Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "computer security"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"331 - Labor economics"
dewey-ones:"620 - Engineering & allied operations"
Showing
1
-
20
of
69
Search:
'"computer security"'
,
query time: 0.16s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Computer
security
fundamentals
by
Easttom, Chuck
Published 2011
Pearson
Table of Contents:
“
...Introduction to
computer
security
-- Networks and the internet -- Cyber stalking, fraud, and abuse...
”
Call Number:
QA76.9.A25
Read Now
2
Hacking exposed 7 : network security secrets & solutions
by
McClure, Stuart
Published 2012
McGraw-Hill
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
Read Now
3
24 deadly sins of software security : programming flaws and how to fix them
by
Howard, Michael
Published 2010
McGraw-Hill
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
4
Mac OS X security and mobility v10.6
by
Kite, Robert
Published 2010
Peachpit Press
Subjects:
“
...Macintosh (
Computer
) /
Security
measures / blmlsh...
”
Call Number:
QA76.76.O63
Read Now
5
Hunting security bugs
by
Gallagher, Tom
Published 2006
Microsoft Press
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
6
Foundations of Mac OS X Leopard security
by
Edge, Charles S.
Published 2008
Apress
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.76.O63
Read Now
7
Mac OS X security
by
Potter, Bruce
Published 2003
New Riders
Subjects:
“
...Macintosh (
Computer
) /
Security
measures...
”
Call Number:
QA76.76.O63
Read Now
8
Practical reverse engineering : x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
by
Dang, Bruce
,
Gazet, Alexandre
,
Bachaalany, Elias
Published 2014
Wiley
Subjects:
“
...
Computer
security
...
”
Call Number:
TA168.5
Read Now
9
Advanced penetration testing for highly-secured environments : employee the most advanced pentesting techniques and tools to build highly-secured systems and environments
by
Allen, Lee
,
Cardwell, Kevin
Published 2016
Packt Publishing
Subjects:
“
...Penetration testing (
Computer
security
) / Handbooks, manuals, etc...
”
Call Number:
QA76.9.A25
Read Now
10
The .NET developer's guide to Windows security
by
Brown, Keith
Published 2004
Addison-Wesley
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
11
Threat modeling : designing for security
by
Shostack, Adam
Published 2014
John Wiley and Sons
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
12
Cisco firewall technology
by
Mason, Andrew
Published 2007
Cisco Press
Subjects:
“
...Firewalls (
Computer
security
) / fast...
”
Call Number:
TK5105.59
Read Now
13
Deploying zone-based firewalls
by
Pepelnjak, Ivan
Published 2006
Cisco Press
Subjects:
“
...Firewalls (
Computer
security
) / fast...
”
Call Number:
TK5105.59
Read Now
14
Gray hat hacking : the ethical hacker's handbook
by
Regalado, Daniel
Published 2015
McGraw-Hill Education
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
15
The business case for network security : advocacy, governance, and ROI
by
Paquet, Catherine
Published 2005
Cisco Press
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
Read Now
16
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
by
Foster, James C.
Published 2005
Syngress Pub.
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.76.P76
Read Now
17
Defend I.T. : security by example
by
Gupta, Ajay
Published 2004
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
Read Now
18
TICSA TruSecure ICSA certified security associate : exam TUO-001 : training guide
by
Chapple, Mike
Published 2003
Que
Subjects:
“
...
Computer
security
/ Examinations / Study guides...
”
Call Number:
QA76.3
Read Now
19
Microsoft windows security resource kit
by
Smith, Ben
Published 2005
Microsoft Press
Subjects:
“
...
Computer
security
/ blmlsh...
”
Call Number:
QA76.9.A25
Read Now
20
Software security engineering : a guide for project managers
by
Allen, Julia H.
Published 2008
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
1
2
3
4
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 331 - Labor economics
Clear Filter
Classification: 620 - Engineering & allied operations
Year of Publication
From:
To:
Classification
331 - Labor economics
620 - Engineering & allied operations
005 - Computer programming, programs & data
62
500 - Natural sciences & mathematics
46
384 - Communications; telecommunication
25
658 - General management
11
more ...
374 - Adult education
10
000 - Computer science, information & general works
3
330 - Economics
3
364 - Criminology
2
381 - Commerce
2
001 - Knowledge
1
006 - Special computer methods
1
302 - Social interaction
1
600 - Technology
1
745 - Decorative arts
1
see all ...
less ...
Language
English
66
French
1
Japanese
1
Undetermined
1
Collection
O'Reilly
69
Author
Diogenes, Yuri
3
Shinder, Thomas W.
3
Gregg, Michael
2
Mason, Andrew
2
Miller, David
2
Sequeira, Anthony
2
more ...
Adkins, Heather
1
Allen, Julia H.
1
Allen, Lee
1
Arthur, Will
1
Bachaalany, Elias
1
Barker, William
1
Beaver, Kevin
1
Behringer, Michael H.
1
Behtash, Behzad
1
Beyer, Betsy
1
Blankinship, Paul
1
Bloch, Laurent
1
Branigan, Steven
1
Brown, Keith
1
Cardwell, Kevin
1
Carter, Earl
1
Chaganti, Venkata S. R. R.
1
Challener, David
1
Chapman, Davis Howard
1
Chapple, Mike
1
Dang, Bruce
1
DeFranco, Joanna F.
1
Deal, Richard A.
1
Degioanni, Loris
1
Drabick, Rodger
1
Duffy, Christopher
1
Dulaney, Emmett A.
1
Easttom, Chuck
1
Edge, Charles S.
1
El Khoury, Franjieh
1
Femling, Ryan
1
Foster, James C.
1
Gallagher, Patrick
1
Gallagher, Tom
1
Ganger, Devin L.
1
Garneau, Dave
1
Garneau, David
1
Gazet, Alexandre
1
Giannoulis, Peter
1
Goldman, Kenneth
1
Gralla, Preston
1
Gray, Joe
1
Gupta, Ajay
1
Hadnagy, Christopher
1
Hay, Andrew
1
Hay, Keli
1
Hines, Annlee
1
Hjörleifsson, Michele
1
Hogue, Jonathan
1
Howard, Michael
1
Huang, Kaizhe
1
Hucaby, Dave
1
Hucaby, David
1
International Conference on Control Engineering and Information Systems (2014, Yueyang, Hunan Sheng, China)
1
Jaworski, Jamie
1
Jeffries, Bryan
1
John, Tomcy
1
Josse, Sébastien
1
Jumde, Pranjal
1
Kaplan, Gerry
1
King, Todd
1
Kite, Robert
1
Klaben, Jeff
1
Komar, Brian
1
Kurtz, George
1
Laliberte, Scott
1
Landauer, Lawrence
1
LeBlanc, David
1
Lee, Mike
1
Lewandowski, Piotr
1
Liu, Zhijing
1
Mangla, Anoopt
1
McCarthy, N. K.
1
McClure, Stuart
1
Mjølsnes, Stig F.
1
Morrow, Monique
1
Nascimento, Adolfo Eloy
1
Needham, Jeffrey
1
Norvell, Preston
1
Ozkaya, Erdal
1
Paquet, Catherine
1
Pastore, Michael A.
1
Pepelnjak, Ivan
1
Perrone, Paul J.
1
Porter, Shawn
1
Potter, Bruce
1
Price, Mike
1
Rajani, Renu
1
Regalado, Daniel
1
Remy, David L.
1
Rice, William E. Perry. Randall W.
1
Rosenberg, Jonathan B.
1
Sabih, Zaid
1
Saxe, Warren
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22331+-+Labor+economics%22&filter%5B%5D=dewey-ones%3A%22620+-+Engineering+%26+allied+operations%22&lookfor=%22computer+security%22&type=AllFields
Send by Email
×
Loading...