Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Computer Security"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"620 - Engineering & allied operations"
Showing
41
-
60
of
149
Search:
'"Computer Security"'
,
query time: 0.12s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
41
Security engineering : a guide to building dependable distributed systems
by
Anderson, Ross
Published 2008
Wiley Publishing Inc.
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
42
Threat modeling : designing for security
by
Shostack, Adam
Published 2014
John Wiley and Sons
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
43
Group policy : fundamentals, security, and troubleshooting
by
Moskowitz, Jeremy
Published 2008
Wiley Pub.
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.76.O63
Read Now
44
Social Engineering : How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication
by
Gehl, Robert W.
Published 2022
The MIT Press
Subjects:
“
...
Computer
security
...
”
Read Now
45
Cisco firewall technology
by
Mason, Andrew
Published 2007
Cisco Press
Subjects:
“
...Firewalls (
Computer
security
) / fast...
”
Call Number:
TK5105.59
Read Now
46
Gray hat hacking : the ethical hacker's handbook
by
Regalado, Daniel
Published 2015
McGraw-Hill Education
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
47
Deploying zone-based firewalls
by
Pepelnjak, Ivan
Published 2006
Cisco Press
Subjects:
“
...Firewalls (
Computer
security
) / fast...
”
Call Number:
TK5105.59
Read Now
48
IBM z/OS mainframe security and audit management using the IBM Security zSecure Suite
by
Bücker, Axel
Published 2011
IBM Corp., International Technical Support Organization
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
49
The business case for network security : advocacy, governance, and ROI
by
Paquet, Catherine
Published 2005
Cisco Press
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
Read Now
50
Sockets, shellcode, porting & coding : reverse engineering exploits and tool coding for security professionals
by
Foster, James C.
Published 2005
Syngress Pub.
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.76.P76
Read Now
51
Models of socio-cyber-physical systems security
by
Yevseiev, Serhii
Published 2023
PC TECHNOLOGY CENTER
Subjects:
“
...
Computer
security
/ bicssc...
”
Read Now
52
Rootkits : subverting the Windows kernel
by
Hoglund, Greg
Published 2005
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
53
Defend I.T. : security by example
by
Gupta, Ajay
Published 2004
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
Read Now
54
Designing secure software : a guide for developers
by
Kohnfelder, Loren
Published 2022
No Starch Press
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.758
Read Now
55
Software security engineering : a guide for project managers
by
Allen, Julia H.
Published 2008
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
56
VMware vSphere and virtual infrastructure security : securing the virtual environment
by
Haletky, Edward
Published 2009
Prentice Hall
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.V5
Read Now
57
Microsoft windows security resource kit
by
Smith, Ben
Published 2005
Microsoft Press
Subjects:
“
...
Computer
security
/ blmlsh...
”
Call Number:
QA76.9.A25
Read Now
58
Digital forensics explained
Published 2021
CRC Press
Subjects:
“
...
Computer
Security
...
”
Call Number:
HV8079.C65
Read Now
59
Reverse engineering and exploit development : application penetration testing for security professionals
by
Polstra, Philip
Published 2015
Infinite Skills
Subjects:
“
...Penetration testing (
Computer
security
) / fast / (OCoLC)fst01789566...
”
Call Number:
TK5105.59
Read Now
60
Cloud management and security
by
Abbadi, Imad M.
Published 2014
John Wiley & Sons Inc.
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.585
1
2
3
4
5
6
7
8
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 620 - Engineering & allied operations
Year of Publication
From:
To:
Classification
620 - Engineering & allied operations
005 - Computer programming, programs & data
111
500 - Natural sciences & mathematics
88
331 - Labor economics
68
384 - Communications; telecommunication
35
658 - General management
17
more ...
000 - Computer science, information & general works
14
374 - Adult education
9
745 - Decorative arts
9
364 - Criminology
6
004 - Data processing & computer science
5
330 - Economics
5
600 - Technology
5
363 - Other social problems & services
4
003 - Systems
3
380 - Commerce, communications & transportation
3
621 - Applied physics
3
006 - Special computer methods
2
200 - Religion
2
300 - Social sciences
2
302 - Social interaction
2
340 - Law
2
381 - Commerce
2
629 - Other branches of engineering
2
900 - History & geography
2
001 - Knowledge
1
100 - Philosophy & psychology
1
170 - Ethics
1
301 - Sociology & anthropology
1
304 - Factors affecting social behavior
1
333 - Economics of land & energy
1
360 - Social problems & services; associations
1
361 - Social problems & social welfare in general
1
370 - Education
1
610 - Medicine & health
1
670 - Manufacturing
1
700 - The arts; fine & decorative arts
1
see all ...
less ...
Language
English
143
German
2
Undetermined
2
French
1
Japanese
1
Collection
O'Reilly
143
Directory of Open Access Books
6
Author
Diogenes, Yuri
3
Shinder, Thomas W.
3
Bücker, Axel
2
Gogolin, Greg
2
Gregg, Michael
2
Gupta, Ajay
2
more ...
Hadnagy, Christopher
2
Laliberte, Scott
2
Mason, Andrew
2
Miller, David
2
Moskowitz, Jeremy
2
O'Reilly (Firm)
2
Sequeira, Anthony
2
Abbadi, Imad M.
1
Abdel-Hamid, Ahmed
1
Adkins, Heather
1
Alamanni, Marco
1
Allen, Julia H.
1
Allen, Lee
1
Anderson, Ross
1
Andrews, Scott
1
Arsanjani, Ali
1
Arthur, Will
1
Asher, J. A.
1
Bachaalany, Elias
1
Barker, William
1
Beaver, Kevin
1
Behringer, Michael H.
1
Behtash, Behzad
1
Beyer, Betsy
1
Blankinship, Paul
1
Bloch, Laurent
1
Bowman, Courtney
1
Bragg, Roberta
1
Branigan, Steven
1
Brown, Keith
1
Buchanan, Cameron
1
Butler, James
1
Calderon, Paulino
1
Cardwell, Kevin
1
Carnegie Mellon University CERT Coordination Center
1
Carter, Earl
1
Casaletto, James
1
Castro-Leon, Enrique
1
Chaganti, Venkata S. R. R.
1
Challener, David
1
Chantzis, Fotios
1
Chapman, Davis Howard
1
Chapple, Mike
1
Chikofsky, Elliot J.
1
Christen, Markus
1
Conheady, Sharon
1
Dang, Bruce
1
DeFranco, Joanna F.
1
Deal, Richard A.
1
Degioanni, Loris
1
Deirmentzoglou, Evangelos
1
Demanche, Luc
1
Dennedy, Michelle Finneran
1
Domas, Christopher
1
Domas, Stephanie
1
Drabick, Rodger
1
Dubrawsky, Ido
1
Duffy, Christopher
1
Dulaney, Emmett A.
1
Eagle, Chris
1
Easttom, Chuck
1
Echols, Michael C.
1
Edge, Charles S.
1
Eilam, Eldad
1
El Khoury, Franjieh
1
Everette, Wendy Knox
1
Femling, Ryan
1
Ferguson, Justin
1
Finneran, Thomas R.
1
Fluent ( April 20-25, San Francisco )
1
Fluent (2017, San Jose, California)
1
Fluent (2018, San Jose, Calif.)
1
Fluent. ( ( 2016, San Francisco, California)
1
Foster, James C.
1
Fox, Jonathan
1
Gallagher, Patrick
1
Gallagher, Tom
1
Gandomani, Taghi Javdani
1
Ganger, Devin L.
1
Garneau, Dave
1
Garneau, David
1
Gazet, Alexandre
1
Gehl, Robert W.
1
Gesher, Ari
1
Giannoulis, Peter
1
Glaser, J. D.
1
Goldman, Kenneth
1
Gong, Lidong Chen. Guang
1
Gordijn, Bert
1
Goundar, Sam
1
Graff, Mark
1
Gralla, Preston
1
Grant, John K.
1
Gray, Joe
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?page=3&filter%5B%5D=dewey-ones%3A%22620+-+Engineering+%26+allied+operations%22&lookfor=%22Computer+Security%22&type=Subject
Send by Email
×
Loading...