Computer Security

Also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

All categories

Books under this sub-category (14 books)

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Author(s): National Institute of Standards and Technology
Publication date: 01 Dec 2006
Document Type: Book
Tags: Computer Security Cryptography Information Security
 
An Introduction to Computer Security: The NIST Handbook

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Author(s): National Institute of Standards and Technology
Publication date: 01 Dec 2006
Document Type: Book
Tags: Computer Security Cryptography Information Security


Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Editor(s): Adam Hyde
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
Tags: Computer Security Cryptography Information Security
 
Basic Internet Security

Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Editor(s): Adam Hyde
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
Tags: Computer Security Cryptography Information Security


Cryptography and Security in Computing

Post date: 12 Nov 2016
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Editor(s): Jaydip Sen
Publication date: 07 Mar 2012
License: Creative Commons Attribution 3.0 Unported
Tags: Computer Security Cryptography
 
Cryptography and Security in Computing

Cryptography and Security in Computing

Post date: 12 Nov 2016
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Editor(s): Jaydip Sen
Publication date: 07 Mar 2012
License: Creative Commons Attribution 3.0 Unported
Tags: Computer Security Cryptography


CS 276: Cryptography

Post date: 21 Oct 2016
Notes from a graduate course on Cryptography offered at the University of California, Berkeley. Familiarity with the notions of algorithm and running time, as well as with basic notions of algebra, discrete math and probability is required.
Author(s): Luca Trevisan
Publication date: 19 May 2011
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported
Document Type: Lecture Notes
Tags: Computer Security
 
CS 276: Cryptography

CS 276: Cryptography

Post date: 21 Oct 2016
Notes from a graduate course on Cryptography offered at the University of California, Berkeley. Familiarity with the notions of algorithm and running time, as well as with basic notions of algebra, discrete math and probability is required.
Author(s): Luca Trevisan
Publication date: 19 May 2011
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported
Document Type: Lecture Notes
Tags: Computer Security


Engineering Security

Post date: 28 Jun 2016
This book is an overview of how security actually works in practice, and details the success and failures of security implementations. It also focuses on usability, and the different mental models of security between end users and cryptographers.
Author(s): Peter Gutmann
Publication date: 01 Apr 2014
Document Type: Book
Tags: Computer Security Information Security
 
Engineering Security

Engineering Security

Post date: 28 Jun 2016
This book is an overview of how security actually works in practice, and details the success and failures of security implementations. It also focuses on usability, and the different mental models of security between end users and cryptographers.
Author(s): Peter Gutmann
Publication date: 01 Apr 2014
Document Type: Book
Tags: Computer Security Information Security


Forensic Discovery

Post date: 05 Dec 2007
The definitive guide to computer forensics -- the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators -- both theory and hands-on practice.
Author(s): Dan Farmer Wietse Venema
Publication date: 01 Jan 2005
Document Type: Book
Tags: Computer Security System Administration
 
Forensic Discovery

Forensic Discovery

Post date: 05 Dec 2007
The definitive guide to computer forensics -- the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators -- both theory and hands-on practice.
Author(s): Dan Farmer Wietse Venema
Publication date: 01 Jan 2005
Document Type: Book
Tags: Computer Security System Administration


IT Security Cookbook

Post date: 16 Aug 2008
This book is intended as a self help guide to computer and network security, primarily for security managers, programmers and system administrators.
Author(s): Sean Boran
Publication date: 01 Jun 2003
License: Open Content License
Document Type: Book
Tags: Computer Security System Administration
 
IT Security Cookbook

IT Security Cookbook

Post date: 16 Aug 2008
This book is intended as a self help guide to computer and network security, primarily for security managers, programmers and system administrators.
Author(s): Sean Boran
Publication date: 01 Jun 2003
License: Open Content License
Document Type: Book
Tags: Computer Security System Administration


Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Editor(s): Matthew Rosenquist
Publication date: 01 Oct 2015
Document Type: Book
Tags: Computer Security Cryptography Information Security
 
Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Editor(s): Matthew Rosenquist
Publication date: 01 Oct 2015
Document Type: Book
Tags: Computer Security Cryptography Information Security


Open Source Security Tools: Practical Guide to Security Applications

Post date: 15 Oct 2008
A practical, hands-on introduction to open source security tools.
Author(s): Tony Howlett
Publication date: 01 Aug 2004
Document Type: Book
Tags: Computer Security System Administration
 
Open Source Security Tools: Practical Guide to Security Applications

Open Source Security Tools: Practical Guide to Security Applications

Post date: 15 Oct 2008
A practical, hands-on introduction to open source security tools.
Author(s): Tony Howlett
Publication date: 01 Aug 2004
Document Type: Book
Tags: Computer Security System Administration


Own Your Space: Keep Yourself and Your Stuff Safe Online

Post date: 14 Nov 2016
Written for Internet savvy "tweens" and teens specifically, this book is also a useful resource for the adults to keep up with the latest computer and online safety issues and help kids learn to avoid them.
Author(s): Linda McCarthy
Publication date: 31 Dec 2010
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 United States
Document Type: Book
Tags: Computer Security
 
Own Your Space: Keep Yourself and Your Stuff Safe Online

Own Your Space: Keep Yourself and Your Stuff Safe Online

Post date: 14 Nov 2016
Written for Internet savvy "tweens" and teens specifically, this book is also a useful resource for the adults to keep up with the latest computer and online safety issues and help kids learn to avoid them.
Author(s): Linda McCarthy
Publication date: 31 Dec 2010
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 United States
Document Type: Book
Tags: Computer Security


Safeguarding Your Technology

Post date: 19 Dec 2007
Written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively secure their organization's sensitive information, critical systems, and computer equipment.
Author(s): Nation Center for Education Statistics
Publication date: 31 Dec 1998
Tags: Computer Security Cryptography
 
Safeguarding Your Technology

Safeguarding Your Technology

Post date: 19 Dec 2007
Written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively secure their organization's sensitive information, critical systems, and computer equipment.
Author(s): Nation Center for Education Statistics
Publication date: 31 Dec 1998
Tags: Computer Security Cryptography


Security+ Essentials

Post date: 06 Mar 2008
This book provides the knowledge needed by IT professionals to pass the CompTIA Security+ exam. It's also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.
Author(s): Neil Smyth
Publication date: 01 Mar 2008
Document Type: Book
Tags: Computer Security System Administration
 
Security+ Essentials

Security+ Essentials

Post date: 06 Mar 2008
This book provides the knowledge needed by IT professionals to pass the CompTIA Security+ exam. It's also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.
Author(s): Neil Smyth
Publication date: 01 Mar 2008
Document Type: Book
Tags: Computer Security System Administration


Ten Strategies of a World-Class Cybersecurity Operations Center

Post date: 23 Oct 2016
Covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments.
Author(s): Carson Zimmerman
Publication date: 31 Dec 2014
Document Type: Book
Tags: Computer Security Cryptography System Administration
 
Ten Strategies of a World-Class Cybersecurity Operations Center

Ten Strategies of a World-Class Cybersecurity Operations Center

Post date: 23 Oct 2016
Covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments.
Author(s): Carson Zimmerman
Publication date: 31 Dec 2014
Document Type: Book
Tags: Computer Security Cryptography System Administration


The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.
 
The SysSec Red Book: A Roadmap for Systems Security Research

The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.

Book Categories