Computer security
Label
Computer security
Name
Computer security
Focus
Actions
Incoming Resources
- Mafiaboy, a portrait of the hacker as a young man, Michael Calce with Craig Silverman
- CASP CompTIA Advanced Security Practitioner Study Guide, Exam CAS-001
- How to be invisible, protect your home, your children, your assets, and your life, J.J. Luna
- The art of invisibility, the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data, Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen
- Digital fortress, Dan Brown
- Your right to privacy, minimize your digital footprint, Jim Bronskill and David McKie
- This is how they tell me the world ends, the cyber-weapons arms race, Nicole Perlroth
- Malware, rootkits & botnets, a beginner's guide, Christopher C. Elisan ; [foreword by Mikko Hypponen]
- Cyberphobia, identity, trust, security and the Internet, Edward Lucas
- Network security tools, by Justin Clarke, Nitesh Dhanjani
- Cryptography, the key to digital security, how it works, and why it matters, Keith Martin
- Advanced malware analysis, Christopher C. Elisan ; foreword by Amit Yoran, President, RSA
- Privacy versus security in the age of global terror, Dr. Mario Silva
- The art of intrusion, the real stories behind the exploits of hackers, intruders & deceivers, Kevin D. Mitnick, William L. Simon
- The art of invisibility, the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data, Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen
- Advanced persistent threat hacking, the art and science of hacking any organization, Tyler Wrightson
- Hacking For Dummies
- Threat Modeling, Designing for Security
- Black hat Python, Python programming for hackers and pentesters, by Justin Seitz and Tim Arnold ; foreword by Charlie Miller
- Cybershock, surviving hackers, phreakers, identity thieves, Internet terrorists and weapons of mass disruption, by Winn Schwartau
- Cyber mayday and the day after, a leader's guide to preparing, managing, and recovering from inevitable business disruptions, Daniel Lohrmann and Shamane Tan
- An unprogrammed life, adventures of an incurable entrepreneur, William H. Saito
- Cybersecurity, by Joseph Steinberg
- Information security, principles and practice, Mark Stamp
- Cybersecurity essentials, Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short
- Windows security monitoring, scenarios and patterns, Andrei Miroshnikov
- Zer0 days, a Global Produce/Jigsaw production ; Magnolia Pictures and Participant Media present in association with Showtime Documentary Films ; produced by Marc Shmuger, Alex Gibney ; written and directed by Alex Gibney
- Underground, tales of hacking, madness and obsession on the electronic frontier, Suelette Dreyfus & Julian Assange
- Secrets and lies, digital security in a networked world, Bruce Schneier
- Incident response & computer forensics, Jason T. Luttgens, Matthew Pepe, and Kevin Mandia
- File system forensic analysis, Brian Carrier
- Privacy is power, why and how you should take back control of your data, Carissa VĂ©liz
- The art of invisibility, the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data, Kevin Mitnick with Robert Vamosi
- The cyber attack survival manual, tools for surviving everything from identity theft to the digital apocalypse, Nick Selby, Heather Vescent ; illustrations by Eric Chow and Conor Buckley
- Incident response & computer forensics
- Cult of the Dead Cow, how the original hacking supergroup might just save the world, Joseph Menn
- Zero trust networks, building secure systems in untrusted networks, Evan Gilman and Doug Barth
- Cyber threat!, how to manage the growing risk of cyber attacks, N. MacDonnell Ulsch
- How to do everything with Windows XP home networking, Dave Field, Andrew Brandt
- Hacking exposed, web applications : web application security secrets and solutions, Joel Scambray, Vincent Liu, Caleb Sima
- The mathematics of secrets, cryptography from Caesar ciphers to digital encryption, Joshua Holden
- Ransomware protection playbook, Roger A. Grimes
- Virtualization security, protecting virtualized environments, Dave Shackleford
- Art of Memory Forensics, Detecting Malware and Threats in Windows, Linux, and Mac Memory
- Crimedotcom, from viruses to vote rigging, how hacking went global, Geoff White
- Cyber self-defense, expert advice to avoid online predators, identity theft, and cyberbullying, Alexis Moore and Laurie J. Edwards
- Threat modeling, designing for security, Adam Shostack
- No safe harbor, the inside truth about cybercrime-- and how to protect your business, Mark Sangster
- How cybersecurity really works, a hands-on guide for total beginners, by Sam Grubb
- Professional ASP.NET 3.5 security, membership, and role management with C# and VB, Bilal Haidar, Stefan Schackow
Outgoing Resources
- Focus1