Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Computers / Networking / Security / Bisacsh"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
language:"English"
Search alternatives
:
computers »
computer
Showing
141
-
160
of
293
Search:
'"Computers / Networking / Security / Bisacsh"'
,
query time: 0.33s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
141
Hacking for dummies
by
Beaver, Kevin
Published 2016
John Wiley & Sons, Inc.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
142
The mobile application hacker's handbook
by
Chell, Dominic
Published 2015
John Wiley & Sons
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.59
Read Now
143
Developer's guide to web application security
by
Cross, Michael
Published 2007
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
144
Conducting network penetration and espionage in a global environment
by
Middleton, Bruce
Published 2014
CRC Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
145
Beautiful security
by
Oram, Andrew
Published 2009
O'Reilly
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
146
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
by
Zalewski, Michal
Published 2005
No Starch Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59 .Z35 2005eb
Read Now
147
Linux server security
by
Bauer, Michael D.
Published 2005
O'Reilly
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
148
Multilevel modeling of secure systems in QoP-ML
by
Ksie̜żopolski, Bogdan
Published 2015
CRC Press, Taylor & Francis
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
149
Implementing SSL/TLS using cryptography and PKI
by
Davies, Joshua A.
Published 2011
Wiley
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5015.59
Read Now
150
OSSEC host-based intrusion detection guide
by
Hay, Andrew
Published 2008
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
151
Incident response & computer forensics
by
Prosise, Chris
Published 2003
McGraw-Hill/Osborne
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
152
Kali Linux wireless penetration testing : master wireless testing techniques to survey and attack wireless networks with Kali Linux
by
Ramachandran, Vivek
,
Buchanan, Cameron
Published 2015
Packt Publishing
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5103.2
Read Now
153
Seven deadliest web application attacks
by
Shema, Mike
Published 2010
Syngress
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
154
Intelligent systems for security informatics
by
Yang, Christopher C.
Published 2013
Academic Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
155
E-mail Security : a Pocket Guide
by
Furnell, Steven
Published 2010
IT Governance Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
156
Official (ISC)2® guide to the ISSAP® CBK®
by
Gordon, Adam
Published 2014
CRC Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
157
Hacking exposed : web applications : web application security secrets and solutions
by
Scambray, Joel
Published 2011
McGraw-Hill
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
158
Hacking for dummies
by
Beaver, Kevin
Published 2010
Wiley Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
159
Penetration testing : a hands-on introduction to hacking
by
Weidman, Georgia
Published 2014
No Starch Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
160
Virtualization for security : including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
by
Hoopes, John
Published 2009
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.V5
3
4
5
6
7
8
9
10
11
12
13
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
331 - Labor economics
288
384 - Communications; telecommunication
35
658 - General management
27
500 - Natural sciences & mathematics
24
364 - Criminology
22
more ...
374 - Adult education
19
620 - Engineering & allied operations
17
330 - Economics
10
338 - Production
6
381 - Commerce
3
745 - Decorative arts
3
001 - Knowledge
1
158 - Applied psychology
1
302 - Social interaction
1
368 - Insurance
1
see all ...
less ...
Language
English
Collection
O'Reilly
288
Elsevier ScienceDirect eBooks
5
Author
Gregg, Michael
6
Andress, Jason
5
Vacca, John R.
5
Beaver, Kevin
4
Cherry, Denny
4
Cross, Michael
4
more ...
Diogenes, Yuri
4
Dalziel, Henry
3
Dulaney, Emmett A.
3
Howard, Michael
3
LeBlanc, David
3
Mitnick, Kevin
3
Orebaugh, Angela
3
Shinder, Thomas W.
3
Viega, John
3
Babbin, Jacob
2
Baskin, Brian
2
Bidgoli, Hossein
2
Bindner, Andrew
2
Broad, James
2
Calder, Alan
2
Dubrawsky, Ido
2
Furnell, Steven
2
Hoffman, Daniel
2
Hurley, Chris
2
Kissell, Joe
2
Koziol, Jack
2
Krausz, Michael
2
Krutz, Ronald L.
2
LaRock, Thomas
2
Litchfield, David
2
Liu, Dale
2
Liu, Vincent
2
Martin, Jason L.
2
McPherson, Robert
2
Miyamoto, I
2
Peikari, Cyrus
2
Ramirez, Gilbert
2
Rogers, Russ
2
Scambray, Joel
2
Seitz, Justin
2
Shinder, Debra Littlejohn
2
Simon, William L.
2
Taylor, Andy
2
Tiller, James S.
2
Varsalone, Jesse
2
Watkins, Stephen
2
Wilhelm, Thomas
2
Zalewski, Michal
2
Abu-Nimeh, Saeed
1
Adamson, James K.
1
Ahmad, David R. Mirza
1
Ahmed, Mohiuddin
1
Akhgar, Babak
1
Akin, Thomas
1
Alazab, Mamoun
1
Alexander, David
1
Ali, Shakeel
1
Alpern, Naomi J.
1
Alvarado, Ellen
1
Amiri, Iraj Sadegh
1
Anderson, Brian
1
Anley, Chris
1
Anoop, Mangla
1
Ansari, Juned Ahmed
1
Anzaldua, Reynaldo
1
Arabnia, Hamid
1
Archibald, Neil
1
Ashbourn, Julian
1
Baccas, Paul
1
Bachaalany, Elias
1
Bahadur, Gary
1
Baker, Andrew R.
1
Balas, Valentina Emilia
1
Barker, William
1
Barnett, Ryan C.
1
Barrett, Daniel J.
1
Barrett, Diane
1
Bauer, Michael D.
1
Bauhaus, Mark
1
Bayuk, Jennifer L.
1
Beale, Jay
1
Ben-Natan, Ron
1
Benton, K. David
1
Bergman, Neil
1
Bertocci, Vittorio
1
Biles, Simon
1
Blackley, John A.
1
Blount, Sumner
1
Bond, Michael
1
Bonnell, Ralph
1
Boutaba, Raouf
1
Bowen, Richard Cooper
1
Boyles, Tim
1
Bradley, Tony
1
Bramwell, Phil
1
Bray, Rory
1
Brenton, Chris
1
Brunner, Stefan
1
Bryce, Chapin
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?page=8&filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&filter%5B%5D=language%3A%22English%22&lookfor=%22Computers+%2F+Networking+%2F+Security+%2F+Bisacsh%22&type=Subject
Send by Email
×
Loading...