Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Computer Security"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"000 - Computer science, information & general works"
dewey-ones:"331 - Labor economics"
Showing
1
-
20
of
103
Search:
'"Computer Security"'
,
query time: 0.11s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Enterprise-wide security solutions presentation guide
by
Kigma, Cees
Published 1995
IBM Corp., International Technical Support Organization
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
2
Computer security fundamentals
by
Easttom, Chuck
Published 2011
Pearson
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
3
Maximum Security, Third Edition
by
Anonymous
Published 2001
Que
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Read Now
4
Learning Whitehat hacking and penetration testing
by
Messier, Ric
Published 2012
InfiniteSkills
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
5
Microsoft security fundamentals LiveLessons
by
Lieberman, Ed
Published 2014
Sams Publishing
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
6
The current security threat landscape
by
Santos, Omar
Published 2016
Cisco Press
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
Read Now
7
Anomaly detection for monitoring : a statistical approach to time series anomaly detection
by
Jinka, Preetam
,
Schwartz, Baron
Published 2015
O'Reilly Media
Subjects:
“
...Anomaly detection (
Computer
security
) / http://id.loc.gov/authorities/subjects/sh2005007675...
”
Call Number:
QA76.9.A25
Read Now
8
Security from first principles : a practical guide to the information security practice principles
by
Jackson, Craig
,
Russell, Scott
,
Sons, Susan
Published 2017
O'Reilly Media
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
Read Now
9
Docker security : using containers safely in production
by
Mouat, Adrian
Published 2015
O'Reilly Media
Subjects:
“
...
Computer
security
/ Management...
”
Call Number:
TK5105.59
Read Now
10
Ethical hacking : networks and websites
by
Gupta, Sunil
Published 2018
Apress
Subjects:
“
...Penetration testing (
Computer
security
) / fast / (OCoLC)fst01789566...
”
Call Number:
QA76.9.A25
Read Now
11
Enterprise penetration testing and continuous monitoring (The art of hacking series) : LiveLessons
by
Santos, Omar
Published 2019
Cisco Press
Subjects:
“
...Penetration testing (
Computer
security
) / fast / (OCoLC)fst01789566...
”
Call Number:
QA76.9.A25
Read Now
12
Agile security : an introduction for developers
by
Brunton-Spall, Michael
Published 2015
O'Reilly Media
Subjects:
“
...
Computer
security
/ fast / (OCoLC)fst00872484...
”
Call Number:
TK5105.888
Read Now
13
Ethical hacking : orchestrating attacks
by
Gupta, Sunil
Published 2018
Apress
Subjects:
“
...Penetration testing (
Computer
security
) / fast / (OCoLC)fst01789566...
”
Call Number:
QA76.9.A25
Read Now
14
Cybersecurity attacks (Red Team activity)
by
Nesterenko, Sergii
Published 2018
Packt
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
15
Certification study guide: IBM Tivoli Access Manager for e-business 6.0
by
Bücker, Axel
Published 2006
IBM, International Technical Support Organization
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.3
Read Now
16
CompTIA security+ (SYO-401) : complete video course
by
Shannon, Michael J.
Published 2014
Pearson Certification.
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
Read Now
17
Enhanced networking on IBM z/VSE
by
Schmidbauer, Joerg
Published 2014
[IBM Corp., International Technical Support Organization]
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.5
Read Now
18
Securing Windows networks : from system security basics to monitoring and auditing
by
Long, Mark
Published 2015
O'Reilly
Subjects:
“
...
Computer
security
...
”
Call Number:
HF5548.4.M527
Read Now
19
Getting Started with Ghidra
by
Messier, Ric
,
Berninger, Matt
Published 2019
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
20
Cryptography and network security
by
Bose, S.
,
Vijayakumar, P.
Published 2016
Pearson
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
1
2
3
4
5
6
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 000 - Computer science, information & general works
Clear Filter
Classification: 331 - Labor economics
Year of Publication
From:
To:
Classification
000 - Computer science, information & general works
331 - Labor economics
374 - Adult education
22
658 - General management
22
330 - Economics
6
338 - Production
6
more ...
364 - Criminology
6
500 - Natural sciences & mathematics
6
620 - Engineering & allied operations
3
384 - Communications; telecommunication
2
368 - Insurance
1
381 - Commerce
1
519 - Probabilities & applied mathematics
1
see all ...
less ...
Language
English
101
German
1
Undetermined
1
Collection
O'Reilly
103
Author
Pedersen, Thor
7
Messier, Ric
6
Gupta, Sunil
5
Santos, Omar
4
Bücker, Axel
3
Dion, Jason
3
more ...
Sabih, Zaid
3
O'Reilly & Associates
2
Sequeira, Anthony
2
Adams, Carlisle
1
Afzal, Imran
1
Anonymous
1
Barrett, Diane
1
Berninger, Matt
1
Bierer, Doug
1
Bose, S.
1
Brunton-Spall, Michael
1
Bussche, Martina vondem
1
Cada, Libor
1
Chakrabarty, Boudhayan
1
Chapple, Mike
1
Choi, Wai
1
Collins, Michael
1
Credle, Rufus
1
Dewey, Gary
1
Doctorow, Cory
1
Dooley, Kevin
1
Dotson, Chris
1
Dubrawsky, Ido
1
Easttom, Chuck
1
Ferguson, Bill
1
Galliers, Robert
1
Gil, Laurent
1
Gradisteanu, Cristian
1
Gregg, Michael
1
Hackers Academy
1
Hand, Jason
1
Harich, Thomas W.
1
Harris, Shon
1
Hucaby, David
1
IBM Storage Team
1
ITL Education Solutions Research and Development Wing
1
International Business Machines Corporation
1
Jackson, Craig
1
Jeremic, Vladimir
1
Jinka, Preetam
1
Johnson, Rob
1
Kaeo, Merike
1
Kaplan, Gerry
1
Kaplan, James M.
1
Kigma, Cees
1
Larsson, Jimmy
1
Leidner, Dorothy
1
Lelek, Tomasz
1
Lieberman, Ed
1
Liska, Allan
1
Lloyd, Steve
1
Long, Mark
1
Marty, Raffael
1
Mason, Andrew
1
Matei, Cristian
1
Memon, Qurban
1
Miller, David
1
Miller, Michael
1
Mishra, Ankit
1
Mouat, Adrian
1
Muniz, Joseph
1
Naja, Tarek
1
Nesterenko, Sergii
1
Norman, Thomas
1
O'Reilly Security Conference (2016, Amsterdam, Netherlands)
1
O'Reilly Security Conference (2017, New York, N.Y.)
1
O'Reilly, Tim
1
Odom, Wendell
1
Patil, Sandeep
1
Percival, Rob
1
Peterson, Andrew
1
Prowse, David L.
1
Punwani, Karan
1
Quintero, Dino
1
Ram, Jilumudi Raghu
1
Revay, Geri
1
Rothrock, Ray
1
Russell, Chad
1
Russell, Scott
1
Sak, Brian
1
Samancioglu, Atil
1
Samejima, Noriyuki
1
Schmidbauer, Joerg
1
Schwartz, Baron
1
Seidl, David
1
Shannon, Michael J.
1
Sons, Susan
1
Total Seminars LLC
1
Vagata, Pamela
1
Van der Oord, Friso
1
Vijayakumar, P.
1
Weiss, Martin M.
1
White, Jason
1
Wilcox, Jennifer
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22000+-+Computer+science%2C+information+%26+general+works%22&filter%5B%5D=dewey-ones%3A%22331+-+Labor+economics%22&lookfor=%22Computer+Security%22&type=Subject
Send by Email
×
Loading...