Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "humanities"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
dewey-ones:"331 - Labor economics"
Showing
1
-
20
of
62
Search:
'"humanities"'
,
query time: 0.35s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Security : the Human Factor
by
Kearney, Paul
Published 2010
IT Governance Pub.
Table of Contents:
“
...: People are Helpful and Trusting; Chapter 6: Harnessing
Human
Qualities to Improve Security; Chapter 7...
”
Call Number:
HD30.2
Read Now
2
Social engineering : the art of human hacking
by
Hadnagy, Christopher
Published 2011
Wiley
Subjects:
“
...
Human
-computer interaction / fast...
”
Call Number:
QA76.9.C66
Read Now
3
The art of deception : controlling the human element of security
by
Mitnick, Kevin
,
Simon, William L.
Published 2002
Wiley
“
...Focusing on the
human
factors involved with information security, Mitnick explains why all...
”
Call Number:
QA76.9.A25
Read Now
4
Learn social engineering : learn the art of human hacking with an internationally renowned expert
by
Ozkaya, Erdal
Published 2018
Packt Publishing
Call Number:
QA76.9.A25
Read Now
5
The security culture playbook : an executive guide to reducing risk and developing your human defense layer
by
Carpenter, Perry
,
Roer, Kai
Published 2022
John Wiley & Sons, Inc.
“
...Mitigate
human
risk and bake security into your organization's culture from top to bottom...
”
Call Number:
QA76.9.A25
Read Now
6
The security culture playbook : an executive guide to reducing risk and developing your human defense layer
by
Carpenter, Perry
,
Roer, Kai
Published 2022
Ascent Audio
“
... into how to transform your organization's security culture and reduce
human
risk at every level. This book...
”
Call Number:
QA76.9.A25
Read Now
7
Hands-On Generative Adversarial Networks with Pytorch 1. x : Implement Next-Generation Neural Networks to Build Powerful GAN Models Using Python
by
Hany, John
Published 2019
Packt Publishing, Limited
Subjects:
“
...Computers / Social Aspects /
Human
-Computer Interaction / bisacsh...
”
Call Number:
QA76.73.P98
Read Now
8
Designing social interfaces : principles, patterns, and practices for improving the user experience
by
Crumlish, Christian
,
Malone, Erin
Published 2015
O'Reilly
Subjects:
“
...
Human
-computer interaction / fast...
”
Call Number:
QA76.9.U83
Read Now
9
Practical Bot development : designing and building Bots with Node.js and Microsoft Bot framework
by
Rozga, Szymon
Published 2018
Apress
Table of Contents:
“
...Other FunctionsConversational Experience Guidelines; Focus; Don't Pretend the Bot Is a
Human
; Do...
”
Call Number:
QA76.9.U83
Read Now
10
Software for Your Head : Core Protocols for Creating and Maintaining Shared Vision
by
McCarthy, Jim
,
McCarthy, Michele
Published 2001
Addison Wesley Professional
Subjects:
“
...Computer software /
Human
factors / fast...
”
Call Number:
QA76.76.D47M3875
Read Now
11
Securing the clicks : network security in the age of social media
by
Bahadur, Gary
Published 2012
McGraw-Hill
Table of Contents:
“
... media security policy best practices --
Human
resources : strategy & collaboration -- Utilization...
”
Call Number:
TK5105.59
Read Now
12
Antipatterns : managing software organizations and people
by
Neill, Colin J.
Published 2012
CRC Press
Table of Contents:
“
...Patterns and antipatterns --
Human
patterns and antipatterns -- Group patterns and antipatterns...
”
Call Number:
QA76.76.D47
Read Now
13
Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them
by
Skulkin, Oleg
Published 2022
Packt Publishing, Limited
Table of Contents:
“
...Section 1: Getting Started with a Modern Ransomware Attack -- Chapter 1: The History of
Human
...
”
Call Number:
QA76.9.A25
Read Now
14
The cyber risk handbook : creating and measuring effective cybersecurity capabilities
by
Antonucci, Domenic
Published 2017
John Wiley and Sons, Inc.
Table of Contents:
“
... -- Culture and
human
factors -- Legal and compliance -- Assurance and cyber risk management -- Information...
”
Call Number:
HD30.38
Read Now
15
Penetration tester's open source toolkit
by
Faircloth, Jeremy
Published 2011
Syngress
Table of Contents:
“
...Tools of the trade -- Reconnaissance -- Scanning and enumeration -- Client-side attacks and
human
...
”
Call Number:
QA76.9.A25
Read Now
16
Essential cybersecurity science : build, test, and evaluate secure systems
by
Dykstra, Josiah
Published 2016
O'Reilly Media
Table of Contents:
“
... analysis -- System security engineering --
Human
-computer interaction and usable security -- Visualization...
”
Call Number:
QA76.9.A25
Read Now
17
Software test attacks to break mobile and embedded devices
by
Hagar, Jon Duncan
Published 2014
CRC Press
Table of Contents:
“
... : "it's about time" --
Human
user interface attacks : "the limited (and unlimited) user interface" -- Smart...
”
Call Number:
QA76.9.A25
Read Now
18
Infosec management fundamentals
by
Dalziel, Henry
Published 2015
Elsevier
Table of Contents:
“
... management --
Human
resources security management -- Asset management -- Access management -- Cryptography...
”
Call Number:
QA76.9.A25
Read Now
19
Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies
by
Winkler, Ira
,
Gomes, Araceli Treu
Published 2017
Syngress
Table of Contents:
“
...? -- Detection deficit disorder -- The
human
intrusion detection system -- Kill chain analysis -- Setting...
”
Call Number:
TK5105.59
Read Now
20
Building an information security awareness program
by
Desman, Mark B.
Published 2002
Auerbach Publications
Table of Contents:
“
... -- chapter 12 The Best Toys in Town -- chapter 13 Back to School -- chapter 14 Other Resources:
Human
...
”
Call Number:
QA76.9.A25
1
2
3
4
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Clear Filter
Classification: 331 - Labor economics
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
331 - Labor economics
658 - General management
12
500 - Natural sciences & mathematics
10
330 - Economics
9
620 - Engineering & allied operations
8
more ...
302 - Social interaction
6
338 - Production
5
374 - Adult education
5
745 - Decorative arts
4
006 - Special computer methods
3
364 - Criminology
3
384 - Communications; telecommunication
3
153 - Mental processes & intelligence
2
001 - Knowledge
1
158 - Applied psychology
1
300 - Social sciences
1
332 - Financial economics
1
368 - Insurance
1
see all ...
less ...
Language
English
60
Japanese
1
Undetermined
1
Collection
O'Reilly
62
Author
Carpenter, Perry
3
Andress, Jason
2
Clarke, Glen E.
2
Ozkaya, Erdal
2
Roer, Kai
2
Anderson, Brian
1
more ...
Andrew, Paul
1
Antonucci, Domenic
1
Aslaner, Milad
1
Bahadur, Gary
1
Bentley, Peter J.
1
Bettany, Andrew
1
Bhushan, Bharat
1
Buchanan, Cameron
1
Carvalho, Alex de
1
Cole, Eric
1
Collins-Sussman, Ben
1
Conard, James M.
1
Conklin, Wm. Arthur
1
Contos, Brian T.
1
Corne, David
1
Cothren, Chuck
1
Crawley, Kim
1
Crumlish, Christian
1
Dalziel, Henry
1
Das, Ravindra
1
Das, Sajal K.
1
Davis, Roger
1
Davison, Iain
1
DeFranco, Joanna F.
1
DeSanto, David
1
Debnath, N. C.
1
Desman, Mark B.
1
Dunkerley, Dawn
1
Dykstra, Josiah
1
Evans, Keatron
1
Faircloth, Jeremy
1
Fitzpatrick, Brian W.
1
Flanders, Jon
1
Gaurav, Suraj
1
Gomes, Araceli Treu
1
Gonzalez, Deborah
1
Gragido, Will
1
Gray, Joe
1
Grimes, Roger A.
1
Hadnagy, Christopher
1
Hagar, Jon Duncan
1
Halsey, Mike
1
Hany, John
1
Heller, Daniel
1
Inasi, Jason
1
Jaswal, Nipun
1
Kado, Masanori
1
Kant, Krishna
1
Kearney, Paul
1
Kelley, Diana
1
Kudrati, Abbas
1
Laplante, Phillip A.
1
Levesque, Warun
1
Machiraju, Suren
1
Malone, Erin
1
Marchesini, John
1
McCarthy, Jim
1
McCarthy, Michele
1
McLafferty, Michael
1
Mehan, Julie E.
1
Meyers, Mike
1
Misra, Anmol
1
Mitnick, Kevin
1
Moyle, Ed
1
Mutch, John
1
Neill, Colin J.
1
O'Hanley, Richard
1
Okereafor, Kenneth
1
Pillai, Binil
1
Pirc, John
1
Powell, Juliette
1
Price, Mark J.
1
Ransome, James F.
1
Ring, Sandra
1
Rozga, Szymon
1
Rubinoff, Shira
1
Salmon, Arthur
1
Schmidt, Howard A.
1
Schneier, Bruce
1
Schoenfield, Brook S. E.
1
Schroeder, Jordan
1
Shackleford, Dave
1
Sharma, Sudhir Kumar
1
Simon, William L.
1
Skulkin, Oleg
1
Smith, Sean W.
1
Studholme, Alan
1
Tiller, James S.
1
Voth, Jack B.
1
Walters, Greg
1
Whitaker, Andrew
1
White, Gregory B.
1
Winkler, Ira
1
Woodgate, Scott
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&filter%5B%5D=dewey-ones%3A%22331+-+Labor+economics%22&lookfor=%22humanities%22&type=AllFields
Send by Email
×
Loading...