Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Computer Security"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"600 - Technology"
Showing
1
-
20
of
22
Search:
'"Computer Security"'
,
query time: 0.23s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Authenticity, integrity, and security in a digital world : proceedings of a workshop--in brief
by
Whitacre, Paula
Published 2019
National Academies Press
Subjects:
“
...
Computer
Security
...
”
Read Now
2
Container storage and data protection for applications on Kubernetes
by
Conrad, Peter
Published 2022
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.A65
Read Now
3
Security Observability with eBPF
by
Salazar, Jed
,
Ivanko, Natalia Reka
Published 2022
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.A65
Read Now
4
What is eBPF?
by
Rice, Liz
Published 2022
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.A65
Read Now
5
Data Privacy for the Smart Grid
by
Herold, Rebecca
Published 2015
Taylor & Francis
Subjects:
“
...
Computer
security
...
”
Read Now
6
Digital Defense : A Cybersecurity Primer
by
Pelton, Joseph
,
Singh, Indu B.
Published 2015
Springer International Publishing
Subjects:
“
...
Computer
security
...
”
Read Now
7
Social Engineering : How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication
by
Gehl, Robert W.
Published 2022
The MIT Press
Subjects:
“
...
Computer
security
...
”
Read Now
8
Wireless device use and patient monitoring equipment in any healthcare delivery setting : a review of safety and guidelines
Published 2014
Canadian Agency for Drugs and Technologies in Health
Subjects:
“
...
Computer
Security
/ standards...
”
Read Now
9
Wireless device use and patient monitoring equipment in any healthcare delivery setting : a review of safety and guidelines
Published 2014
Canadian Agency for Drugs and Technologies in Health
Subjects:
“
...
Computer
Security
/ standards...
”
Read Now
10
Infrastructure & ops hour with Sam Newman: eBPF with Liz Rice
Published 2022
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.A65
Read Now
11
Learning EBPF : programming the linux kernel for enhanced observability, networking, and security
by
Rice, Liz
Published 2023
O'Reilly Media, Inc.
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.A65
Read Now
12
CYBERSECURITY IN SMART HOMES : architectures, solutions and technologies
by
KHATOUN, RIDA.
Published 2022
JOHN WILEY
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.9.A25
Read Now
13
Learn Kubernetes security : securely orchestrate, scale, and manage your microservices in Kubernetes deployments
by
Huang, Kaizhe
,
Jumde, Pranjal
Published 2020
Packt Publishing
Subjects:
“
...
Computer
security
/ http://id.loc.gov/authorities/subjects/sh90001862...
”
Call Number:
QA76.76.A65
Read Now
14
Security in Distributed, Grid, Mobile, and Pervasive Computing
by
Xiao, Yang
Published 2007
Taylor & Francis
Subjects:
“
...
Computer
security
/ bicssc...
”
Read Now
15
Data Privacy and Trust in Cloud Computing : Building trust in the cloud through assurance and accountability
by
Lynn, Theo
Published 2021
Springer Nature
Subjects:
“
...
Computer
security
...
”
Read Now
16
Pentesting Industrial Control Systems : an Ethical Hacker's Guide to Analyzing, Compromising, Mitigating, and Securing Industrial Processes
by
Smith, Paul
Published 2021
Packt Publishing, Limited
Subjects:
“
...Penetration testing (
Computer
security
) / fast...
”
Call Number:
QA76.9.A25
Read Now
17
Data Privacy for the Smart Grid
by
Herold, Rebecca
Published 2015
Taylor & Francis
Subjects:
“
...
Computer
security
...
”
Read Now
18
Information Security Governance Simplified : From the Boardroom to the Keyboard
by
Fitzgerald, Todd
Published 2011
Taylor & Francis
Subjects:
“
...
Computer
security
/ bicssc...
”
Read Now
19
Defense against the Black Arts : How Hackers Do What They Do and How to Protect against It
by
Varsalone, Jesse
Published 2012
Taylor & Francis
Subjects:
“
...
Computer
security
/ bicssc...
”
Read Now
20
Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE)
by
Bochman, Andrew A.
,
Freeman, Sarah G.
Published 2021
CRC Press
Subjects:
“
...
Computer
security
/ United States...
”
Call Number:
QA76.9.A25
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 600 - Technology
Year of Publication
From:
To:
Classification
600 - Technology
005 - Computer programming, programs & data
9
000 - Computer science, information & general works
8
330 - Economics
6
620 - Engineering & allied operations
4
333 - Economics of land & energy
3
more ...
380 - Commerce, communications & transportation
3
700 - The arts; fine & decorative arts
3
331 - Labor economics
2
364 - Criminology
2
500 - Natural sciences & mathematics
2
610 - Medicine & health
2
900 - History & geography
2
170 - Ethics
1
200 - Religion
1
304 - Factors affecting social behavior
1
340 - Law
1
363 - Other social problems & services
1
370 - Education
1
384 - Communications; telecommunication
1
629 - Other branches of engineering
1
658 - General management
1
670 - Manufacturing
1
see all ...
less ...
Language
English
21
Japanese
1
Collection
O'Reilly
10
Directory of Open Access Books
6
National Center for Biotechnology Information
3
OAPEN
2
Springer eBooks 2005-
1
Author
Rice, Liz
3
Canadian Agency for Drugs and Technologies in Health
2
Herold, Rebecca
2
Hertzog, Christine
2
Authenticity, Integrity, and Security in a Digital World (Workshop) (2019, Washington, D.C.)
1
Bochman, Andrew A.
1
more ...
Conrad, Peter
1
Degioanni, Loris
1
Fitzgerald, Todd
1
Fox, Grace
1
Freeman, Sarah G.
1
Gehl, Robert W.
1
Government-University-Industry Research Roundtable
1
Huang, Kaizhe
1
Ivanko, Natalia Reka
1
Jumde, Pranjal
1
KHATOUN, RIDA
1
Kondō, Uchio
1
Lawson, Sean T
1
Lynn, Theo
1
Lytras, Miltiadis
1
McFadden, Matthew
1
Mooney, John G.
1
Morrissey, Sean
1
Peltier, Tom
1
Pelton, Joseph
1
Salazar, Jed
1
Schearer, Michael
1
Singh, Indu B.
1
Smith, Paul
1
Takeuchi, Satoru
1
Varsalone, Jesse
1
Visvizi, Anna
1
Whitacre, Paula
1
Xiao, Yang
1
van der Werff, Lisa
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22600+-+Technology%22&lookfor=%22Computer+Security%22&type=Subject
Send by Email
×
Loading...