Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "computer security"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"745 - Decorative arts"
language:"English"
Showing
1
-
20
of
21
Search:
'"computer security"'
,
query time: 3.14s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Cybersecurity architecture fundamentals
Published 2023
Packt Publishing
Subjects:
“
...
Computer
security
/ Design and construction...
”
Call Number:
QA76.9.A25
Read Now
2
Practical cybersecurity architecture : a guide to creating and implementing robust designs for cybersecurity architects
by
Kelley, Diana
,
Moyle, Ed
Published 2023
Packt Publishing Ltd.
Subjects:
“
...
Computer
security
/ Design and construction...
”
Call Number:
QA76.9.A25
Read Now
3
Practical cybersecurity architecture : a guide to creating and implementing robust designs for cybersecurity architects
by
Moyle, Ed
,
Kelley, Diana
Published 2022
Packt Publishing
Subjects:
“
...
Computer
security
/ Design and construction...
”
Call Number:
QA76.9.A25
Read Now
4
Building secure software : how to avoid security problems the right way
by
Viega, John
Published 2002
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.76.D47
Read Now
5
Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack
by
Buchanan, Cameron
,
Ramachandran, Vivek
Published 2017
Packt Publishing
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
6
The craft of system security
by
Smith, Sean W.
Published 2008
Addison-Wesley
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
7
Hack proofing your Web applications : the only way to stop a hacker is to think like one
Published 2001
Syngress
Subjects:
“
...
Computer
security
/ Handbooks, manuals, etc...
”
Call Number:
QA76.9.A25
Read Now
8
The Architecture of Privacy : On Engineering Technologies that Can Deliver Trustworthy Safeguards
by
Bowman, Courtney
,
Gesher, Ari
,
Grant, John K.
,
Slate, Daniel
Published 2015
O'Reilly Media
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.758
Read Now
9
A multidisciplinary introduction to information security
Published 2011
Chapman and Hall/CRC
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
10
How to attack and defend your website
by
Dalziel, Henry
Published 2015
Syngress
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.9.A25
Read Now
11
Seven deadliest social network attacks
by
Timm, Carl
Published 2010
Syngress/Elsevier
Subjects:
“
...
Computer
security
...
”
Call Number:
TK5105.88817
Read Now
12
Mastering Ethereum : Implement Advanced Blockchain Applications Using Ethereum-Supported Tools, Services, and Protocols
by
Grincalaitis, Merunas
Published 2019
Packt Publishing, Limited
Subjects:
“
...
Computers
/
Security
/ Cryptography / bisacsh...
”
Call Number:
QA76.9.D32
Read Now
13
Fluent 2016 : San Francisco, California video compilation
Published 2016
O'Reilly Media
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.76.A65
Read Now
14
Fluent conference 2015 : complete video compilation
Published 2015
O'Reilly Media
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.76.A65
Read Now
15
Oracle Application Express administration : for DBAs and Developers
by
Mignault, Francis
,
Demanche, Luc
Published 2016
Apress
Subjects:
“
...
Computer
security
/ bicssc...
”
Call Number:
QA76.76.A65
Read Now
16
Multimedia security : watermarking, steganography, and forensics
by
Shih, Frank Y.
Published 2013
CRC Press
Subjects:
“
...
COMPUTERS
/
Security
/ General / bisacsh...
”
Call Number:
TK5105.15
Read Now
17
Fluent conference 2017, San Jose, CA.
Published 2017
O'Reilly Media
Subjects:
“
...
Computer
security
...
”
Call Number:
QA76.76.A65
Read Now
18
Blockchain by example : a developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
by
Badr, Bellaj
,
Horrocks, Richard
,
Wu, Xun (Brian)
Published 2018
Packt Publishing
Subjects:
“
...
Computers
/
Security
/ Cryptography / bisacsh...
”
Call Number:
QA76.76.A65
Read Now
19
Enterprise architecture and information assurance : developing a secure foundation
by
Scholz, James A.
Published 2014
CRC Press, Taylor & Francis Group
Subjects:
“
...
COMPUTERS
/
Security
/ General / bisacsh...
”
Call Number:
QA76.9.D314
Read Now
20
CMS security handbook : the comprehensive guide for WordPress, Joomla!, Drupal, and Plone
by
Canavan, Tom
Published 2011
Wiley Pub.
Subjects:
“
...
COMPUTERS
/
Security
/ General / bisacsh...
”
Call Number:
TK5105.59
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 745 - Decorative arts
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
745 - Decorative arts
005 - Computer programming, programs & data
13
620 - Engineering & allied operations
10
331 - Labor economics
9
000 - Computer science, information & general works
3
658 - General management
3
more ...
006 - Special computer methods
2
302 - Social interaction
2
384 - Communications; telecommunication
2
500 - Natural sciences & mathematics
2
003 - Systems
1
004 - Data processing & computer science
1
330 - Economics
1
332 - Financial economics
1
364 - Criminology
1
381 - Commerce
1
see all ...
less ...
Language
English
Collection
O'Reilly
21
Author
Kelley, Diana
2
Moyle, Ed
2
O'Reilly (Firm)
2
Badr, Bellaj
1
Bowman, Courtney
1
Buchanan, Cameron
1
more ...
Canavan, Tom
1
Chapa, David A.
1
Dalziel, Henry
1
Demanche, Luc
1
Ely, Adam
1
Fluent ( April 20-25, San Francisco )
1
Fluent (2017, San Jose, California)
1
Fluent. ( ( 2016, San Francisco, California)
1
Gesher, Ari
1
Grant, John K.
1
Grincalaitis, Merunas
1
Horrocks, Richard
1
Marchesini, John
1
Mateos, Arthur
1
McGraw, Gary
1
Mignault, Francis
1
Mjølsnes, Stig F.
1
Perez, Richard
1
Ramachandran, Vivek
1
Rosenberg, Jonathan B.
1
Scholz, James A.
1
Shih, Frank Y.
1
Slate, Daniel
1
Smith, Sean W.
1
Timm, Carl
1
Viega, John
1
Wu, Xun (Brian)
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22745+-+Decorative+arts%22&filter%5B%5D=language%3A%22English%22&lookfor=%22computer+security%22&type=AllFields
Send by Email
×
Loading...