Computer Security

Also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

All categories

Books under this sub-category (16 books)

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Publication date: 01 Dec 2006
Document Type: Book
 
An Introduction to Computer Security: The NIST Handbook

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Publication date: 01 Dec 2006
Document Type: Book


Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
 
Basic Internet Security

Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Publication date: 09 May 2011
License: GNU General Public License Version 2 Document Type: Book


Basic Internet Security

Post date: 01 Mar 2017
How to protect yourself, your sources or your friends in the digital world? What are safe routes to take? How do you secure after your personal data? This manual aims to address these issues to help you choose your own 'level' of safety.
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
 
Basic Internet Security

Basic Internet Security

Post date: 01 Mar 2017
How to protect yourself, your sources or your friends in the digital world? What are safe routes to take? How do you secure after your personal data? This manual aims to address these issues to help you choose your own 'level' of safety.
Publication date: 09 May 2011
License: GNU General Public License Version 2 Document Type: Book


Cryptography and Security in Computing

Post date: 12 Nov 2016
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Publisher: InTech
Publication date: 07 Mar 2012
License: Creative Commons Attribution 3.0 Unported
 
Cryptography and Security in Computing

Cryptography and Security in Computing

Post date: 12 Nov 2016
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Publisher: InTech
Publication date: 07 Mar 2012
License: Creative Commons Attribution 3.0 Unported


CS 276: Cryptography

Post date: 21 Oct 2016
Notes from a graduate course on Cryptography offered at the University of California, Berkeley. Familiarity with the notions of algorithm and running time, as well as with basic notions of algebra, discrete math and probability is required.
Publication date: 19 May 2011
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported
Document Type: Lecture Notes
 
CS 276: Cryptography

CS 276: Cryptography

Post date: 21 Oct 2016
Notes from a graduate course on Cryptography offered at the University of California, Berkeley. Familiarity with the notions of algorithm and running time, as well as with basic notions of algebra, discrete math and probability is required.
Publication date: 19 May 2011
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported Document Type: Lecture Notes


Engineering Security

Post date: 28 Jun 2016
This book is an overview of how security actually works in practice, and details the success and failures of security implementations. It also focuses on usability, and the different mental models of security between end users and cryptographers.
Publication date: 01 Apr 2014
Document Type: Book
 
Engineering Security

Engineering Security

Post date: 28 Jun 2016
This book is an overview of how security actually works in practice, and details the success and failures of security implementations. It also focuses on usability, and the different mental models of security between end users and cryptographers.
Publication date: 01 Apr 2014
Document Type: Book


Forensic Discovery

Post date: 05 Dec 2007
The definitive guide to computer forensics -- the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators -- both theory and hands-on practice.
Publisher: Addison-Wesley Professional
Publication date: 01 Jan 2005
Document Type: Book
 
Forensic Discovery

Forensic Discovery

Post date: 05 Dec 2007
The definitive guide to computer forensics -- the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators -- both theory and hands-on practice.
Publisher: Addison-Wesley Professional
Publication date: 01 Jan 2005
Document Type: Book


IT Security Cookbook

Post date: 16 Aug 2008
This book is intended as a self help guide to computer and network security, primarily for security managers, programmers and system administrators.
Publication date: 01 Jun 2003
License: Open Content License
Document Type: Book
 
IT Security Cookbook

IT Security Cookbook

Post date: 16 Aug 2008
This book is intended as a self help guide to computer and network security, primarily for security managers, programmers and system administrators.
Publication date: 01 Jun 2003
License: Open Content License Document Type: Book


Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Publisher: Caxton Business & Legal Inc.
Publication date: 01 Oct 2015
Document Type: Book
 
Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Publisher: Caxton Business & Legal Inc.
Publication date: 01 Oct 2015
Document Type: Book


Open Source Security Tools: Practical Guide to Security Applications

Post date: 15 Oct 2008
A practical, hands-on introduction to open source security tools.
Publisher: Prentice Hall
Publication date: 01 Aug 2004
Document Type: Book
 
Open Source Security Tools: Practical Guide to Security Applications

Open Source Security Tools: Practical Guide to Security Applications

Post date: 15 Oct 2008
A practical, hands-on introduction to open source security tools.
Publisher: Prentice Hall
Publication date: 01 Aug 2004
Document Type: Book


Own Your Space: Keep Yourself and Your Stuff Safe Online

Post date: 14 Nov 2016
Written for Internet savvy "tweens" and teens specifically, this book is also a useful resource for the adults to keep up with the latest computer and online safety issues and help kids learn to avoid them.
Publication date: 31 Dec 2010
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 United States
Document Type: Book
 
Own Your Space: Keep Yourself and Your Stuff Safe Online

Own Your Space: Keep Yourself and Your Stuff Safe Online

Post date: 14 Nov 2016
Written for Internet savvy "tweens" and teens specifically, this book is also a useful resource for the adults to keep up with the latest computer and online safety issues and help kids learn to avoid them.
Publication date: 31 Dec 2010
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 United States Document Type: Book


Safeguarding Your Technology

Post date: 19 Dec 2007
Written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively secure their organization's sensitive information, critical systems, and computer equipment.
Publication date: 31 Dec 1998
 
Safeguarding Your Technology

Safeguarding Your Technology

Post date: 19 Dec 2007
Written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively secure their organization's sensitive information, critical systems, and computer equipment.
Publication date: 31 Dec 1998


Security+ Essentials

Post date: 06 Mar 2008
This book provides the knowledge needed by IT professionals to pass the CompTIA Security+ exam. It's also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.
Publication date: 01 Mar 2008
Document Type: Book
 
Security+ Essentials

Security+ Essentials

Post date: 06 Mar 2008
This book provides the knowledge needed by IT professionals to pass the CompTIA Security+ exam. It's also of considerable use to anyone with a need to understand the concepts involved in creating and maintaining a secure IT environment.
Publication date: 01 Mar 2008
Document Type: Book


Ten Strategies of a World-Class Cybersecurity Operations Center

Post date: 23 Oct 2016
Covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments.
Publisher: The MITRE Corporation
Publication date: 31 Dec 2014
Document Type: Book
 
Ten Strategies of a World-Class Cybersecurity Operations Center

Ten Strategies of a World-Class Cybersecurity Operations Center

Post date: 23 Oct 2016
Covers ten key qualities of leading Cyber Security Operations Centers (CSOCs), ranging from their structure and organization, to processes that best enable smooth operations, to approaches that extract maximum value from key CSOC technology investments.
Publisher: The MITRE Corporation
Publication date: 31 Dec 2014
Document Type: Book


The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.
Publisher: SysSec
Publication date: 01 Sep 2013
License: Standard Copyright License
Document Type: Book
 
The SysSec Red Book: A Roadmap for Systems Security Research

The SysSec Red Book: A Roadmap for Systems Security Research

Post date: 15 Nov 2016
The Red Book presents a roadmap in the area of systems security, as prepared by the SysSec consortium and its constituency in the first half of 2013.
Publisher: SysSec
Publication date: 01 Sep 2013
License: Standard Copyright License Document Type: Book


Book Categories
Sponsors
Icons8, a free icon pack