Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Computers / Security / General / Bisacsh"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"384 - Communications; telecommunication"
Search alternatives
:
computers »
computer
Showing
21
-
40
of
48
Search:
'"Computers / Security / General / Bisacsh"'
,
query time: 0.31s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
21
Cyber-physical systems : integrated computing and engineering design
by
Hu, Fei
Published 2014
CRC Press
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
TJ213
Read Now
22
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats
by
Tevault, Donald A.
Published 2018
Packt Publishing
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
23
WarDriving & wireless penetration testing
by
Hurley, Chris
Published 2007
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
TK5103.2
Read Now
24
E-discovery : creating and managing an enterprisewide program : a technical guide to digital investigation and litigation support
by
Schuler, Karen
Published 2009
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
KF8902.E42
Read Now
25
Network security with pfSense : architect, deploy, and operate enterprise-grade firewalls
by
Aggarwal, Manuj
Published 2018
Packt Publishing
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
QA76.76.S95
Read Now
26
Securing Web services with WS-Security : demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
by
Rosenberg, Jonathan B.
Published 2004
SAMS
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
27
Mobile application security
by
Dwivedi, Himanshu
Published 2010
McGraw-Hill
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
TK5102.85
Read Now
28
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
by
Bachrach, Daniel G.
,
Rzeszut, Eric J.
Published 2014
Apress
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
29
Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps
by
Hsu, Tony
Published 2018
Packt Publishing
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
HD30.2
Read Now
30
Mobile malware attacks and defense
by
Dunham, Ken
Published 2009
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
TK5102.85
Read Now
31
Hacking exposed wireless : wireless security secrets & solutions
by
Cache, Johnny
Published 2010
McGraw-Hill
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
TK5103.2
Read Now
32
Using the common criteria for IT security evaluation
by
Herrmann, Debra S.
Published 2003
Auerbach Publications
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
TK5102.85
Read Now
33
Blackjacking : security threats to Blackberry devices, PDAs, and cell phones in the enterprise
by
Hoffman, Daniel
Published 2007
Wiley Pub.
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
TK5103.2
Read Now
34
Threat modeling : designing for security
by
Shostack, Adam
Published 2014
John Wiley and Sons
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
35
Cloud security and privacy
by
Mather, Tim
Published 2009
O'Reilly
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
TK5105.59
Read Now
36
Deploying Microsoft Forefront Protection 2010 for Exchange Server
by
Diogenes, Yuri
Published 2010
Microsoft Press
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
QA76.9.A25
Read Now
37
Practical memory forensics : jumpstart effective forensic analysis of volatile memory
by
Ostrovskaya, Svetlana
,
Skulkin, Oleg
Published 2022
Packt Publishing, Limited
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
QA76.76.A65
Read Now
38
Mobile device security for dummies
by
Campagna, Rich R.
Published 2011
Wiley Pub.
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
TK5102.85
Read Now
39
Infosecurity 2008 threat analysis
by
Clark, Champ
Published 2008
Syngress Pub.
Subjects:
“
...
COMPUTERS
/
Security
/
General
/
bisacsh
...
”
Call Number:
QA76.9.D314
Read Now
40
Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
by
Jaswal, Nipun
Published 2018
Packt Publishing
Subjects:
“
...
Computers
/
Security
/
General
/
bisacsh
...
”
Call Number:
QA76.9.A25
1
2
3
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 384 - Communications; telecommunication
Year of Publication
From:
To:
Classification
384 - Communications; telecommunication
005 - Computer programming, programs & data
45
331 - Labor economics
38
500 - Natural sciences & mathematics
9
620 - Engineering & allied operations
8
658 - General management
7
more ...
374 - Adult education
4
364 - Criminology
2
001 - Knowledge
1
006 - Special computer methods
1
302 - Social interaction
1
330 - Economics
1
363 - Other social problems & services
1
380 - Commerce, communications & transportation
1
381 - Commerce
1
629 - Other branches of engineering
1
745 - Decorative arts
1
see all ...
less ...
Language
English
47
Undetermined
1
Collection
O'Reilly
48
Author
Diogenes, Yuri
3
Shinder, Thomas W.
3
Abro, Ahmed Bux
1
Abu-Nimeh, Saeed
1
Aggarwal, Manuj
1
Ahmad, Ijaz
1
more ...
Aslam, Abdul
1
Bachrach, Daniel G.
1
Barker, Jessica
1
Baskin, Brian
1
Bauhaus, Mark
1
Benton, K. David
1
Boyles, Tim
1
Bramwell, Phil
1
Buchanan, Cameron
1
Cache, Johnny
1
Campagna, Rich R.
1
Chaki, Nabendu
1
Chaki, Rituparna
1
Clark, Champ
1
Clark, Chris
1
Coffin, David
1
Coleman, David D.
1
Cross, Michael
1
Davis, Adrian
1
Donaldson, Scott E.
1
Dubrawsky, Ido
1
Dunham, Ken
1
Dunkerley, Mark
1
Dwivedi, Himanshu
1
Furnell, Steven
1
Gong, Lidong Chen. Guang
1
Gregg, Michael
1
Gurtov, Andrei
1
Haines, Brad
1
Hallas, Bruce
1
Herrmann, Debra S.
1
Hoffman, Daniel
1
Hsu, Tony
1
Hu, Fei
1
Hurley, Chris
1
Iyer, Sibbu
1
Jaswal, Nipun
1
Joshi, R. C.
1
Kanclirz, Jan
1
Krishnan, Ashwin
1
Kumaraswamy, Subra
1
Lakhe, Bhushan
1
Latif, Shahed
1
Liu, Vincent
1
Liyanage, Madhusanka
1
Mather, Tim
1
McMahon, Ciarán
1
Mitropoulos, Nick
1
Mohanta, Abhijit
1
Osterhage, Wolfgang
1
Ostrovskaya, Svetlana
1
Penttinen, Jyrki T. J.
1
Peterson, Cathleen P.
1
Ramachandran, Vivek
1
Reiber, Lee
1
Remy, David L.
1
Rong, Chunming
1
Rosenberg, Jonathan B.
1
Rzeszut, Eric J.
1
Saldanha, Anoop
1
Sardana, Anjali
1
Schuler, Karen
1
Shih, Frank Y.
1
Shostack, Adam
1
Siegel, Stanley G.
1
Skulkin, Oleg
1
Song, Lingyang
1
Tevault, Donald A.
1
Thiel, David V.
1
Vincze, Éva
1
Williams, Chris K.
1
Wright, Joshua
1
Zhang, Yan
1
Zhou, Xiangyun Sean
1
Çayirci, E.
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?page=2&filter%5B%5D=dewey-ones%3A%22384+-+Communications%3B+telecommunication%22&lookfor=%22Computers+%2F+Security+%2F+General+%2F+Bisacsh%22&type=Subject
Send by Email
×
Loading...