Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Computers / Networking / Security / Bisacsh"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"331 - Labor economics"
Search alternatives
:
computers »
computer
Showing
141
-
160
of
300
Search:
'"Computers / Networking / Security / Bisacsh"'
,
query time: 0.36s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
141
Security risks in social media technologies : safe practices in public service applications
by
Oxley, Alan
Published 2013
Chandos Publishing
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
142
Steal this computer book 4.0 : what they won't tell you about the Internet
by
Wang, Wally
Published 2006
No Starch Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.875.I57
Read Now
143
Hacking for dummies
by
Beaver, Kevin
Published 2013
John Wiley & Sons, Inc.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
144
Hacking for dummies
by
Beaver, Kevin
Published 2016
John Wiley & Sons, Inc.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
145
Conducting network penetration and espionage in a global environment
by
Middleton, Bruce
Published 2014
CRC Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
146
Beautiful security
by
Oram, Andrew
Published 2009
O'Reilly
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
147
Emerging trends in ICT security
Published 2013
Morgan Kaufmann/Elsevier
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
148
Developer's guide to web application security
by
Cross, Michael
Published 2007
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
149
Silence on the wire : a field guide to passive reconnaissance and indirect attacks
by
Zalewski, Michal
Published 2005
No Starch Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59 .Z35 2005eb
Read Now
150
Kali Linux wireless penetration testing : master wireless testing techniques to survey and attack wireless networks with Kali Linux
by
Ramachandran, Vivek
,
Buchanan, Cameron
Published 2015
Packt Publishing
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5103.2
Read Now
151
Seven deadliest web application attacks
by
Shema, Mike
Published 2010
Syngress
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
152
Intelligent systems for security informatics
by
Yang, Christopher C.
Published 2013
Academic Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
153
Incident response & computer forensics
by
Prosise, Chris
Published 2003
McGraw-Hill/Osborne
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
154
Multilevel modeling of secure systems in QoP-ML
by
Ksie̜żopolski, Bogdan
Published 2015
CRC Press, Taylor & Francis
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
155
Implementing SSL/TLS using cryptography and PKI
by
Davies, Joshua A.
Published 2011
Wiley
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5015.59
Read Now
156
Linux server security
by
Bauer, Michael D.
Published 2005
O'Reilly
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
157
OSSEC host-based intrusion detection guide
by
Hay, Andrew
Published 2008
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
158
Official (ISC)2® guide to the ISSAP® CBK®
by
Gordon, Adam
Published 2014
CRC Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
159
Penetration testing : a hands-on introduction to hacking
by
Weidman, Georgia
Published 2014
No Starch Press
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
160
Hacking for dummies
by
Beaver, Kevin
Published 2010
Wiley Pub.
Subjects:
“
...
COMPUTERS
/
Networking
/
Security
/
bisacsh
...
”
Call Number:
QA76.9.A25
3
4
5
6
7
8
9
10
11
12
13
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 331 - Labor economics
Year of Publication
From:
To:
Classification
331 - Labor economics
005 - Computer programming, programs & data
289
384 - Communications; telecommunication
35
658 - General management
33
500 - Natural sciences & mathematics
25
364 - Criminology
23
more ...
374 - Adult education
19
620 - Engineering & allied operations
17
330 - Economics
14
338 - Production
6
381 - Commerce
3
745 - Decorative arts
3
004 - Data processing & computer science
2
006 - Special computer methods
2
001 - Knowledge
1
153 - Mental processes & intelligence
1
158 - Applied psychology
1
302 - Social interaction
1
363 - Other social problems & services
1
368 - Insurance
1
657 - Accounting
1
see all ...
less ...
Language
English
299
Polish
1
Collection
O'Reilly
300
Author
Gregg, Michael
6
Andress, Jason
4
Beaver, Kevin
4
Cross, Michael
4
Diogenes, Yuri
4
Vacca, John R.
4
more ...
Cherry, Denny
3
Dalziel, Henry
3
Dulaney, Emmett A.
3
Howard, Michael
3
LeBlanc, David
3
Mitnick, Kevin
3
Orebaugh, Angela
3
Shinder, Thomas W.
3
Taylor, Andy
3
Viega, John
3
Alazab, Mamoun
2
Alexander, David
2
Babbin, Jacob
2
Baskin, Brian
2
Bidgoli, Hossein
2
Bowen, Richard Cooper
2
Calder, Alan
2
Coar, Ken A. L.
2
Dubrawsky, Ido
2
Finch, Amanda
2
Furnell, Steven
2
Hoffman, Daniel
2
Hurley, Chris
2
Kissell, Joe
2
Koziol, Jack
2
Krausz, Michael
2
Krutz, Ronald L.
2
Litchfield, David
2
Liu, Dale
2
Liu, Vincent
2
Middleton, Bruce
2
Peikari, Cyrus
2
Pinto, Marcus
2
Ramirez, Gilbert
2
Rogers, Russ
2
Scambray, Joel
2
Seitz, Justin
2
Shinder, Debra Littlejohn
2
Simon, William L.
2
Stuttard, Dafydd
2
Sutton, David
2
Tiller, James S.
2
Varsalone, Jesse
2
Watkins, Stephen
2
Wilhelm, Thomas
2
Zalewski, Michal
2
Abu-Nimeh, Saeed
1
Adamson, James K.
1
Ahmad, David R. Mirza
1
Ahmed, Mohiuddin
1
Akhgar, Babak
1
Akin, Thomas
1
Ali, Shakeel
1
Alpern, Naomi J.
1
Alvarado, Ellen
1
Amiri, Iraj Sadegh
1
Anderson, Brian
1
Anley, Chris
1
Anoop, Mangla
1
Ansari, Juned Ahmed
1
Anzaldua, Reynaldo
1
Arabnia, Hamid
1
Archibald, Neil
1
Ashbourn, Julian
1
Ashok, Alaknanda
1
Baccas, Paul
1
Bachaalany, Elias
1
Bahadur, Gary
1
Baker, Andrew R.
1
Balas, Valentina Emilia
1
Barker, William
1
Barnett, Ryan C.
1
Barrett, Daniel J.
1
Barrett, Diane
1
Bauer, Michael D.
1
Bauhaus, Mark
1
Bayuk, Jennifer L.
1
Beale, Jay
1
Ben-Natan, Ron
1
Benton, K. David
1
Bergman, Neil
1
Bertocci, Vittorio
1
Bhardwaj, Anuj
1
Biles, Simon
1
Bindner, Andrew
1
Blackley, John A.
1
Blount, Sumner
1
Bond, Michael
1
Bonnell, Ralph
1
Boutaba, Raouf
1
Boyles, Tim
1
Bradley, Tony
1
Bramwell, Phil
1
Bray, Rory
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?page=8&filter%5B%5D=dewey-ones%3A%22331+-+Labor+economics%22&lookfor=%22Computers+%2F+Networking+%2F+Security+%2F+Bisacsh%22&type=Subject
Send by Email
×
Loading...