Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "computer security"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
language:"English"
newitem_txtF:"last_month"
Showing
1
-
20
of
35
Search:
'"computer security"'
,
query time: 0.13s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Mastering Cybersecurity : Strategies, Technologies, and Best Practices
by
Edwards, Jason
Published 2024
Apress L. P.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
2
Linux networking and security : basics and beyond
by
Prowse, David L.
Published 2024
Pearson
Subjects:
“
...
Computer
security
/ Standards / http://id.loc.gov/authorities/subjects/sh99004226...
”
Call Number:
QA76.9.A25
Read Now
3
Security architecture for hybrid cloud : a practical method for designing security using zero trust principles
by
Buckwell, Mark
,
Daele, Stefaan van
,
Horst, Carsten
Published 2024
O'Reilly Media, Inc.
Subjects:
“
...Cloud
computing
/
Security
measures...
”
Call Number:
QA76.585
Read Now
4
Evasive malware : a field guide to detecting, analyzing, and defeating advanced threats
by
Cucci, Kyle
Published 2024
No Starch Press
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.C68
Read Now
5
MALWARE DEVELOPMENT FOR ETHICAL HACKERS : learn how to develop various types of malware to strengthen cybersecurity
by
Zhussupov, Zhassulan
Published 2024
Packt Publishing Ltd.
Subjects:
“
...Penetration testing (
Computer
security
) / http://id.loc.gov/authorities/subjects/sh2011003137...
”
Call Number:
QA76.9.A25
Read Now
6
BUG BOUNTY FROM SCRATCH : a comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity
by
Santiago Vázquez, Francisco Javier
Published 2024
Packt Publishing Ltd.
Subjects:
“
...Penetration testing (
Computer
security
) / http://id.loc.gov/authorities/subjects/sh2011003137...
”
Call Number:
QA76.9.A25
Read Now
7
INTRODUCTION TO KALI PURPLE : harness the synergy of offensive and defensive cybersecurity strategies of Kali Linux
by
Lane, Karl
Published 2024
Packt Publishing Ltd.
Subjects:
“
...Penetration testing (
Computer
security
) / http://id.loc.gov/authorities/subjects/sh2011003137...
”
Call Number:
QA76.9.A25
Read Now
8
Identity security for software development
by
Walsh, John
,
Ailon, Uzi
Published 2024
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.D47
Read Now
9
Defensive security handbook : best practices for securing infrastructure
by
Berlin, Amanda
,
Brotherston, Lee
,
Reyor, William F.
Published 2024
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ United States / Planning...
”
Call Number:
QA76.9.A25
Read Now
10
Decentralized Identity Explained : Embrace Decentralization for a More Secure and Empowering Digital Experience
by
Pinto, Rohan
Published 2024
Packt Publishing, Limited
Subjects:
“
...
Computer
security
/ Management...
”
Call Number:
QA76.9.A25
Read Now
11
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
by
Knapp, Eric D.
Published 2024
Syngress
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
TS156.8
Read Now
12
CISSP for dummies
by
Miller, Lawrence
,
Gregory, Peter H.
Published 2024
John Wiley & Sons, Inc.
Subjects:
“
...
Computer
security
/ Examinations / Study guides...
”
Call Number:
QA76.3
Read Now
13
Cybersecurity for Space : A Guide to Foundations and Challenges
by
Oakley, Jacob G.
Published 2024
Apress
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
JZ5695
Read Now
14
Microcontroller exploits
by
Goodspeed, Travis
Published 2024
No Starch Press, Inc.
Subjects:
“
...Penetration testing (
Computer
security
) / http://id.loc.gov/authorities/subjects/sh2011003137...
”
Call Number:
QA76.9.A25
Read Now
15
AWS security
by
Shields, Dylan
Published 2022
Manning Publications
Subjects:
“
...Cloud
computing
/
Security
measures...
”
Call Number:
QA76.9.A25
Read Now
16
CYBERSECURITY IN THE TRANSPORTATION INDUSTRY
Published 2024
JOHN WILEY
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
HE194
Read Now
17
THE ASPIRING CIO AND CISO : a career guide to developing leadership skills, knowledge, experience, and behavior
by
GEE, DAVID J.
Published 2024
Packt Publishing Ltd.
Subjects:
“
...
Computer
security
/ Vocational guidance...
”
Call Number:
QA76.9.A25
Read Now
18
SECURING CLOUD PCs AND AZURE VIRTUAL DESKTOP : start implementing and optimizing security for Windows 365 and AVD infrastructure
by
Verham, Dominiek
,
Vanneuville, Johan
Published 2024
Packt Publishing Ltd.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.V5
Read Now
19
Getting started with eBPF : improving observability, networking, and security through custom eBPF programs
by
Rice, Liz
Published 2024
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.A65
Read Now
20
IT governance : an international guide to data security and ISO 27001/ISO 27002
by
Calder, Alan
,
Watkins, Steve
Published 2024
IT Governance Publishing Ltd
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Language: English
Clear Filter
Recently Uploaded: Last Month
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
26
331 - Labor economics
13
658 - General management
7
004 - Data processing & computer science
6
374 - Adult education
5
384 - Communications; telecommunication
4
more ...
338 - Production
3
330 - Economics
2
358 - Air & other specialized forces
1
363 - Other social problems & services
1
368 - Insurance
1
500 - Natural sciences & mathematics
1
600 - Technology
1
629 - Other branches of engineering
1
670 - Manufacturing
1
see all ...
less ...
Language
English
Collection
O'Reilly
34
Springer Book Archives -2004
1
Author
Ailon, Uzi
1
Aldrin, Andy
1
Berlin, Amanda
1
Brotherston, Lee
1
Bruskin, David
1
Buckwell, Mark
1
more ...
Calder, Alan
1
Chow, Dennis
1
Cucci, Kyle
1
Daele, Stefaan van
1
Edwards, Jason
1
GEE, DAVID J.
1
Goodspeed, Travis
1
Gooley, Jason
1
Gregory, Peter H.
1
Horst, Carsten
1
Hucaby, Dave
1
Kenyon, Bridget
1
Knapp, Eric D.
1
Lakshmana, Navya
1
Lane, Karl
1
Leyte-Vidal, James
1
Loukides, Michael Kosta
1
McDowell, Jeremy
1
Mihailescu, Marius Iulian
1
Miller, Lawrence
1
Nasslahsen, Badr
1
Nita, Stefania Loredana
1
Oakley, Jacob G.
1
Odom, Wendell
1
Okamoto, Eiji
1
Pieprzyk, Josef
1
Pinto, Rohan
1
Prowse, David L.
1
Pylayeva, Dana
1
Reyor, William F.
1
Rice, Liz
1
Santiago Vázquez, Francisco Javier
1
Santos, Omar
1
Seberry, Jennifer
1
Shields, Dylan
1
Shimonski, Robert
1
Spilcă, Laurenţiu
1
Sénécal, David
1
Turner, Omar A.
1
Vanneuville, Johan
1
Verham, Dominiek
1
Walsh, John
1
Watkins, Steve
1
Weiss, Martin
1
West, Darryl
1
Zhussupov, Zhassulan
1
see all ...
less ...
Recently Uploaded
Last Month
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=language%3A%22English%22&filter%5B%5D=newitem_txtF%3A%22last_month%22&lookfor=%22computer+security%22&type=AllFields
Send by Email
×
Loading...