Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "computer security"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
language:"English"
newitem_txtF:"last_month"
Showing
1
-
20
of
26
Search:
'"computer security"'
,
query time: 0.14s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Mastering Cybersecurity : Strategies, Technologies, and Best Practices
by
Edwards, Jason
Published 2024
Apress L. P.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
2
Linux networking and security : basics and beyond
by
Prowse, David L.
Published 2024
Pearson
Subjects:
“
...
Computer
security
/ Standards / http://id.loc.gov/authorities/subjects/sh99004226...
”
Call Number:
QA76.9.A25
Read Now
3
Evasive malware : a field guide to detecting, analyzing, and defeating advanced threats
by
Cucci, Kyle
Published 2024
No Starch Press
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.C68
Read Now
4
MALWARE DEVELOPMENT FOR ETHICAL HACKERS : learn how to develop various types of malware to strengthen cybersecurity
by
Zhussupov, Zhassulan
Published 2024
Packt Publishing Ltd.
Subjects:
“
...Penetration testing (
Computer
security
) / http://id.loc.gov/authorities/subjects/sh2011003137...
”
Call Number:
QA76.9.A25
Read Now
5
BUG BOUNTY FROM SCRATCH : a comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
by
Santiago Vázquez, Francisco Javier
Published 2024
Packt Publishing Ltd.
Subjects:
“
...Penetration testing (
Computer
security
) / http://id.loc.gov/authorities/subjects/sh2011003137...
”
Call Number:
QA76.9.A25
Read Now
6
INTRODUCTION TO KALI PURPLE : harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux
by
Lane, Karl
Published 2024
Packt Publishing Ltd.
Subjects:
“
...Penetration testing (
Computer
security
) / http://id.loc.gov/authorities/subjects/sh2011003137...
”
Call Number:
QA76.9.A25
Read Now
7
Identity security for software development
by
Walsh, John
,
Ailon, Uzi
Published 2024
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.D47
Read Now
8
Defensive security handbook : best practices for securing infrastructure
by
Berlin, Amanda
,
Brotherston, Lee
,
Reyor, William F.
Published 2024
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ United States / Planning...
”
Call Number:
QA76.9.A25
Read Now
9
Decentralized Identity Explained : Embrace Decentralization for a More Secure and Empowering Digital Experience
by
Pinto, Rohan
Published 2024
Packt Publishing, Limited
Subjects:
“
...
Computer
security
/ Management...
”
Call Number:
QA76.9.A25
Read Now
10
CISSP for dummies
by
Miller, Lawrence
,
Gregory, Peter H.
Published 2024
John Wiley & Sons, Inc.
Subjects:
“
...
Computer
security
/ Examinations / Study guides...
”
Call Number:
QA76.3
Read Now
11
Microcontroller exploits
by
Goodspeed, Travis
Published 2024
No Starch Press, Inc.
Subjects:
“
...Penetration testing (
Computer
security
) / http://id.loc.gov/authorities/subjects/sh2011003137...
”
Call Number:
QA76.9.A25
Read Now
12
THE ASPIRING CIO AND CISO : a career guide to developing leadership skills, knowledge, experience, and behavior
by
GEE, DAVID J.
Published 2024
Packt Publishing Ltd.
Subjects:
“
...
Computer
security
/ Vocational guidance...
”
Call Number:
QA76.9.A25
Read Now
13
SECURING CLOUD PCs AND AZURE VIRTUAL DESKTOP : start implementing and optimizing security for Windows 365 and AVD infrastructure
by
Verham, Dominiek
,
Vanneuville, Johan
Published 2024
Packt Publishing Ltd.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.V5
Read Now
14
Getting started with eBPF : improving observability, networking, and security through custom eBPF programs
by
Rice, Liz
Published 2024
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.A65
Read Now
15
IT governance : an international guide to data security and ISO 27001/ISO 27002
by
Calder, Alan
,
Watkins, Steve
Published 2024
IT Governance Publishing Ltd
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
16
CompTIA Security+ SY0-701 exam cram
by
Shimonski, Robert
,
Weiss, Martin
Published 2024
Pearson IT Certification
Subjects:
“
...
Computer
security
/ Examinations / Study guides...
”
Call Number:
QA76.9.A25
Read Now
17
Spring Security : effectively secure your web apps, RESTful services, cloud apps, and microservice architectures
by
Nasslahsen, Badr
Published 2024
Packt Publishing Ltd.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
18
Spring Security in action
by
Spilcă, Laurenţiu
Published 2024
Manning Publications
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
19
Automating Security Detection Engineering : A Hands-On Guide to Implementing Detection As Code
by
Chow, Dennis
Published 2024
Packt Publishing, Limited
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
20
The Reign of Botnets : Defending Against Abuses, Bots and Fraud on the Internet
by
Sénécal, David
Published 2024
John Wiley & Sons, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Clear Filter
Language: English
Clear Filter
Recently Uploaded: Last Month
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
331 - Labor economics
10
658 - General management
4
330 - Economics
2
338 - Production
2
374 - Adult education
2
more ...
368 - Insurance
1
500 - Natural sciences & mathematics
1
600 - Technology
1
see all ...
less ...
Language
English
Collection
O'Reilly
25
Springer Book Archives -2004
1
Author
Ailon, Uzi
1
Berlin, Amanda
1
Brotherston, Lee
1
Bruskin, David
1
Calder, Alan
1
Chow, Dennis
1
more ...
Cucci, Kyle
1
Edwards, Jason
1
GEE, DAVID J.
1
Goodspeed, Travis
1
Gregory, Peter H.
1
Kenyon, Bridget
1
Lane, Karl
1
Leyte-Vidal, James
1
Mihailescu, Marius Iulian
1
Miller, Lawrence
1
Nasslahsen, Badr
1
Nita, Stefania Loredana
1
Okamoto, Eiji
1
Pieprzyk, Josef
1
Pinto, Rohan
1
Prowse, David L.
1
Pylayeva, Dana
1
Reyor, William F.
1
Rice, Liz
1
Santiago Vázquez, Francisco Javier
1
Santos, Omar
1
Seberry, Jennifer
1
Shimonski, Robert
1
Spilcă, Laurenţiu
1
Sénécal, David
1
Vanneuville, Johan
1
Verham, Dominiek
1
Walsh, John
1
Watkins, Steve
1
Weiss, Martin
1
West, Darryl
1
Zhussupov, Zhassulan
1
see all ...
less ...
Recently Uploaded
Last Month
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&filter%5B%5D=language%3A%22English%22&filter%5B%5D=newitem_txtF%3A%22last_month%22&lookfor=%22computer+security%22&type=AllFields
Send by Email
×
Loading...