Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Computer Security"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"620 - Engineering & allied operations"
Showing
1
-
20
of
148
Search:
'"Computer Security"'
,
query time: 0.15s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Software security : building security in
by
McGraw, Gary
Published 2006
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
2
Secure coding : principles and practices
by
Graff, Mark
Published 2003
O'Reilly
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
3
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems
by
Knapp, Eric
Published 2011
Syngress
Subjects:
“
...
Computer
security
...
”
Call Number:
TS156.8
Read Now
4
Security on IBM z/VSE
by
Hellner, Helmut
Published 2011
IBM Corp., International Technical Support Organization
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
5
The effective incident response team
by
Lucas, Julie
Published 2004
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
6
Advanced host intrusion prevention with CSA
by
Sullivan, Chad
Published 2006
Cisco
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
7
Windows Vista security : securing Vista against malicious attacks
by
Grimes, Roger A.
Published 2007
Wiley Technology Pub.
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
8
PoC GTFO., Volume III
by
Laphroaig, Manul
Published 2020
No Starch Press
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
9
Honeypots : tracking hackers
by
Spitzner, Lance
Published 2003
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
10
Hack I.T. : security through penetration testing
by
Klevinsky, T. J.
Published 2002
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
11
Reversing : secrets of reverse engineering
by
Eilam, Eldad
Published 2005
Wiley
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.758
Read Now
12
Computer security fundamentals
by
Easttom, Chuck
Published 2011
Pearson
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
13
Firewall fundamentals
by
Noonan, Wesley J.
Published 2006
Cisco
Subjects:
“
...Firewalls (
Computer
security
) / fast...
”
Call Number:
TK5105.59
Read Now
14
Cyberwar, cyberterror, cybercrime and cyberactivism : an in-depth guide to the role of standards in cybersecurity environment
by
Mehan, Julie E.
Published 2014
IT Governance Pub.
Subjects:
“
...
Computer
security
...
”
Call Number:
HV6773
Read Now
15
Hacking exposed 7 : network security secrets & solutions
by
McClure, Stuart
Published 2012
McGraw-Hill
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
Read Now
16
SELINUX : NSA's open source security enhanced Linux
by
McCarty, Bill
Published 2005
O'Reilly
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.59
Read Now
17
24 deadly sins of software security : programming flaws and how to fix them
by
Howard, Michael
Published 2010
McGraw-Hill
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
18
Data Protection and Information Lifecycle Management
by
Petrocelli, Tom
Published 2005
Prentice Hall PTR
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25P53 2005
Read Now
19
Designing and building a security operations center
by
Nathans, David
Published 2015
Syngress
Subjects:
“
...
Computer
security
...
”
Call Number:
HV8290
Read Now
20
Cisco DCUCI quick reference
by
Casaletto, James
Published 2010
Cisco Systems
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
1
2
3
4
5
6
7
8
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 620 - Engineering & allied operations
Year of Publication
From:
To:
Classification
620 - Engineering & allied operations
005 - Computer programming, programs & data
111
500 - Natural sciences & mathematics
89
331 - Labor economics
69
384 - Communications; telecommunication
35
658 - General management
18
more ...
000 - Computer science, information & general works
14
374 - Adult education
10
745 - Decorative arts
9
364 - Criminology
6
330 - Economics
5
600 - Technology
5
004 - Data processing & computer science
4
363 - Other social problems & services
4
003 - Systems
3
380 - Commerce, communications & transportation
3
621 - Applied physics
3
006 - Special computer methods
2
200 - Religion
2
300 - Social sciences
2
302 - Social interaction
2
340 - Law
2
381 - Commerce
2
629 - Other branches of engineering
2
900 - History & geography
2
001 - Knowledge
1
100 - Philosophy & psychology
1
170 - Ethics
1
301 - Sociology & anthropology
1
304 - Factors affecting social behavior
1
333 - Economics of land & energy
1
360 - Social problems & services; associations
1
361 - Social problems & social welfare in general
1
370 - Education
1
610 - Medicine & health
1
670 - Manufacturing
1
700 - The arts; fine & decorative arts
1
see all ...
less ...
Language
English
142
German
2
Undetermined
2
French
1
Japanese
1
Collection
O'Reilly
142
Directory of Open Access Books
6
Author
Diogenes, Yuri
3
Shinder, Thomas W.
3
Bücker, Axel
2
Gogolin, Greg
2
Gregg, Michael
2
Gupta, Ajay
2
more ...
Hadnagy, Christopher
2
Laliberte, Scott
2
Mason, Andrew
2
Miller, David
2
Moskowitz, Jeremy
2
O'Reilly (Firm)
2
Sequeira, Anthony
2
Abbadi, Imad M.
1
Abdel-Hamid, Ahmed
1
Adkins, Heather
1
Alamanni, Marco
1
Allen, Julia H.
1
Allen, Lee
1
Anderson, Ross
1
Andrews, Scott
1
Arsanjani, Ali
1
Arthur, Will
1
Asher, J. A.
1
Bachaalany, Elias
1
Barker, William
1
Beaver, Kevin
1
Behringer, Michael H.
1
Behtash, Behzad
1
Beyer, Betsy
1
Blankinship, Paul
1
Bloch, Laurent
1
Bowman, Courtney
1
Bragg, Roberta
1
Branigan, Steven
1
Brown, Keith
1
Buchanan, Cameron
1
Butler, James
1
Cardwell, Kevin
1
Carnegie Mellon University CERT Coordination Center
1
Carter, Earl
1
Casaletto, James
1
Castro-Leon, Enrique
1
Chaganti, Venkata S. R. R.
1
Challener, David
1
Chapman, Davis Howard
1
Chapple, Mike
1
Chikofsky, Elliot J.
1
Christen, Markus
1
Conheady, Sharon
1
Dang, Bruce
1
DeFranco, Joanna F.
1
Deal, Richard A.
1
Degioanni, Loris
1
Demanche, Luc
1
Dennedy, Michelle Finneran
1
Domas, Christopher
1
Domas, Stephanie
1
Drabick, Rodger
1
Dubrawsky, Ido
1
Duffy, Christopher
1
Dulaney, Emmett A.
1
Eagle, Chris
1
Easttom, Chuck
1
Echols, Michael C.
1
Edge, Charles S.
1
Eilam, Eldad
1
El Khoury, Franjieh
1
Everette, Wendy Knox
1
Femling, Ryan
1
Ferguson, Justin
1
Finneran, Thomas R.
1
Fluent ( April 20-25, San Francisco )
1
Fluent (2017, San Jose, California)
1
Fluent (2018, San Jose, Calif.)
1
Fluent. ( ( 2016, San Francisco, California)
1
Foster, James C.
1
Fox, Jonathan
1
Gallagher, Patrick
1
Gallagher, Tom
1
Gandomani, Taghi Javdani
1
Ganger, Devin L.
1
Garneau, Dave
1
Garneau, David
1
Gazet, Alexandre
1
Gehl, Robert W.
1
Gesher, Ari
1
Giannoulis, Peter
1
Glaser, J. D.
1
Goldman, Kenneth
1
Gong, Lidong Chen. Guang
1
Gordijn, Bert
1
Goundar, Sam
1
Graff, Mark
1
Gralla, Preston
1
Grant, John K.
1
Gray, Joe
1
Grimes, Roger A.
1
Haletky, Edward
1
Harber, Clive
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22620+-+Engineering+%26+allied+operations%22&lookfor=%22Computer+Security%22&type=Subject
Send by Email
×
Loading...