Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "computer security"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"338 - Production"
dewey-ones:"658 - General management"
language:"English"
Showing
1
-
20
of
73
Search:
'"computer security"'
,
query time: 0.15s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Theoretical cybersecurity : principles and advanced concepts
by
Oakley, Jacob G.
Published 2022
Apress L.P.
Subjects:
“
...
Computer
security
/ Forecasting...
”
Call Number:
QA76.9.A25
Read Now
2
ISO27000 and information security : a combined glossary
by
Calder, Alan
Published 2010
IT Governance Pub.
Subjects:
“
...
Computer
security
/ Management / Standards / Dictionaries...
”
Call Number:
QA76.9.A25
Read Now
3
Start-up secure : baking cybersecurity into your company from founding to exit
by
Castaldo, Chris
Published 2021
John Wiley & Sons, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
4
COMPTIA CYSA+ CYBERSECURITY ANALYST CERTIFICATION EXAM GUIDE (EXAM CS0-002)
by
Chapman, Brent
Published 2021
MCGRAW-HILL EDUCATION
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
HF5548.37
Read Now
5
Building a cyber risk management program : evolving security for the digital age
by
Allen, Brian
,
Bapst, Brandon
,
Hicks, Terry Allan
Published 2023
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ Management...
”
Call Number:
HD30.38
Read Now
6
Privacy, regulations, and cybersecurity : the essential business guide
by
Moschovitis, Christos J. P.
Published 2021
John Wiley & Sons, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
HD61.5
Read Now
7
Security management : a critical thinking approach
by
Land, Michael
Published 2014
CRC Press
Subjects:
“
...
Computer
security
...
”
Call Number:
HD61.5
Read Now
8
You can stop stupid : stopping losses from accidental and malicious actions
by
Winkler, Ira
,
Brown, Tracy Celaya
Published 2021
Gildan Media
Subjects:
“
...
Computer
security
/ fast / (OCoLC)fst00872484...
”
Call Number:
HD61.5
Read Now
9
Build Your Own Cybersecurity Testing Lab : Low-cost Solutions for Testing in Virtual and Cloud-based Environments
by
Messier, Ric
Published 2020
McGraw-Hill
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
HF5548.37
Read Now
10
Security awareness for dummies
by
Winkler, Ira
Published 2022
John Wiley
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
HD30.38
Read Now
11
Security awareness for dummies
by
Winkler, Ira
Published 2022
Tantor Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
HD30.38
Read Now
12
Nine steps to success : an ISO 27001 implementation overview
by
Calder, Alan
Published 2005
IT Governance Pub.
Subjects:
“
...
Computer
security
...
”
Call Number:
HF5548.37
Read Now
13
Project zero trust : a story about a strategy for aligning security and the business
by
Finney, George
Published 2022
John Wiley & Sons, Inc.
Subjects:
“
...
Computer
security
/ Management...
”
Call Number:
HD61.5
Read Now
14
Network attacks and exploitation : a framework
by
Monte, Matthew
Published 2015
Wiley
Subjects:
“
...
Computer
security
...
”
Call Number:
HF5548.37
Read Now
15
Enhanced cyber security with IBM Spectrum Scale and IBM QRadar : accurately detecting and prioritizing threats to your data
by
Chakrabarty, Boudhayan
Published 2019
IBM Corporation, IBM Redbooks
Subjects:
“
...Cyber intelligence (
Computer
security
) / fast...
”
Call Number:
QA76.9.A25
Read Now
16
Cybersecurity attacks : Red Team strategies : a practical guide to building a penetration testing program having homefield advantage
by
Rehberger, Johann
Published 2020
Packt Publishing
Subjects:
“
...Penetration testing (
Computer
security
) / fast...
”
Call Number:
QA76.9.A25
Read Now
17
Information Security Management Metrics
by
Brotby, Krag
Published 2009
Auerbach Publications
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Read Now
18
People-centric security : transforming your enterprise security culture
by
Hayden, Lance
Published 2016
McGraw-Hill Education
Subjects:
“
...
Computer
security
...
”
Call Number:
HD30.2
Read Now
19
8 steps to better security : a simple cyber resilience guide for business
by
Crawley, Kim
Published 2021
John Wiley & Sons, Inc.
Table of Contents:
“
...
Computer
Security
Incident Response Team -- Cybersecurity Frameworks -- NIST Cybersecurity Framework -- ISO...
”
Call Number:
QA76.9.A25
Read Now
20
Endpoint security and compliance management design guide : using IBM Tivoli Endpoint Manager
by
Bücker, Axel
Published 2012
IBM Corp., International Technical Support Organization
Subjects:
“
...IBM
computers
/
Security
measures / http://id.loc.gov/authorities/subjects/sh90001861...
”
Call Number:
QA76.9.A25
1
2
3
4
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 338 - Production
Clear Filter
Classification: 658 - General management
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
338 - Production
658 - General management
330 - Economics
41
331 - Labor economics
36
004 - Data processing & computer science
27
384 - Communications; telecommunication
26
more ...
005 - Computer programming, programs & data
13
300 - Social sciences
9
364 - Criminology
6
368 - Insurance
5
629 - Other branches of engineering
5
302 - Social interaction
4
381 - Commerce
4
500 - Natural sciences & mathematics
4
000 - Computer science, information & general works
3
332 - Financial economics
3
670 - Manufacturing
3
001 - Knowledge
1
006 - Special computer methods
1
see all ...
less ...
Language
English
Collection
O'Reilly
73
Author
Loukides, Michael Kosta
27
Calder, Alan
6
Winkler, Ira
3
Krausz, Michael
2
Ajmani, Neelesh
1
Allen, Brian
1
more ...
Aslaner, Milad
1
Bapst, Brandon
1
Brotby, Krag
1
Brown, Tracy Celaya
1
Butler, Michael
1
Bücker, Axel
1
Carey, Marcus J.
1
Castaldo, Chris
1
Chakrabarty, Boudhayan
1
Chapman, Brent
1
Crawley, Kim
1
Cunningham, Chase
1
Dahj, Jean Nestor M.
1
Dooley, Kevin
1
Estrela, Vania Vieira
1
Finney, George
1
Hayden, Lance
1
Hicks, Terry Allan
1
Igou, Amy
1
Jin, Jennifer
1
Kearney, Paul
1
Kenyon, Bridget
1
Khurana, Mehak
1
Kumar, Dinesh
1
Lakshmi, Vasantha
1
Land, Michael
1
Mahajan, Shilpa
1
Maymí, Fernando
1
Messier, Ric
1
Mitchell, Stewart
1
Monte, Matthew
1
Moore, Richard O.
1
Morris, Tristan
1
Moschovitis, Christos J. P.
1
Nasser, Ahmad MK
1
Oakley, Jacob G.
1
Oksendahl, Eric
1
OverDrive, Inc
1
Ozkaya, Erdal
1
Puckett, Matthew
1
Rehberger, Johann
1
Ricks, Bobby
1
Ricks, Truett
1
Schneier, Bruce
1
Simmons, Andrea C.
1
Sorensen, Chris
1
Speed, Tyler Justin
1
Stackpole, Bill
1
Tibble, Ian
1
Ulsch, N. MacDonnell
1
Vincent, Nishani
1
Walker, John
1
Watkins, Steve
1
York, Wayne
1
see all ...
less ...
Recently Uploaded
Last Month
2
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22338+-+Production%22&filter%5B%5D=dewey-ones%3A%22658+-+General+management%22&filter%5B%5D=language%3A%22English%22&lookfor=%22computer+security%22&type=AllFields
Send by Email
×
Loading...