Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Computers ; ; ; ; ; ; ; ;"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
dewey-ones:"364 - Criminology"
product_txtF_mv:"O'Reilly"
Search alternatives
:
computers »
computer
Showing
1
-
20
of
100
Search:
'"Computers ; ; ; ; ; ; ; ;"'
,
query time: 0.02s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Zen and the art of information security
by
Winkler, Ira
Published 2007
Syngress
Subjects:
“
...
Computer
security...
”
Call Number:
QA76.9.A25
Read Now
2
Computer incident response and forensics team management : conducting a successful incident response
by
Johnson, Leighton
Published 2014
Syngress
Subjects:
“
...
Computer
security...
”
Call Number:
HV8079.C65
Read Now
3
Ninja hacking : unconventional penetration testing tactics and techniques
by
Wilhelm, Thomas
Published 2011
Syngress/Elsevier
Subjects:
“
...
Computer
security...
”
Call Number:
QA76.9.A25
Read Now
4
Internet forensics
by
Jones, Robert
Published 2006
O'Reilly
Subjects:
“
...
Computer
security...
”
Call Number:
HV8079.C65
Read Now
5
Computer forensics for dummies
by
Volonino, Linda
Published 2008
Wiley
Subjects:
“
...
Computer
security...
”
Call Number:
HV8079.C65
Read Now
6
An introduction to hacking and crimeware : a pocket guide
by
Loewengart, Victoria
Published 2012
IT Governance Pub.
Subjects:
“
...
COMPUTERS
/ Internet / Security / bisacsh...
”
Call Number:
QA76.9.A25
Read Now
7
Emerging trends in ICT security
Published 2013
Morgan Kaufmann/Elsevier
Subjects:
“
...
COMPUTERS
/ Internet / Security / bisacsh...
”
Call Number:
QA76.9.A25
Read Now
8
Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them
by
Skulkin, Oleg
Published 2022
Packt Publishing, Limited
Subjects:
“
...Malware (
Computer
software) / http://id.loc.gov/authorities/subjects/sh2009005103...
”
Call Number:
QA76.9.A25
Read Now
9
Digital identity
by
Windley, Phillip J.
Published 2005
O'Reilly
Subjects:
“
...
COMPUTERS
/ Internet / Security / bisacsh...
”
Call Number:
TK5105.59
Read Now
10
Incident response & computer forensics
by
Prosise, Chris
Published 2003
McGraw-Hill/Osborne
Subjects:
“
...
Computer
security...
”
Call Number:
QA76.9.A25
Read Now
11
Seven deadliest web application attacks
by
Shema, Mike
Published 2010
Syngress
Subjects:
“
...
COMPUTERS
/ Internet / Security / bisacsh...
”
Call Number:
TK5105.59
Read Now
12
Managing a network vulnerability assessment
by
Peltier, Thomas R.
Published 2003
Auerbach Publications
Subjects:
“
...
COMPUTERS
/ Internet / Security / bisacsh...
”
Call Number:
TK5105.59
Read Now
13
Web Application Defender's Cookbook : Battling Hackers and Protecting Users
by
Barnett, Ryan C.
Published 2013
Wiley Pub., Inc.
Subjects:
“
...
Computer
security...
”
Call Number:
QA76.9.A25
Read Now
14
IT security metrics : a practical framework for measuring security & protecting data
by
Hayden, Lance
Published 2010
McGraw Hill
Subjects:
“
...
COMPUTERS
/ Internet / Security / bisacsh...
”
Call Number:
QA76.9.A25
Read Now
15
Cisco router and switch forensics : investigating and analyzing malicious network activity
by
Liu, Dale
Published 2009
Syngress
Subjects:
“
...
COMPUTERS
/ Internet / Security / bisacsh...
”
Call Number:
TK5105.59
Read Now
16
Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
by
Kubasiak, Ryan R.
Published 2009
Syngress Pub.
Subjects:
“
...
Computer
security...
”
Call Number:
QA76.9.A25
Read Now
17
Android forensics : investigation, analysis, and mobile security for Google Android
by
Hoog, Andrew
Published 2011
Syngress
Subjects:
“
...
COMPUTERS
/ Operating Systems / Windows Workstation / bisacsh...
”
Call Number:
TK5105.885.G66
Read Now
18
Intelligent mobile malware detection
by
Thomas, Tony
,
John, Teenu S.
,
Surendran, Roopak
,
Alazab, Mamoun
Published 2023
CRC Press
Subjects:
“
...Mobile
computing
/ Security measures...
”
Call Number:
TK5105.59
Read Now
19
Managing Information Security Breaches : Studies from Real Life
by
Krausz, Michael
Published 2010
IT Governance Pub.
Subjects:
“
...
Computer
security...
”
Call Number:
QA76.9.A25
Read Now
20
Mobile malware attacks and defense
by
Dunham, Ken
Published 2009
Syngress Pub.
Subjects:
“
...Mobile
computing
/ Security measures...
”
Call Number:
TK5102.85
1
2
3
4
5
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Clear Filter
Classification: 364 - Criminology
Clear Filter
Collection: O'Reilly
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
364 - Criminology
331 - Labor economics
68
500 - Natural sciences & mathematics
19
330 - Economics
8
338 - Production
6
more ...
658 - General management
6
384 - Communications; telecommunication
5
001 - Knowledge
3
620 - Engineering & allied operations
3
368 - Insurance
1
374 - Adult education
1
510 - Mathematics
1
600 - Technology
1
670 - Manufacturing
1
see all ...
less ...
Language
English
97
German
1
Japanese
1
Polish
1
Collection
O'Reilly
Author
Albing, Carl
3
Aquilina, James M.
3
Casey, Eoghan
3
Krausz, Michael
3
Malin, Cameron H.
3
Troncone, Paul
3
more ...
Borges, Dan
2
DeFranco, Joanna F.
2
Katz, Sarah
2
Shema, Mike
2
Shinder, Debra Littlejohn
2
Windley, Phillip J.
2
Abu-Nimeh, Saeed
1
Akhgar, Babak
1
Alazab, Mamoun
1
Andress, Jason
1
Antonucci, Domenic
1
Anzaldua, Reynaldo
1
Arabnia, Hamid
1
Aslam, Abdul
1
Barnett, Ryan C.
1
Bautista, Wilson
1
Bergman, Neil
1
Bhagavatula, Ramya Sai
1
Blackley, John A.
1
Bochman, Andrew A.
1
Bodungen, Clint E.
1
Bolt, Steven
1
Brooks, Charles L.
1
Bryce, Chapin
1
Butler, William
1
Case, Andrew
1
Clarke, Nathan
1
Courcier, Scar de
1
Cross, Michael
1
Datt, Samir
1
Davidoff, Sherri
1
DiMaggio, Jon
1
Dietrich, Sven
1
Diogenes, Yuri
1
Dittrich, David
1
Donaldson, Scott E.
1
Dunham, Ken
1
Easttom, Chuck
1
Edwards, Jason
1
Ely, Adam
1
Enbody, Richard J.
1
Engebretson, Pat
1
Engebretson, Patrick
1
Fichera, Joe
1
Freed, Anthony M.
1
Freeman, Sarah G.
1
Frenz, Christopher
1
Gallo, Timothy
1
Golden, Ryan
1
Gralla, Preston
1
Gregory, Peter H.
1
Grimes, Roger A.
1
Grubb, Sam
1
Hassan, Nihad A.
1
Hayden, Lance
1
Hilt, Stephen
1
Hoog, Andrew
1
Howard, Patrick D.
1
Howard, Richard
1
Isik, Öykü
1
Jaswal, Nipun
1
John, Teenu S.
1
Johnson, Leighton
1
Jones, Robert
1
Khan, Latifur
1
Kleiman, Dave
1
Kubasiak, Ryan R.
1
Kuhlee, Lorenz
1
Lakhani, Aamir
1
Leo, Philipp
1
Levy, Jamie
1
Ligh, Michael Hale
1
Liska, Allan
1
Liu, Dale
1
Loewengart, Victoria
1
Luttgens, Jason T.
1
Maley, Bob
1
Mandia, Kevin
1
Martinez, Roberto
1
Masud, Mehedy
1
McCarty, Ben
1
McCash, John
1
McDonough, Bart R.
1
Mehan, Julie E.
1
Miller, Preston
1
Mirkovic, Jelena
1
Morrissey, Sean
1
Morton, Georgina
1
Muhly, Fabian
1
Muniz, Joseph
1
O'Connor, T. J.
1
Oriyano, Sean-Philip
1
Ozkaya, Erdal
1
Parveen, Pallabi
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&filter%5B%5D=product_txtF_mv%3A%22O%27Reilly%22&lookfor=%22Computers+%3B+%3B+%3B+%3B+%3B+%3B+%3B+%3B%22&type=Subject
Send by Email
×
Loading...