
- Library of Congress Control Number (LCCN): 2003052467
- All ISBNs: ➤ 9780429209550 - 1135502439 - 1135502471 - 9781102154655 - 9780849316098 - 084931609X - 042920955X - 9781135502430 - 9780367393816 - 1102154652 - 9781135502478 - 9781280157707 - 9780203495414 - 0367393816 - 1280157704 - 0203495411
First Setence:
"Hiring someone to hack your company goes by many names, such as ethical hacking, penetration testing, tiger teaming, intrusion testing, vulnerability analysis, and even security assessment."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Ethical Hack at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Handbook of applied cryptography
By Alfred J. Menezes

“Handbook of applied cryptography” Metadata:
- Title: ➤ Handbook of applied cryptography
- Author: Alfred J. Menezes
- Language: English
- Number of Pages: Median: 810
- Publisher: ➤ Taylor & Francis Group - CRC Press
- Publish Date: 1996 - 1997 - 2018
- Publish Location: Boca Raton
“Handbook of applied cryptography” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Cryptography - Handbooks, manuals - Ordinateurs - Guides, manuels - Accès - Contrôle - Cryptographie - Security - Computers--access control--handbooks, manuals, etc - Cryptography--handbooks, manuals, etc - Qa76.9.a25 m463 1997 - 005.8/2 - Long Now Manual for Civilization
Edition Identifiers:
- The Open Library ID: ➤ OL33768204M - OL33752303M - OL33736419M - OL33634667M - OL33437992M - OL989328M
- Online Computer Library Center (OCLC) ID: 35292671 - 54016134
- Library of Congress Control Number (LCCN): 96027609
- All ISBNs: ➤ 0429881320 - 9780429466335 - 0849385237 - 9780429881305 - 9780429881312 - 9781439821916 - 9780429881329 - 0429881304 - 0429881312 - 0429466331 - 1439821917 - 9780849385230
Access and General Info:
- First Year Published: 1996
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Handbook of applied cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Cloud Computing Security
By John R. Vacca

“Cloud Computing Security” Metadata:
- Title: Cloud Computing Security
- Author: John R. Vacca
- Language: English
- Number of Pages: Median: 522
- Publisher: ➤ CRC Press - Taylor & Francis Group
- Publish Date: 2016 - 2020
“Cloud Computing Security” Subjects and Themes:
- Subjects: ➤ Mathematics - Cloud computing - Security measures - Computer networks - Data protection - Computer security - Computer Security - Infonuagique - Sécurité - Mesures - Réseaux d'ordinateurs - Protection de l'information (Informatique) - Sécurité informatique - COMPUTERS - Computer Graphics - Game Programming & Design - Information Technology - Security - General - Games - Information technology - Computer engineering - Professional, career & trade -> computer science -> programming languages (jr/sr) - Professional, career & trade -> computer science -> information technology - Professional, career & trade -> computer science -> security - Professional, career & trade -> computer science -> computer engineering - Professional, career & trade -> computer science -> internet & www - Sccm30 - Sccm4810 - Sccm5515 - Wb028 - Wb057 - Wb058 - Wb070 - Wb074 - Wb075
Edition Identifiers:
- The Open Library ID: ➤ OL33726402M - OL33662921M - OL33798177M - OL33798179M - OL33798208M - OL34681607M - OL29517614M - OL33621888M - OL33798190M - OL34671962M - OL33508759M
- Online Computer Library Center (OCLC) ID: 1193069843
- All ISBNs: ➤ 0429617496 - 9780429619649 - 9780429055126 - 1315354926 - 0429621795 - 1482260956 - 0429619642 - 0367151162 - 9780429617492 - 9781315354927 - 9780367151164 - 0367658402 - 9780367658403 - 036756033X - 9780367560331 - 1315335867 - 0429055129 - 1315372118 - 9781315372112 - 9781482260953 - 9781315335865 - 9780429621796
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cloud Computing Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Mastering Kali Linux for Advanced Penetration Testing
By Robert W. Beggs

“Mastering Kali Linux for Advanced Penetration Testing” Metadata:
- Title: ➤ Mastering Kali Linux for Advanced Penetration Testing
- Author: Robert W. Beggs
- Language: English
- Number of Pages: Median: 325
- Publisher: ➤ Packt Publishing - ebooks Account - Packt Publishing, Limited
- Publish Date: 2014
“Mastering Kali Linux for Advanced Penetration Testing” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Internet - Computer networks - Security - COMPUTERS - Security measures - General
Edition Identifiers:
- The Open Library ID: OL26838074M - OL39584341M
- Online Computer Library Center (OCLC) ID: 883661832
- All ISBNs: 9781782163138 - 1782163131 - 1782163123 - 9781782163121
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mastering Kali Linux for Advanced Penetration Testing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Security without Obscurity
By Jeff Stapleton

“Security without Obscurity” Metadata:
- Title: Security without Obscurity
- Author: Jeff Stapleton
- Language: English
- Number of Pages: Median: 236
- Publisher: ➤ Auerbach Publishers, Incorporated - Auerbach Publications - Taylor & Francis Group - CRC Press LLC
- Publish Date: 2016 - 2018 - 2021
“Security without Obscurity” Subjects and Themes:
- Subjects: ➤ Telecommunication - Data encryption (computer science) - Computer network architectures - Security measures - Data encryption (Computer science) - Télécommunications - Sécurité - Mesures - Chiffrement (Informatique) - Réseaux d'ordinateurs - Architectures - COMPUTERS - Security - Networking - Public key infrastructure (Computer security) - Data protection - Standards - Information technology - Infrastructure à clé publique (Sécurité informatique) - Protection de l'information (Informatique) - Normes - Technologie de l'information
Edition Identifiers:
- The Open Library ID: ➤ OL36216520M - OL37638203M - OL33824895M - OL36228799M - OL37982682M - OL34620771M - OL36747222M - OL33824616M - OL36755710M - OL27349027M - OL33824890M - OL37980814M - OL33824623M - OL37983527M
- Online Computer Library Center (OCLC) ID: 951429268 - 1044733855
- All ISBNs: ➤ 9780815396413 - 0429467524 - 0815396414 - 1498788211 - 9780429884870 - 9780429884887 - 9780429884894 - 0367708132 - 1498707475 - 9781000349535 - 0429884893 - 9781498788212 - 9781000349597 - 042916033X - 1003041892 - 1000349594 - 100034956X - 9781000349566 - 0429884877 - 1000349535 - 0429884885 - 9780429160332 - 9780429467523 - 9781003041894 - 9780367708139 - 9781498707480 - 9781498707473 - 1498707483
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security without Obscurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Handbook of SCADA/control systems security
By Robert Radvanovsky and Jacob Brodsky

“Handbook of SCADA/control systems security” Metadata:
- Title: ➤ Handbook of SCADA/control systems security
- Authors: Robert RadvanovskyJacob Brodsky
- Language: English
- Number of Pages: Median: 383
- Publisher: ➤ Taylor & Francis Group - CRC Press, Taylor & Francis Group - CRC Press
- Publish Date: 2013 - 2016 - 2020
- Publish Location: Boca Raton
“Handbook of SCADA/control systems security” Subjects and Themes:
- Subjects: ➤ Automatic control - Supervisory control systems - Risk assessment - Technology - Data processing - Security measures - Handbooks, manuals - Technology, data processing - Computer networks - Computer security - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: ➤ OL33551425M - OL39354366M - OL34677603M - OL30660782M - OL33754267M - OL30401133M - OL33512445M - OL34607834M - OL33542419M
- Online Computer Library Center (OCLC) ID: 827944775
- Library of Congress Control Number (LCCN): 2012037818 - 2015040115
- All ISBNs: ➤ 1466502274 - 1482209403 - 9781466502277 - 9781299710931 - 9780429253218 - 149871708X - 148220939X - 9780429257728 - 0367596660 - 1466502266 - 0429253214 - 9781466502260 - 9781498717083 - 9781482209402 - 9780367596668 - 129971093X - 9781482209396 - 0429257724
Author's Alternative Names:
"Robert S. Radvanovsky"Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Handbook of SCADA/control systems security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Network Security
By Owen Poole

“Network Security” Metadata:
- Title: Network Security
- Author: Owen Poole
- Language: English
- Number of Pages: Median: 224
- Publisher: ➤ Taylor & Francis Group - Routledge - Butterworth-Heinemann
- Publish Date: 2002 - 2003 - 2007 - 2017
- Publish Location: Oxford
“Network Security” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Security measures - Computer Security - Sécurité informatique - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: ➤ OL35522943M - OL34569988M - OL38251950M - OL35547436M - OL7972212M - OL38312840M - OL33724087M - OL18685227M - OL46026733M - OL33566479M
- Online Computer Library Center (OCLC) ID: 173256860
- All ISBNs: ➤ 9781136377082 - 0750650338 - 9781138435261 - 1136377034 - 9781136377020 - 9781136377075 - 1138435260 - 1136377077 - 9780080512549 - 1281024295 - 9781136377037 - 9781136377051 - 1136377050 - 1136377085 - 9780750650335 - 0080512542 - 1136377026 - 9781281024299
First Setence:
"Networked information systems, capable of storing, processing and delivering data on a global scale, are now part of many organizations' operational infrastructure."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Mastering network security
By Chris Brenton and Cameron Hunt

“Mastering network security” Metadata:
- Title: Mastering network security
- Authors: Chris BrentonCameron Hunt
- Language: English
- Number of Pages: Median: 672
- Publisher: ➤ SYBEX - John Wiley & Sons, Ltd. - Sybex - Network - Wiley & Sons, Incorporated, John
- Publish Date: 1998 - 2002 - 2003 - 2006
- Publish Location: ➤ New York - London - San Francisco, Calif
“Mastering network security” Subjects and Themes:
- Subjects: ➤ Computer Technology - Computer networks - Computer security - Data protection - Nonfiction - Security measures - Networking - COMPUTERS - General - Internet - Security - Data security & data encryption - Network security - Computers - Computer Security - Computer Data Security - Microcomputer Networks - Computer Books: General - Security - General - Networking - General - Computers / Security - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL24265867M - OL39884225M - OL8096564M - OL398234M - OL22445777M
- Online Computer Library Center (OCLC) ID: 745061767 - 40647147
- Library of Congress Control Number (LCCN): 98087201 - 2002108077
- All ISBNs: ➤ 0782151485 - 0782141420 - 9781280650055 - 9780782151480 - 9780782141429 - 0782123430 - 9780782123432 - 1280650052
First Setence:
"WE ALL PROBABLY HAVE an idea about what the word system means."
Access and General Info:
- First Year Published: 1998
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mastering network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32Digital watermarking and steganography
fundamentals and techniques
By Frank Y. Shih
“Digital watermarking and steganography” Metadata:
- Title: ➤ Digital watermarking and steganography
- Author: Frank Y. Shih
- Language: English
- Number of Pages: Median: 235
- Publisher: ➤ Taylor & Francis - Taylor & Francis Group
- Publish Date: 2007 - 2008 - 2017 - 2020
- Publish Location: Boca Raton, Fl
“Digital watermarking and steganography” Subjects and Themes:
- Subjects: ➤ Intellectual property - Multimedia systems - Security measures - Computer security - Data encryption (computer science) - Digital watermarking - Data encryption (Computer science) - Computer Security - Intellectual Property - Tatouage numérique - Chiffrement (Informatique) - Sécurité informatique - Multimédia - Sécurité - Mesures - Propriété intellectuelle - COMPUTERS - Security - Cryptography
Edition Identifiers:
- The Open Library ID: ➤ OL33640424M - OL33385165M - OL34682241M - OL33631933M - OL33635091M - OL28880280M - OL33412285M - OL33595895M - OL33710678M - OL22657105M - OL33758414M - OL33710634M
- Online Computer Library Center (OCLC) ID: 982187740
- Library of Congress Control Number (LCCN): 2007034224
- All ISBNs: ➤ 1420047574 - 1315121107 - 9781351826983 - 135183567X - 0367656434 - 1420047582 - 1351647423 - 9781351647427 - 9781351637916 - 9781351835671 - 9781420069501 - 9780367656430 - 9781315121109 - 9781315219783 - 1351826980 - 1351637916 - 1315219786 - 9781420047585 - 1498738761 - 9781498738767 - 9781420047578 - 1420069500 - 9781498738774 - 149873877X
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Digital watermarking and steganography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Data Protection
By Preston de Guise
“Data Protection” Metadata:
- Title: Data Protection
- Author: Preston de Guise
- Language: English
- Number of Pages: Median: 400
- Publisher: ➤ CRC Press - Taylor & Francis Group - Auerbach Publishers, Incorporated
- Publish Date: 2017 - 2020
“Data Protection” Subjects and Themes:
- Subjects: ➤ Engineering - Data recovery (computer science) - Data protection - Computer networks - Security measures - Réseaux d'ordinateurs - Sécurité - Mesures - Protection de l'information (Informatique) - COMPUTERS - Data Processing - Storage & Retrieval - Disaster Recovery - Right of Privacy - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: ➤ OL29347841M - OL28072697M - OL29490370M - OL29392601M - OL29490384M - OL29366659M - OL29490287M - OL29490342M - OL29309573M - OL29488011M - OL29459095M
- Online Computer Library Center (OCLC) ID: 974711770 - 1153834379 - 986586925
- All ISBNs: ➤ 1351689517 - 0367474107 - 9781351689496 - 1482244152 - 9780367474102 - 9781000062571 - 9781315169620 - 1000062511 - 0367463490 - 9781000062458 - 9781000062519 - 1000062457 - 0367256770 - 9781351689502 - 9781351689519 - 1351689509 - 9780367463496 - 1000062570 - 9781482244151 - 1351689495 - 1315169622 - 9780367256777
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Data Protection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Behavioral Cybersecurity
By Wayne Patterson and Cynthia E. Winston-Proctor
“Behavioral Cybersecurity” Metadata:
- Title: Behavioral Cybersecurity
- Authors: Wayne PattersonCynthia E. Winston-Proctor
- Language: English
- Number of Pages: Median: 176
- Publisher: ➤ CRC Press LLC - Taylor & Francis Group
- Publish Date: 2019 - 2020 - 2024
“Behavioral Cybersecurity” Subjects and Themes:
- Subjects: ➤ Computer security - Computer fraud - Hacking - Social engineering - Self-protective behavior - Computer Security - Sécurité informatique - Fraude informatique - Piratage informatique - Ingénierie sociale - Autoprotection - COMPUTERS - Security - General - Human-Computer Interaction - TECHNOLOGY - Electricity - COMPUTERS / Cryptography
Edition Identifiers:
- The Open Library ID: ➤ OL57737373M - OL33736844M - OL34657219M - OL33704913M - OL33673313M - OL29540623M - OL29540521M - OL29540462M - OL29540337M - OL33736860M - OL34686876M
- Online Computer Library Center (OCLC) ID: 1222806311 - 1099466302
- Library of Congress Control Number (LCCN): 2020693818
- All ISBNs: ➤ 9780367509804 - 1000258335 - 9781000258257 - 0429866852 - 9781000258295 - 9780429866845 - 9781003052029 - 1000258297 - 0367509792 - 9781138617780 - 9780429866852 - 9780367509798 - 0429866836 - 1138617784 - 1000258254 - 9780429866838 - 1003052029 - 9781000258332 - 0429461488 - 0429866844 - 9780429461484 - 0367509806
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Behavioral Cybersecurity at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
By Mike Chapple, James Michael Stewart and Darril Gibson
“(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide” Metadata:
- Title: ➤ (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide
- Authors: Mike ChappleJames Michael StewartDarril Gibson
- Language: English
- Number of Pages: Median: 1248
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John
- Publish Date: 2018 - 2021 - 2024
“(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide” Subjects and Themes:
- Subjects: ➤ Computer security - Computer networks, security measures - Electronic data processing personnel, certification - Engineers - General - Professional, career & trade -> computer science -> certification - Security - Auditing - Professional, career & trade -> computer science -> networking - Business & economics -> accounting -> auditing - Tp20 - Cs41 - Professional, career & trade -> computer science -> internet & www
Edition Identifiers:
- The Open Library ID: ➤ OL33828102M - OL50622344M - OL33820343M - OL36734327M - OL33828135M - OL33622301M - OL50654839M - OL33586458M
- All ISBNs: ➤ 1119475953 - 1394254717 - 1119786231 - 9781119786245 - 9781119786337 - 9781119786238 - 9781119475873 - 9781119475958 - 1119786339 - 9781119549567 - 111978624X - 1394254709 - 9781394254712 - 1119549566 - 1119475872 - 9781394254705
Author's Alternative Names:
"James M. Stewart"Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Cognitive Hack
By James Bone

“Cognitive Hack” Metadata:
- Title: Cognitive Hack
- Author: James Bone
- Language: English
- Number of Pages: Median: 181
- Publisher: ➤ CRC Press, Taylor & Francis Group LLC - Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2017 - 2020 - 2024
“Cognitive Hack” Subjects and Themes:
- Subjects: ➤ Data protection - Computer security - Risk management - Business enterprises, computer networks - Commerce - Business enterprises - Security measures - COMPUTERS - Security - General
Edition Identifiers:
- The Open Library ID: ➤ OL29327926M - OL52562393M - OL37979096M - OL37983233M - OL29323782M - OL30171767M - OL37974749M
- Online Computer Library Center (OCLC) ID: 974040696 - 961213858
- Library of Congress Control Number (LCCN): 2016036443
- All ISBNs: ➤ 1032876867 - 149874981X - 9781498749824 - 9781498749817 - 1315368412 - 9781315351421 - 1315351420 - 9781032876863 - 0367567962 - 9781315368412 - 9781315332383 - 1315332388 - 1498749828 - 9780367567965
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cognitive Hack at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Practical Introduction to Enterprise Network and Security Management
By Bongsik Shin

“Practical Introduction to Enterprise Network and Security Management” Metadata:
- Title: ➤ Practical Introduction to Enterprise Network and Security Management
- Author: Bongsik Shin
- Language: English
- Number of Pages: Median: 507
- Publisher: ➤ Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2017 - 2020 - 2021
“Practical Introduction to Enterprise Network and Security Management” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer networks - Management - Security measures - Réseaux d'ordinateurs - Gestion - Sécurité - Mesures - COMPUTERS - Networking - Security - BUSINESS & ECONOMICS - Computer Communication Networks - Information Technology
Edition Identifiers:
- The Open Library ID: ➤ OL34710916M - OL37981632M - OL34615749M - OL37973845M - OL29347785M - OL33902675M - OL33902755M - OL34710888M - OL29347794M - OL33902618M - OL34681282M
- Online Computer Library Center (OCLC) ID: 1261727231 - 993949934
- All ISBNs: ➤ 9781003123699 - 131515420X - 100041812X - 0367657864 - 1032048026 - 9781498787970 - 1000418162 - 9781000418163 - 9781351633376 - 1498787975 - 9781498787987 - 9781000418125 - 1351633376 - 9780367657864 - 9780367642518 - 9781315154206 - 9781498787994 - 0367642514 - 9781032048024 - 1498787991 - 1498787983 - 1003123694
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Practical Introduction to Enterprise Network and Security Management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Coding theory and cryptography
By Darrel R. Hankerson, D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger and J.R. Wall

“Coding theory and cryptography” Metadata:
- Title: Coding theory and cryptography
- Authors: ➤ Darrel R. HankersonD.C. HankersonGary HoffmanD.A. LeonardCharles C. LindnerK.T. PhelpsC.A. RodgerJ.R. Wall
- Language: English
- Number of Pages: Median: 368
- Publisher: ➤ Taylor & Francis Group - M. Dekker - CRC - CRC Press LLC
- Publish Date: 2000
- Publish Location: New York
“Coding theory and cryptography” Subjects and Themes:
- Subjects: ➤ Coding theory - Cryptography - Applied mathematics - Coding theory & cryptology - Data security & data encryption - Security - General - General - Applied - Mathematics - Cryptography/Access Control - Computers - General Information - Science/Mathematics - Information Theory - Computers / Security - Programming - Systems Analysis & Design - Computer Bks - General Information - Computers - Security - Cryptographie
Edition Identifiers:
- The Open Library ID: ➤ OL19020130M - OL33522301M - OL33400273M - OL50666928M - OL33522359M - OL8124659M - OL33679264M - OL21094927M
- Online Computer Library Center (OCLC) ID: 50699015 - 44669778
- Library of Congress Control Number (LCCN): 00060106
- All ISBNs: ➤ 1466522119 - 9780824704650 - 9781466522114 - 0824704657 - 9780585421414 - 9781482270709 - 1482270706 - 1420002635 - 9780429180934 - 0585421412 - 9781420002638 - 0429180934
First Setence:
"Coding theory is the study of methods for efficient and accurate transfer of information from one place to another."
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Coding theory and cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Crime and Intelligence Analysis
By Glenn Grana and James Windell
“Crime and Intelligence Analysis” Metadata:
- Title: ➤ Crime and Intelligence Analysis
- Authors: Glenn GranaJames Windell
- Language: English
- Number of Pages: Median: 377
- Publisher: ➤ Taylor & Francis Group - CRC Press
- Publish Date: 2016 - 2017 - 2021
“Crime and Intelligence Analysis” Subjects and Themes:
- Subjects: ➤ Crime analysis - Criminal statistics - Crime prevention - Criminology - Criminalité - Analyse - Statistiques criminelles - Criminologie - SOCIAL SCIENCE - LAW - Criminal Law - General - COMPUTERS - Security
Edition Identifiers:
- The Open Library ID: ➤ OL33837030M - OL54028377M - OL34696246M - OL28819933M - OL28845594M - OL53982837M - OL53960085M - OL36257296M - OL53966059M - OL33837203M - OL34696244M
- Online Computer Library Center (OCLC) ID: 1221016239
- Library of Congress Control Number (LCCN): 2020047640
- All ISBNs: ➤ 9781138435766 - 1000370992 - 9781000371086 - 9780367437299 - 9781498751728 - 1000371085 - 9781315351247 - 1315380765 - 1498751725 - 9781000370997 - 036743427X - 9781498751735 - 9781315332208 - 0367437295 - 9780367434274 - 1138435767 - 1498751733 - 1003005349 - 1315332205 - 9781003005346 - 1315351242 - 9781315380766
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Crime and Intelligence Analysis at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Hacking
By Nitesh Dhanjani

“Hacking” Metadata:
- Title: Hacking
- Author: Nitesh Dhanjani
- Language: English
- Number of Pages: Median: 298
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated
- Publish Date: 2009
- Publish Location: Sebastopol, CA - Beijing
“Hacking” Subjects and Themes:
- Subjects: ➤ Security measures - Computer security - Internet - Internet, security measures - Computer hackers - Computer networks - General - Security - Viruses - Com053000 - Cs.cmp_sc.app_sw - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: OL36711804M - OL36801988M - OL25541583M
- Online Computer Library Center (OCLC) ID: 434904834 - 320188944
- Library of Congress Control Number (LCCN): 2010484033
- All ISBNs: ➤ 9780596154578 - 9781449379216 - 0596154577 - 1449379214 - 9781449391898 - 1449391893
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Multiple-base number system
By Vassil Dimitrov

“Multiple-base number system” Metadata:
- Title: Multiple-base number system
- Author: Vassil Dimitrov
- Language: English
- Number of Pages: Median: 294
- Publisher: ➤ Taylor & Francis Group - CRC Press
- Publish Date: 2012 - 2017
- Publish Location: Boca Raton
“Multiple-base number system” Subjects and Themes:
- Subjects: ➤ TECHNOLOGY & ENGINEERING / Electrical - COMPUTERS / Security / Cryptography - COMPUTERS / Programming / Algorithms - Computer arithmetic - Number theory - Computer science, mathematics - Arithmétique interne des ordinateurs - Théorie des nombres - COMPUTERS - Programming - Algorithms - Security - Cryptography - TECHNOLOGY & ENGINEERING - Electrical - MATHEMATICS - Number Theory
Edition Identifiers:
- The Open Library ID: ➤ OL25162334M - OL33483447M - OL28869289M - OL33748795M - OL33575514M - OL33417888M - OL33716931M
- Online Computer Library Center (OCLC) ID: 879683641 - 779166289
- Library of Congress Control Number (LCCN): 2011046597
- All ISBNs: ➤ 9781315217772 - 9781138076518 - 135182497X - 1280121866 - 1439830479 - 1138076511 - 9781439830475 - 9781351833660 - 9781280121869 - 1315217775 - 1351833669 - 9781439830468 - 1439830460 - 9781351824972
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Multiple-base number system at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Cold cases
By James M. Adcock

“Cold cases” Metadata:
- Title: Cold cases
- Author: James M. Adcock
- Language: English
- Number of Pages: Median: 265
- Publisher: ➤ Taylor & Francis Group - CRC Press
- Publish Date: ➤ 2010 - 2011 - 2014 - 2015 - 2017 - 2019
- Publish Location: Boca Raton, FL
“Cold cases” Subjects and Themes:
- Subjects: ➤ Cold cases (Criminal investigation) - Criminal investigations - Criminal Law - COMPUTERS - General - Security - LAW - Forensic Science - Criminal investigation - COMPUTERS / Security / General - LAW / Criminal Law / General - LAW / Forensic Science - Crimes non résolus - Enquêtes criminelles - BUSINESS & ECONOMICS - Infrastructure - SOCIAL SCIENCE
Edition Identifiers:
- The Open Library ID: ➤ OL57534859M - OL52547289M - OL37954183M - OL33782385M - OL33657005M - OL33517448M - OL33394033M - OL28882471M - OL27791412M - OL25106844M
- Online Computer Library Center (OCLC) ID: 890310192 - 897874033 - 649079834
- Library of Congress Control Number (LCCN): 2010029757 - 2014032654
- All ISBNs: ➤ 9780429255960 - 1322624119 - 1482221454 - 1040082033 - 1482221446 - 9781138113404 - 9781322624112 - 9781040082034 - 1439826900 - 9781482221442 - 1138113409 - 9780367869090 - 0429246277 - 1439826919 - 9781439826904 - 9781439826911 - 0367869098 - 9781482221459 - 9780429246272 - 0429255969
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cold cases at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Hacker's challenge
By Mike Schiffman

“Hacker's challenge” Metadata:
- Title: Hacker's challenge
- Author: Mike Schiffman
- Language: English
- Number of Pages: Median: 355
- Publisher: ➤ McGraw-Hill - Osborne/McGraw-Hill
- Publish Date: 2001 - 2003
- Publish Location: New York
“Hacker's challenge” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer security - Computer Technology - Computer hackers - Nonfiction - Hackers - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: OL3580929M - OL24283936M - OL24764532M
- Online Computer Library Center (OCLC) ID: 48489500 - 51806453
- Library of Congress Control Number (LCCN): 2002277030
- All ISBNs: 9780072228564 - 9780072193848 - 0072193840 - 0072228563
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacker's challenge at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents
By Gerard Johansen

“Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents” Metadata:
- Title: ➤ Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents
- Author: Gerard Johansen
- Number of Pages: Median: 324
- Publisher: ➤ Packt Publishing - ebooks Account - Packt Publishing
- Publish Date: 2017
“Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents” Subjects and Themes:
- Subjects: ➤ Computer crimes - Forensic sciences - Computer networks, security measures - COMPUTERS - Security - General - Investigation - Data processing - Computer networks - Security measures - BUSINESS & ECONOMICS / Infrastructure - SOCIAL SCIENCE / General - Viruses & Malware - Networking
Edition Identifiers:
- The Open Library ID: OL26834171M
- All ISBNs: 1787288684 - 9781787288683
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Digital Forensics and Incident Response: A practical guide to deploying digital forensic techniques in response to cyber security incidents at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45CEH v10 Certified Ethical Hacker Study Guide
By Ric Messier

“CEH v10 Certified Ethical Hacker Study Guide” Metadata:
- Title: ➤ CEH v10 Certified Ethical Hacker Study Guide
- Author: Ric Messier
- Language: English
- Number of Pages: Median: 592
- Publisher: ➤ Wiley & Sons, Incorporated, John - Sybex - Wiley-Interscience - Wiley & Sons, Limited, John
- Publish Date: 2019
“CEH v10 Certified Ethical Hacker Study Guide” Subjects and Themes:
- Subjects: ➤ Electronic data processing personnel, certification - Hackers - Computer security - Computer networks, security measures - Security - General - Professional, career & trade -> computer science -> networking - Tpz0 - Cs41 - Ee23 - Professional, career & trade -> computer science -> certification
Edition Identifiers:
- The Open Library ID: OL39945591M - OL29437432M - OL29437426M - OL28282245M
- All ISBNs: ➤ 9781119533191 - 1119533252 - 9781119533252 - 1119533260 - 1119533244 - 9781119533245 - 1119533198 - 9781119533269
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find CEH v10 Certified Ethical Hacker Study Guide at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Cryptology
By Richard E. Klima

“Cryptology” Metadata:
- Title: Cryptology
- Author: Richard E. Klima
- Language: English
- Number of Pages: Median: 482
- Publisher: ➤ Taylor & Francis - Taylor & Francis Group
- Publish Date: 2012 - 2018 - 2023
- Publish Location: Boca Raton
“Cryptology” Subjects and Themes:
- Subjects: ➤ Ciphers - Cryptography - Data processing - Data encryption (Computer science) - Cryptographie - Informatique - Chiffrement (Informatique) - Chiffres (Cryptographie) - Ciphers (codes) - COMPUTERS - Security
Edition Identifiers:
- The Open Library ID: ➤ OL46071086M - OL33736053M - OL33534052M - OL34649928M - OL33719997M - OL33656352M - OL33504600M - OL25330876M - OL33767813M
- Online Computer Library Center (OCLC) ID: 859794523 - 1076543437
- Library of Congress Control Number (LCCN): 2012015647
- All ISBNs: ➤ 9781351692526 - 9781315170664 - 1466569042 - 9781138047624 - 9781351692540 - 1351692542 - 1138047627 - 1032475927 - 1315170663 - 9781439872413 - 9781466569041 - 1351692534 - 1351692526 - 9781439872420 - 1439872422 - 1439872414 - 9781032475929 - 9781351692533
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cryptology at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Cyber-Security and Threat Politics
By Myriam Dunn Cavelty

“Cyber-Security and Threat Politics” Metadata:
- Title: ➤ Cyber-Security and Threat Politics
- Author: Myriam Dunn Cavelty
- Language: English
- Number of Pages: Median: 192
- Publisher: ➤ Taylor & Francis Group - Routledge
- Publish Date: 2007 - 2009
- Publish Location: ➤ New York - Milton Park, Abingdon, Oxon
“Cyber-Security and Threat Politics” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Government policy - National security - Security measures - Threats - Computer networks, security measures - National security, united states - United states, politics and government - Extortion - Datensicherung - Innere Sicherheit - Internet - Computersicherheit - Sécurité informatique - Politique gouvernementale - Menaces - Réseaux d'ordinateurs - Sécurité - Mesures - COMPUTERS - Security - Networking - General
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL54025632M - OL33738738M - OL33577494M - OL33577422M - OL33462383M - OL28748737M - OL10206162M - OL17963098M
- Online Computer Library Center (OCLC) ID: 255479949 - 183601162 - 137331503
- Library of Congress Control Number (LCCN): 2007022679
- All ISBNs: ➤ 1134086652 - 9781134086672 - 9781134086658 - 9781134086702 - 9780415429818 - 9781134086696 - 9781281063908 - 1134086679 - 1281063908 - 1134086709 - 9780415569880 - 0415429811 - 1134086695 - 0415569885
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber-Security and Threat Politics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Schneier on security
By Bruce Schneier

“Schneier on security” Metadata:
- Title: Schneier on security
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 336
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley Pub.
- Publish Date: 2008 - 2009
- Publish Location: Indianapolis, IN
“Schneier on security” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Prevention - Privacy, Right of - Right of Privacy - Security measures - Terrorism - Cyberterrorism - Security systems - Evaluation - Information warfare - Technological innovations - Networking - COMPUTERS - Internet - Security - General - Internet, security measures
- Places: United States
Edition Identifiers:
- The Open Library ID: OL29011839M - OL29020059M - OL29035516M - OL17074683M
- Online Computer Library Center (OCLC) ID: 226356041
- Library of Congress Control Number (LCCN): 2008035466
- All ISBNs: ➤ 9780470395356 - 0470395354 - 0470505613 - 0470505621 - 9780470505625 - 9780470505601 - 9780470505618 - 0470505605
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Schneier on security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Applied Cryptography
By Bruce Schneier

“Applied Cryptography” Metadata:
- Title: Applied Cryptography
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 784
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley
- Publish Date: ➤ 1994 - 1995 - 1996 - 2011 - 2015 - 2017
- Publish Location: ➤ Protocols, Algorithms, and Source Code in C - New York
“Applied Cryptography” Subjects and Themes:
- Subjects: ➤ Security measures - Telecommunication - Computer security - Cryptography - C (Computer program language) - COMPUTERS - Security - General - Cryptographie - C (Langage de programmation) - Telecommunication--security measures - Qa76.9.a25 s35 1996 - 005.8/2 - Long Now Manual for Civilization
Edition Identifiers:
- The Open Library ID: ➤ OL33391939M - OL31906079M - OL28565887M - OL29353353M - OL7612292M - OL1394854M - OL780542M - OL7612169M
- Online Computer Library Center (OCLC) ID: 914287736 - 28182240 - 32311687 - 906120521
- Library of Congress Control Number (LCCN): 95012398 - 93002139
- All ISBNs: ➤ 111808196X - 9780471117094 - 9781118081969 - 9781119439028 - 9780471597568 - 9780471128458 - 0471117099 - 1119096723 - 1119439027 - 0471597562 - 0471128457 - 9781119096726
First Setence:
"Suppose a sender wants to send a message to a receiver."
Access and General Info:
- First Year Published: 1994
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Downloads:
- Number of Results: 3
- 1: Applied_Cryptography_2nd_ed._B._Schneier
- 2: appliedcryptogra0000schn
- 3: appliedcryptogra00schn_714
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Applied Cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Introduction to modern cryptography
By Jonathan Katz and Yehuda Lindell

“Introduction to modern cryptography” Metadata:
- Title: ➤ Introduction to modern cryptography
- Authors: Jonathan KatzYehuda Lindell
- Language: English
- Number of Pages: Median: 603
- Publisher: ➤ Taylor & Francis Group - CRC Press/Taylor & Francis - CRC Press LLC - CRC PRESS - CRC Press - Chapman and Hall/CRC - Chapman & Hall/CRC
- Publish Date: ➤ 2007 - 2008 - 2012 - 2014 - 2015 - 2020 - 2025
- Publish Location: Boca Raton
“Introduction to modern cryptography” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Data security & data encryption - Privacy & data protection - Computers - Computers - Computer Security - Computer Books: General - Security - General - Computers / Security - Combinatorics - Operating Systems - General - COMPUTERS / Operating Systems / General - COMPUTERS / Security / Cryptography - MATHEMATICS / Combinatorics - Sécurité informatique - Cryptographie - COMPUTERS / Cryptography - MATHEMATICS / General - Kryptologie - Computersicherheit - Datensicherung - Cryptografie - Databescherming - Computerbeveiliging - 0 Gesamtdarstellung - IT-säkerhet - Datakryptering - Operating Systems - General - Security - MATHEMATICS - Qa76.9.a25 k36 2015 - 005.8/2 - Com046000 com083000 mat036000 - Professional, career & trade -> computer science -> operating systems - Mathematics & statistics -> post-calculus -> combinatorics - Professional, career & trade -> computer science -> security - Scec3530 - Scma103020 - Scma105010 - Mathematics & statistics -> mathematics -> mathematics general - Qa76.9.a25 k36 2008 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL57739808M - OL34636216M - OL33828933M - OL33828932M - OL33828930M - OL33828909M - OL33663114M - OL33542196M - OL33504012M - OL33412277M - OL26384970M - OL17256842M - OL29251749M - OL12313732M - OL17907388M
- Online Computer Library Center (OCLC) ID: 1202866342 - 137325053 - 893721520 - 1233181213
- Library of Congress Control Number (LCCN): 2014039042 - 2007017861 - 2024061363
- All ISBNs: ➤ 1351133020 - 0815354363 - 9781466570276 - 9781351133005 - 1584885513 - 9781466542839 - 9781351133012 - 9781032496795 - 1351133039 - 9781420010756 - 1032496797 - 1466570261 - 146657027X - 9780429101489 - 1351133004 - 1466570288 - 9781466570283 - 9781584885511 - 1351133012 - 9780815354369 - 0429101481 - 9781466570269 - 9781351133036 - 1466542837 - 1420010751 - 9781351133029
Author's Alternative Names:
"Jonathan Katz,Moti Yung"Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Introduction to modern cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.