Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "computer security"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"001 - Knowledge"
language:"English"
Showing
1
-
9
of
9
Search:
'"computer security"'
,
query time: 2.85s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Big breaches : cybersecurity lessons for everyone
by
Daswani, Neil
,
Elbayadi, Moudy.
Published 2021
Apress
Subjects:
“
...
Computer
security
/ Case studies...
”
Call Number:
QA76.9.A25
Read Now
2
Case studies in secure computing : achievements and trends
Published 2014
Auerbach
Subjects:
“
...
Computer
security
/ fast / (OCoLC)fst00872484...
”
Call Number:
Internet Access
Read Now
3
Internet fraud casebook : the World Wide Web of deceit
by
Wells, Joseph T.
Published 2010
John Wiley & Sons
Subjects:
“
...
Computer
security
/ Case studies...
”
Call Number:
HV6773
Read Now
4
Practical social engineering : a primer for the ethical hacker
by
Gray, Joe
Published 2022
No Starch Press
Subjects:
“
...Penetration testing (
Computer
security
) / fast...
”
Call Number:
QA76.9.A25
Read Now
5
Dissecting the hack : the f0rb1dd3n network
by
Street, Jayson E.
Published 2010
Syngress/Elsevier
Subjects:
“
...
Computer
security
...
”
Call Number:
HV8079.C65
Read Now
6
Understanding anomaly detection : an exploration of anomaly detection's history, applications, and state-of-the-art techniques
by
Kejariwal, Arun
Published 2017
O'Reilly
Subjects:
“
...Anomaly detection (
Computer
security
) / fast / (OCoLC)fst01739215...
”
Call Number:
Q180.55.Q36
Read Now
7
The true cost of information security breaches and cyber crime
by
Krausz, Michael
Published 2013
IT Governance Pub.
Subjects:
“
...
Computer
security
/ Management...
”
Call Number:
QA76.9.A25
Read Now
8
Mobile malware attacks and defense
by
Dunham, Ken
Published 2009
Syngress Pub.
Subjects:
“
...Mobile
computing
/
Security
measures...
”
Call Number:
TK5102.85
Read Now
9
Leaders and innovators : how data-driven organizations are winning with analytics
by
Nguyen, Tho H.
Published 2016
Wiley
Table of Contents:
“
...; Deployment of the Cloud; Benefits of Cloud Computing; Disadvantages of Cloud
Computing
;
Security
: Cyber, Data...
”
Call Number:
QA76.9.I52
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 001 - Knowledge
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
001 - Knowledge
005 - Computer programming, programs & data
5
331 - Labor economics
5
364 - Criminology
4
330 - Economics
2
658 - General management
2
more ...
000 - Computer science, information & general works
1
006 - Special computer methods
1
153 - Mental processes & intelligence
1
302 - Social interaction
1
338 - Production
1
384 - Communications; telecommunication
1
519 - Probabilities & applied mathematics
1
620 - Engineering & allied operations
1
see all ...
less ...
Language
English
Collection
O'Reilly
9
Author
Abu-Nimeh, Saeed
1
Daswani, Neil
1
Dunham, Ken
1
Elbayadi, Moudy
1
Gray, Joe
1
Israr, Nauman
1
more ...
Issac, Biju
1
Kejariwal, Arun
1
Krausz, Michael
1
Nguyen, Tho H.
1
Street, Jayson E.
1
Walker, John
1
Wells, Joseph T.
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22001+-+Knowledge%22&filter%5B%5D=language%3A%22English%22&lookfor=%22computer+security%22&type=AllFields
Send by Email
×
Loading...