Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Sydney Jones Library, University of Liverpool.
The Resource
Computer security
Resource Information
The concept Computer security represents the subject, aboutness, idea or notion of resources found in Sydney Jones Library, University of Liverpool.
- Label
- Computer security
- Authority link
- http://id.worldcat.org/fast/00872484
- Source
- fast
A sample of Items that share the Concept Computer security See All
Context
Context of Computer securitySubject of
No resources found
No enriched resources found
- (ISC)2 CISSP : Certified Information Systems Security Professional : official practice tests
- (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests
- . Net Security and Cryptography
- 125 sposobów na bezpieczeństwo sieci
- 2020 Ivannikov Memorial Workshop : IVMEM 2020 : proceedings : Orel, Russia, 25-26 September 2020
- 24 deadly sins of software security : programming flaws and how to fix them
- 8 steps to better security : a simple cyber resilience guide for business
- A Multidisciplinary Introduction to Information Security
- A bug hunter's diary : a guided tour through the wilds of software security
- A concise introduction to the NIS directive : a pocket guide for digital service providers
- A guide to kernel exploitation : attacking the core
- A multidisciplinary introduction to information security
- A practical guide to computer forensics investigations
- A practical guide to trusted computing
- A study of black hole attack solutions : on AODV routing protocol in MANET
- ASP.NET web API security essentials : take the security of your ASP.NET web API to the next level using some of the most amazing security techniques around
- Absolute beginner's guide to security, spam, spyware and viruses
- Abusing the Internet of things : blackouts, freakouts, and stakeouts
- Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud
- Adaptive Security Management Architecture
- Advanced host intrusion prevention with CSA
- Advanced malware analysis
- Advanced malware analysis
- Advanced persistent threat hacking : the art and science of hacking any organization
- Advances in intelligence and security informatics
- Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict
- Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response
- Agile application security : enabling security in a continuous delivery pipeline
- Agile security : an introduction for developers
- Ajax security
- Alice and Bob learn application security
- An Introduction to information security and ISO27001:2013 : a pocket guide
- An introduction to hacking and crimeware : a pocket guide
- Analyzing computer security : a threat/vulnerability/countermeasure approach
- Android security essentials LiveLessons : (sneak peek video training)
- Anomaly detection for monitoring : a statistical approach to time series anomaly detection
- Anonymizing health data : case studies and methods to get you started
- Apache Kafka series : Kafka security (SSL SASL Kerberos ACL)
- Applied Oracle security : developing secure database and middleware environments
- Applied cryptography : protocols, algorithms, and source code in C
- Applied incident response
- Applied security visualization
- Are your bits flipped? : overcoming tech misconceptions
- Art of attack : attacker mindset for security professionals
- Artificial Intelligence, Cybersecurity and Cyber Defence
- Artificial intelligence, cybersecurity and cyber defense
- Assessing and Managing Security Risk in IT Systems
- Assessing information security : strategies, tactics, logic and framework
- Auditing IT infrastructures for compliance
- Auditing IT infrastructures for compliance
- Aus dem Tagebuch eines Bughunters : wie man Softwareschwachstellen aufspürt und behebt
- BackTrack 4 : assuring security by penetration testing
- Backing up Oracle : using Tivoli Storage Management
- Basiswissen Sichere Software : aus- und Weiterbildung zum ISSECO Certified Professionell for Secure Software Engineering
- Becoming the hacker : the playbook for getting inside the mind of an attacker
- Beginning security with Microsoft technologies : protecting Office 365, devices, and data
- Big data : storage, sharing, and security
- Biometrics for network security
- Black hat Python : Python programming for hackers and pentesters
- Black hat Python : Python programming for hackers and pentesters
- Blockchain technology and applications
- Buffer-Overflows und Format-String-Schwachstellen : Funktionsweisen, Exploits und Gegenmassnahmen
- Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments
- Building Python Real-Time Applications with Storm
- Building a HIPAA-compliant cybersecurity program : using NIST 800-30 and CSF to secure protected health information
- Building a global information assurance program
- Building an information security awareness program
- Building secure software : how to avoid security problems the right way
- Bulletproof Android : practical advice for building secure apps
- CCISO Certified Chief Information Security Officer All-In-One Exam Guide
- CCSP Certified Cloud Security Professional exam guide
- CCSP Certified Cloud Security Professional practice exams
- CEH v11 : certified ethical hacker version 11 practice tests
- CEH, certified ethical hacker practice exams
- CISSP (ISC)2 certification practice exams and tests : over 1000 practice questions and explanations covering all 8 CISSP domains for exam version May 2021
- CISSP official (ISC)2 practice tests
- CISSP video mentor
- COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002)
- Case studies in secure computing : achievements and trends
- Case studies in secure computing : achievements and trends
- Case study : how Tools & Solutions survived a ransomware attack
- Certification study guide, IBM Tivoli Access Manager for e-business 6.0
- Certified ethical hacker (CEH) cert guide
- Certified ethical hacker (CEH) platform penetration : learn how to ethically penetrate customer networks, systems, devices, apps, and databases
- Certified ethical hacker (CEH) version 9 cert guide
- Chained exploits : advanced hacking attacks from start to finish
- Check Point NG : next generation security administration
- Check Point VPN-1/FireWall-1 on AIX : a cookbook for stand-alone and high availability solutions
- Chinese cybersecurity and defense
- Cisco DCUCI quick reference
- Cisco NetFlow
- Cisco security professional's guide to secure intrusion detection systems
- Clickjacking und UI-Redressing - Vom Klick-Betrug zum Datenklau : Ein Leitfaden für Sicherheitsexperten und Webentwickler
- Cloud Compliance and Privacy Protection
- Cloud Computing Global Impact and Compliance
- Cloud Computing Part 3
- Cloud Security and Governance : Who's on your cloud?
- Cloud computing Part 2 / Phillip Laplante
- Cloud security
- Cloud security : overview and best practices
- CompTIA Security+
- CompTIA security+ (SYO-401) : complete video course
- CompTIA security+ practice tests, exam SY0-501
- Comptia security+ certification practice exams, (Exam SY0-601)
- Computer Security Literacy
- Computer forensics : a pocket guide
- Computer forensics : incident response essentials
- Computer forensics : infoSec Pro guide
- Computer security : art and science
- Computer security : art and science
- Computer security : protecting digital resources
- Computer security and cryptography
- Computer security basics
- Computer security fundamentals
- Computer security fundamentals
- Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklären
- Computer-Forensik Hacks
- Computer-related risks
- Control engineering and information systems : proceedings of the 2014 International Conference on Control Engineering and Information System (ICCEIS2014), Yueyang, Hunan, China, 20-22 June 2014
- Core security patterns : best practices and strategies for J2EE, Web services, and identity management
- Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE)
- Cracking codes with Python : an introduction to building and breaking ciphers
- Cracking security misconceptions : untangling common myths about modern information security
- Crafting the InfoSec playbook
- Creating the secure managed desktop : using group policy, SoftGrid, Microsoft deployment toolkit, and other management tools
- Crimeware : understanding new attacks and defenses
- Crypto : how the code rebels beat the government, saving privacy in the digital age
- Cryptography and network security
- Cryptography and network security
- Cryptography fundamentals
- Cyber Security Essentials
- Cyber Security of Industrial Control Systems (ICS)
- Cyber Warfare - Truth, Tactics, and Strategies
- Cyber crisis : protecting your business from real threats in the virtual world
- Cyber crisis management : the practical handbook on crisis management and crisis communication
- Cyber essentials : a pocket guide
- Cyber fraud : tactics, techniques, and procedures
- Cyber fraud tactics, techniques and procedures
- Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable
- Cyber resiliency solution for IBM Spectrum Scale
- Cyber security : a practitioner's guide
- Cyber security : endpoint defense
- Cyber security engineering : a practical approach for systems and software assurance
- Cyber security essentials
- Cyber-Vigilance and Digital Trust
- Cyber-physical attack recovery procedures : a step-by-step preparation and response guide
- Cyber-vigilance and digital trust : cyber security in the era of cloud computing and IoT
- Cyberjutsu : cybersecurity for the modern ninja
- Cyberpower : crime, conflict and security in cyberspace
- Cybersecurity
- Cybersecurity : a self-teaching introduction
- Cybersecurity Manager's Guide
- Cybersecurity Ops with bash : attack, defend, and analyze from the command line
- Cybersecurity and Third-Party Risk : Third Party Threat Hunting
- Cybersecurity and decision makers : data security and digital trust
- Cybersecurity attacks (Red Team activity)
- Cybersecurity essentials
- Cybersecurity for Industrial Control Systems : SCADA, DCS, PLC, HMI, and SIS
- Cybersecurity for dummies
- Cybersecurity in humanities and social sciences : a research methods approach
- Cybersecurity in the COVID-19 pandemic
- Cybersecurity lexicon
- Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics
- Cyberspace sovereignty. : reflections on building a community of common future in cyberspace
- Data Mining and Machine Learning in Cybersecurity
- Data Protection and Information Lifecycle Management
- Data analytics for IT networks : developing innovative use cases
- Data breaches : crisis and opportunity
- Data mining and machine learning in cybersecurity
- Data privacy and GDPR handbook
- Data protection and the cloud : are the risks too great?
- Data security in the cloud
- DataPower SOA appliance service planning, implementation, and best practices
- Database nation : the death of privacy in the 21st century
- Defend I.T. : security by example
- Denial of service attacks
- Deployment guide series, IBM Tivoli Identity Manager 5.0
- Deployment guides series, IBM Tivoli Compliance Insight Manager
- Designing Network Security Second Edition
- Designing and implementing Linux firewalls and QoS using Netfilter, Iproute2, NAT, and L7-Filter : learn how to secure your system and implement QoS using real-world scenarios for networks of all sizes
- Designing secure software : a guide for developers
- Die Kunst der Anonymität im Internet : so schützen Sie Ihre Identität und Ihre Daten
- Digital forensics and cyber crime with Kali Linux fundamentals
- Digital forensics explained
- Digital forensics explained
- Digital resilience : is your company ready for the next cyber threat?
- Discrete dynamical systems and chaotic machines : theory and applications
- Dissecting the hack : the V3rb0ten network
- Dissecting the hack : the f0rb1dd3n network
- Distributed Denial of Service (DDoS) : practical detection and defense
- Dynamic SQL : applications, performance, and security : rapid response and flexibility in the face of changing business requirements
- E-mail Security : a Pocket Guide
- EISIC 2013 : 2013 European Intelligence and Security Informatics Conference : proceedings : 12-14 August 2013, Uppsala, Sweden
- Effective Oracle Database 10g security by design
- Elementary information security
- Elementary information security
- Elsevier's dictionary of information security in English, German, French and Russian
- Encryption : toward secure systems
- Endpoint security
- Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Manager
- Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data
- Enhanced networking on IBM z/VSE
- Enterprise DevOps for Architects
- Enterprise Java security : building secure J2EE applications
- Enterprise Mac security : El Capitan
- Enterprise devops for architects : leveraging AIops and devsecops for secure digital transformation
- Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons
- Enterprise security : a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
- Enterprise security architecture : a business-driven approach
- Enterprise software security : a confluence of disciplines
- Enterprise-wide security solutions presentation guide
- Essential computer security : everyone's guide to e-mail, Internet, and wireless security
- Essential cryptography for JavaScript developers : a practical guide to leveraging common cryptographic operations in Node.js and the browser
- Essential cybersecurity science : build, test, and evaluate secure systems
- Ethical hacking : SQL injections
- Ethical hacking : enumeration
- Ethical hacking : evasion techniques
- Ethical hacking : learning the basics
- Ethical hacking : malware fundamentals
- Ethical hacking : networks and websites
- Ethical hacking : orchestrating attacks
- Ethical hacking : scanning
- Ethical hacking : session hijacking
- Ethical hacking : sytem hacking
- Ethical hacking masterclass
- Exam ref MS-101 Microsoft 365 Mobility and Security
- Exposed : how revealing your data and eliminating privacy increases trust and liberates humanity
- FISMA certification & accreditation handbook
- Fight fire with fire : proactive cybersecurity strategies for today's leaders
- Five technological forces disrupting security : how cloud, social, mobile, big data and IoT are transforming physical security in the digital age
- Fluent 2016 : San Francisco, California video compilation
- Fluent Conference, San Jose, CA 2018
- Fluent conference 2015 : complete video compilation
- Fluent conference 2017, San Jose, CA
- Footprinting
- Foundations of Mac OS X Leopard security
- Foundations of information security : a straightforward introduction
- Fourth amendment issues raised by the FBI's "Carnivore" program : hearing before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, second session
- Fraud detection without feature engineering
- Fundamentals of information systems security
- Fundamentals of information systems security
- Fuzzing : brute force vulnerabilty discovery
- Geekonomics : the real cost of insecure software
- Generative malware outbreak detection
- Getting Started with HashiCorp Vault
- Getting started with Ghidra
- Getting started with Linux on Z Encryption for data at-rest
- Getting started with Windows Server Security : develop and implement a secure Microsoft infrastructure platform using native and built-in tools
- Getting started with cybersecurity science
- Getting started with z/OS data set encryption
- Ghidra software reverse engineering for beginners : analyze, identify, and avoid malicious code and potential threats in your networks and systems
- Google hacking for penetration testers
- Google hacking for penetration testers, Volume 2
- Googling security : how much does Google know about you?
- Gray hat C# : a hacker's guide to creating and automating security tools
- Gray hat hacking : the ethical hacker's handbook
- Gray hat hacking : the ethical hacker's handbook
- Gray hat hacking : the ethical hacker's handbook
- Gray hat hacking : the ethical hacker's handbook
- Group policy : fundamentals, security, and the managed desktop
- Group policy : fundamentals, security, and troubleshooting
- HP Nonstop server security : a practical handbook
- Hack I.T. : security through penetration testing
- Hacker techniques, tools, and incident handling
- Hacker techniques, tools, and incident handling, second edition
- Hackers Beware
- Hacking : der umfassende Praxis-Guide: inkl. Prüfungsvorbereitung zum CEHv10
- Hacking : the next generation
- Hacking and securing iOS applications
- Hacking exposed 7 : network security secrets & solutions
- Hacking exposed : malware and rootkits : security secrets & solutions
- Hacking exposed : web applications : web application security secrets and solutions
- Hacking exposed industrial control systems : ICS and SCADA security secrets & solutions
- Hacking for dummies
- Hacking for dummies
- Hacking for dummies
- Hacking the hacker : learn from the experts who take down hackers
- Handbook of SCADA/control systems security
- Handbook on securing cyber-physical critical infrastructure : foundation and challenges
- Hands on hacking
- Hands-on Spring Security 5 for Reactive applications : learn effective ways to secure your applications with Spring and Spring WebFlux
- Hands-on Spring security 5.1.1
- Hands-on artificial intelligence for cybersecurity : implement smart AI systems for preventing cyber attacks and detecting threats and network anomalies
- Hands-on cryptography with Java
- Hands-on machine learning for cybersecurity : safeguard your system by making your machines intelligent using the Python ecosystem
- Hands-on red team tactics : a practical guide to mastering red team operations
- Healthcare information security and privacy
- High-tech crimes revealed : cyberwar stories from the digital front
- Honeypot : a new paradigm to information security
- Honeypots : tracking hackers
- Honeypots and routers : collecting internet attacks
- Honeypots and routers : collecting internet attacks
- How cyber security can protect your business : a guide for all stakeholders
- How cybersecurity really works : a hands-on guide for total beginners
- How personal & Internet security works
- How to build an anomaly detection engine with Spark, Akka and Cassandra
- How to build privacy and security into deep learning models
- How to cheat at securing SQL server 2005
- How to cheat at securing your network
- How to own a shadow : the chase for Knuth
- How to secure and audit Oracle 10g and 11g
- Hunting security bugs
- IBM Business Process Manager security : concepts and guidance
- IBM Security Key Lifecycle Manager
- IBM WebSphere V5.0 security : Websphere handbook series
- IBM business process manager security : concepts and guidance
- IBM z/OS mainframe security and audit management using the IBM Security zSecure Suite
- ISCTURKEY 2020 : 2020 International Conference on Information Security and Cryptology : 3-4 December 2020, Middle East Technical University, Ankara, Turkey
- ISO27000 and information security : a combined glossary
- ISO27001/ISO27002 : 2013
- IT Governance : Guidelines for Directors
- IT Governance to Drive High Performance : Lessons from Accenture
- IT auditing : using controls to protect information assets
- IT auditing : using controls to protect information assets
- IT induction and information security awareness : a pocket guide
- IT security risk control management : an audit preparation plan
- IT-Sicherheit & Datenschutz
- Identity and access management : business performance through connected intelligence
- Implementing NetScaler VPX : implement the new features of Citrix NetScaler 11 to optimize and deploy secure web services on multiple virtualization platforms
- Implementing identity management on AWS : a real-world guide to solving customer and workforce IAM challenges in your AWS cloud environments
- In the Supreme Court of the United States, Nathan Van Buren, petitioner, v. United States of America, respondent : on writ of certiorari to the United States Court of Appeals for the Eleventh Circuit : brief of the Federal Law Enforcement Officers Association as amici curiae in support of respondent
- Incident management for operations
- Incident response & computer forensics
- Incident response & computer forensics
- Incident response primer : how to keep from getting pwned too hard
- Industrial Cybersecurity - Second Edition
- Information Security Management Handbook, Volume 6, 6th Edition
- Information assurance : dependability and security in networked systems
- Information assurance handbook : effective computer security and risk management strategies
- Information security : a practical guide : bridging the gap between IT and management
- Information security : contemporary cases
- Information security : principles and practices
- Information security : the complete reference
- Information security management metrics : a definitive guide to effective security monitoring and measurement
- Information security policies, procedures, and standards : a practitioner's reference
- Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
- Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
- Information security risk assessment toolkit : practical assessments through data collection and data analysis
- Information theft prevention : theory and practice
- Informationssicherheit und Datenschutz : Handbuch für Praktiker und Begleitbuch zum T.I.S.P.
- Infosecurity 2008 threat analysis
- Inside Java 2 platform security : architecture, API design, and implementation
- Inside the security mind : making the tough decisions
- Integrated security technologies and solutions, Volume I, Cisco Security Solutions for advanced threat protection with next generation firewall, intrusion prevention, AMP, and content security
- Integrated security technologies and solutions, Volume II, Cisco Security Solutions for network access control, segmentation, context sharing, secure connectivity, and virtualization
- Internet forensics
- Intro to secure software : building security systems
- Introduction to Computer Security
- Introduction to Cryptography with Open-Source Software
- Introduction to information security : LiveLessons (Sneak Peek Video Training)
- Introduction to malware analysis for incident responders
- Introduction to penetration testing
- Intrusion detection networks : a key to collaborative security
- Intrusion detection with Snort
- Intrusion prevention fundamentals
- Is it safe? : protecting your computer, your business, and yourself online
- J2EE security for servlets, EJBs and Web services : applying theory and standards to practice
- Java security
- Java security
- Java security handbook
- Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackers
- Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition
- Kali Linux cookbook : effective penetration testing solutions
- Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments
- Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
- Kali Linux tutorial for beginners
- Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack
- Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing
- Learn Kubernetes security : securely orchestrate, scale, and manage your microservices in Kubernetes deployments
- Learn ethical hacking from scratch
- Learn ethical hacking from scratch : your stepping stone to penetration testing
- Learn website hacking : penetration testing from scratch
- Learning PHP security
- Learning Puppet Security : secure your IT environments with the powerful secuity tools of Puppet
- Learning Whitehat hacking and penetration testing
- Learning computer forensics
- Learning malware analysis : explore the concepts, tools, and techniques to analyze and investigate Windows malware
- Linux Firewalls, Third Edition
- Linux annoyances for geeks
- Linux basics for hackers : getting started with networking, scripting, and security in Kali
- Linux essentials for cybersecurity lab manual
- Linux on IBM eserver zSeries and S/390 : best security practices
- Linux security : Red Hat Certificate of Expertise in server hardening (EX413) and LPIC-3 303 (Security) Exams
- Linux server security
- Linux troubleshooting course with real life examples
- Linux® hardening in hostile networks : server security from TLS to TOR
- MPLS VPN security
- Mac OS X security
- Mac OS X security and mobility v10.6
- Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
- Mac Security Bible
- Machine Learning Forensics for Law Enforcement, Security, and Intelligence
- Machine learning and security : protecting systems with data and algorithms
- Machine learning forensics for law enforcement, security, and intelligence
- Mainframe basics for security professionals : getting started with RACF
- Malicious cryptography : exposing cryptovirology
- Malicious mobile code : virus protection for Windows
- Malware : fighting malicious code
- Malware Analysis Techniques : Tricks for the Triage of Adversarial Software
- Malware data science : attack detection and attribution
- Malware forensics field guide for Linux systems
- Malware, rootkits & botnets : a beginner's guide
- Managing Information Security Breaches : Studies from Real Life
- Managing catastrophic loss of sensitive data
- Managing information security breaches : studies from real life
- Managing risk in information systems
- Managing risk in information systems
- Managing security with Snort and IDS tools
- Manually removing viruses and malware from Windows 7
- Mastering Defensive Security : Effective Techniques to Secure Your Windows, Linux, IoT, and Cloud Infrastructure
- Mastering FreeBSD and OpenBSD security
- Mastering Linux Security and Hardening - Second Edition
- Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
- Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
- Mastering Python forensics : master the art of digital forensics and analysis with Python
- Mastering System Center Data Protection Manager 2007
- Mastering VMware NSX for VSphere
- Mastering Windows network forensics and investigation
- Mastering Windows security and hardening : secure and protect your Windows environment from intruders, malware attacks, and other cyber threats
- Mastering reverse engineering : re-engineer your ethical hacking skills
- Mastering the Microsoft Deployment Toolkit : take a deep dive into the world of Windows desktop deployment using the Microsoft Deployment Toolkit
- Mastering the Nmap scripting engine : master the Nmap scripting engine and the art of developing NSE scripts
- Maximum Linux security : a hacker's guide to protecting your Linux server and workstation
- Maximum Security, Fourth Edition
- Maximum Security, Third Edition
- Maximum security
- Mehr Hacking mit Python : eigene Tools entwickeln für Hacker and Pentester
- Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules
- Metasploit toolkit for penetration testing, exploit development, and vulnerability research
- Microsoft Azure security center
- Microsoft Enterprise Mobility and Security training
- Microsoft Forefront threat management gateway (TMG) : administrator's companion
- Microsoft Internet security and acceleration (ISA) server 2004 administrator's pocket consultant
- Microsoft Windows 2000 security handbook
- Microsoft Windows XP networking and security : also covers Windows 2000
- Microsoft Windows server 2008 security resource kit
- Microsoft forefront security administration guide
- Microsoft security essentials : user manual
- Microsoft security fundamentals LiveLessons
- Microsoft windows security resource kit
- Mobile device security
- Mobile device security for dummies
- Modern cryptanalysis : techniques for advanced code breaking
- My online privacy for seniors
- NIST cybersecurity framework : a pocket guide
- Network Intrusion Detection, Third Edition
- Network and Information Systems (NIS) Regulations - A pocket guide for digital service providers
- Network and Information Systems (NIS) Regulations - A pocket guide for operators of essential services
- Network intrusion prevention design guide
- Network scanning cookbook : practical network security using Nmap and Nessus 7
- Network security : private communication in a public world
- Network security bible
- Network security hacks
- Network security hacks
- Network security tools
- Network sniffing
- Netzwerkangriffe von innen
- Nine steps to success : an ISO 27001 implementation overview
- Nine steps to success : an ISO27001:2013 implementation overview
- Ninja hacking : unconventional penetration testing tactics and techniques
- No tech hacking : a guide to social engineering, dumpster diving, and shoulder surfing
- O'Reilly Security Conference 2016, Amsterdam, Netherlands
- O'Reilly Security Conference 2017, New York, NY
- OS X exploits and defense
- OSSEC host-based intrusion detection guide
- Official (ISC)2 guide to the CISSP CBK
- Official (ISC)2 guide to the CSSLP
- Official (ISC)2 guide to the CSSLP CBK
- Once more unto the breach : managing information security in an uncertain world
- Opportunities and challenges in the IoT : a conversation with Tim O'Reilly and Cory Doctorow
- Oracle 11g Anti-hacker's Cookbook
- Oracle cloud user security : providing for separation of duties and appropriate access by job function
- PENETRATION TESTING MIT MIMIKATZ : das praxis-handbuchhacking-angriffe verstehen und pentests durchfuhren;das praxis-handbuchhacking-angriffe
- PHISHING AND COMMUNICATION CHANNELS : a guide to identifying and mitigating phishing attacks
- Penetration Testing for Dummies
- Penetration Testing mit Metasploit : Praxiswissen für mehr IT-Sicherheit
- Penetration Testing mit mimikatz : Das Praxis-Handbuch : Hacking-Angriffe verstehen und Pentests durchführen
- Penetration testing mit Metasploit : Eine praktische Einführung
- People-centric security : transforming your enterprise security culture
- Perl scripting for Windows security : live response, forensic analysis, and monitoring
- PoC GTFO, Volume III
- Podstawy ochrony komputerów
- Post-incident reviews : learning from failure for improved incident response
- Practical Linux security cookbook : secure your Linux environment from modern-day attacks with practical recipes
- Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes
- Practical Linux security solutions
- Practical PowerShell Security and Compliance Center
- Practical UNIX and Internet security
- Practical Windows forensics : leverage the power of digital forensics for Windows systems
- Practical cyber forensics : an incident-based approach to forensic investigations
- Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
- Practical internet of things security : design a security framework for an Internet connected ecosystem
- Practical intrusion analysis : prevention and detection for the twenty-first century
- Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus
- Practical security : simple practices for defending your systems
- Predicting malicious behavior : tools and techniques for ensuring global security
- Preventing ransomware : understand, prevent, and remediate ransomware attacks
- Privacy What Developers and IT Professionals Should Know
- Privacy and the Internet of Things
- Privacy defended : protecting yourself online
- Privacy is hard and seven other myths : achieving privacy through careful design
- Privacy, regulations, and cybersecurity : the essential business guide
- Professional C programming LiveLessons
- Professional Cocoa application security
- Programming Windows Identity Foundation
- Protecting Data Privacy Beyond the Trusted System of Record
- Python for cybersecurity : using Python for cyber offense and defense
- RC4 stream cipher and its variants
- RESILIA"!Pocketbook : Cyber Resilience Best Practice
- Ransomware : defending against digital extortion
- Ransomware protection playbook
- Real-world cryptography
- Red Hat Certificate of Expertise in server hardening - exam EX413 training : prepare to take the Red Hat EX413 exam and work towards your RHCA datacenter certification
- Reduce risk and improve security on IBM mainframes, Volume 2, Mainframe communication and networking security
- Reduce risk and improve security on IBM mainframes, Volume 3, Mainframe subsystem and application security
- Risk centric threat modeling : process for attack simulation and threat analysis
- Risk management for cybersecurity and IT managers
- Rootkits : subverting the Windows kernel
- Rootkits and bootkits : reversing modern malware and next generation threats
- SECURING CLOUD SERVICES;A PRAGMATIC APPROACH, SECOND EDITION
- SELINUX : NSA's open source security enhanced Linux
- SN Video coding and web development, SQL Injection attacks
- SN video coding and web development, Maximum privacy with end-to-end encryption
- SOA security
- SQL injection attacks : protect your system from vulnerabilities
- Salt at scale : lessons from LinkedIn
- Scene of the cybercrime : computer forensics handbook
- Schneier on security
- Secrets and lies : digital security in a networked world
- Secure XML : the new syntax for signatures and encryption
- Secure and Resilient Software
- Secure and resilient software : requirements, test cases, and testing methods
- Secure coding : principles and practices
- Secure coding in C and C++
- Secure coding in C and C++
- Secure edge computing : applications, techniques and challenges
- Secure programming cookbook for C and C++
- Secure programming with static analysis
- Securing Citrix XenApp Server in the enterprise
- Securing DB2 and implementing MLS on z/OS
- Securing DevOps
- Securing Java web applications with Spring Security : from JDBC and LDAP authentication to UI and method level security
- Securing Linux platforms and applications
- Securing PHP apps
- Securing Windows networks : from system security basics to monitoring and auditing