Computer Security

Also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.

All categories

Books under this sub-category (19 books)

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Publication date: 01 Dec 2006
Document Type: Book
 
An Introduction to Computer Security: The NIST Handbook

An Introduction to Computer Security: The NIST Handbook

Post date: 01 May 2008
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls.
Publication date: 01 Dec 2006
Document Type: Book


Basic Internet Security

Post date: 01 Mar 2017
How to protect yourself, your sources or your friends in the digital world? What are safe routes to take? How do you secure after your personal data? This manual aims to address these issues to help you choose your own 'level' of safety.
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
 
Basic Internet Security

Basic Internet Security

Post date: 01 Mar 2017
How to protect yourself, your sources or your friends in the digital world? What are safe routes to take? How do you secure after your personal data? This manual aims to address these issues to help you choose your own 'level' of safety.
Publication date: 09 May 2011
License: GNU General Public License Version 2 Document Type: Book


Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Publication date: 09 May 2011
License: GNU General Public License Version 2
Document Type: Book
 
Basic Internet Security

Basic Internet Security

Post date: 13 Oct 2016
This book gives hands-on explanations on how to make your digital communication and data more secure and provides you with a basic understanding of the concepts of digital communication and data security.
Publication date: 09 May 2011
License: GNU General Public License Version 2 Document Type: Book


Cracking Codes with Python

Post date: 19 Mar 2018
Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers.
Publisher: No Starch Press
Publication date: 23 Jan 2018
Document Type: Book
 
Cracking Codes with Python

Cracking Codes with Python

Post date: 19 Mar 2018
Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers.
Publisher: No Starch Press
Publication date: 23 Jan 2018
Document Type: Book


Cryptography and Security in Computing

Post date: 12 Nov 2016
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Publisher: InTech
Publication date: 07 Mar 2012
License: Creative Commons Attribution 3.0 Unported
 
Cryptography and Security in Computing

Cryptography and Security in Computing

Post date: 12 Nov 2016
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Publisher: InTech
Publication date: 07 Mar 2012
License: Creative Commons Attribution 3.0 Unported


CS 276: Cryptography

Post date: 21 Oct 2016
Notes from a graduate course on Cryptography offered at the University of California, Berkeley. Familiarity with the notions of algorithm and running time, as well as with basic notions of algebra, discrete math and probability is required.
Publication date: 19 May 2011
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported
Document Type: Lecture Notes
 
CS 276: Cryptography

CS 276: Cryptography

Post date: 21 Oct 2016
Notes from a graduate course on Cryptography offered at the University of California, Berkeley. Familiarity with the notions of algorithm and running time, as well as with basic notions of algebra, discrete math and probability is required.
Publication date: 19 May 2011
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported Document Type: Lecture Notes


Demystifying Internet of Things Security

Post date: 18 May 2021
This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
Publisher: APress
Publication date: 14 Aug 2019
License: Creative Commons Attribution 4.0 International
Document Type: Book
 
Demystifying Internet of Things Security

Demystifying Internet of Things Security

Post date: 18 May 2021
This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
Publisher: APress
Publication date: 14 Aug 2019
License: Creative Commons Attribution 4.0 International Document Type: Book


Engineering Security

Post date: 28 Jun 2016
This book is an overview of how security actually works in practice, and details the success and failures of security implementations. It also focuses on usability, and the different mental models of security between end users and cryptographers.
Publication date: 01 Apr 2014
Document Type: Book
 
Engineering Security

Engineering Security

Post date: 28 Jun 2016
This book is an overview of how security actually works in practice, and details the success and failures of security implementations. It also focuses on usability, and the different mental models of security between end users and cryptographers.
Publication date: 01 Apr 2014
Document Type: Book


Forensic Discovery

Post date: 05 Dec 2007
The definitive guide to computer forensics -- the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators -- both theory and hands-on practice.
Publisher: Addison-Wesley Professional
Publication date: 01 Jan 2005
Document Type: Book
 
Forensic Discovery

Forensic Discovery

Post date: 05 Dec 2007
The definitive guide to computer forensics -- the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators -- both theory and hands-on practice.
Publisher: Addison-Wesley Professional
Publication date: 01 Jan 2005
Document Type: Book


IT Security Cookbook

Post date: 16 Aug 2008
This book is intended as a self help guide to computer and network security, primarily for security managers, programmers and system administrators.
Publication date: 01 Jun 2003
License: Open Content License
Document Type: Book
 
IT Security Cookbook

IT Security Cookbook

Post date: 16 Aug 2008
This book is intended as a self help guide to computer and network security, primarily for security managers, programmers and system administrators.
Publication date: 01 Jun 2003
License: Open Content License Document Type: Book


Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Publisher: Caxton Business & Legal Inc.
Publication date: 01 Oct 2015
Document Type: Book
 
Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers

Post date: 23 Oct 2016
This book serves as a guidepost on the path to cybersecurity risk management best practice with practical expert advice on issues like business enablement, breach avoidance and response, and compliance.
Publisher: Caxton Business & Legal Inc.
Publication date: 01 Oct 2015
Document Type: Book


Online Privacy for Journalists

Post date: 29 Aug 2017
A must-have guide for journalism in 2017. Topics include how to protect your source and sensitive data, maintaining your anonymity online, and securing your emails.
Publisher: Self-publishing
Publication date: 31 Mar 2017
Document Type: Book
 
Online Privacy for Journalists

Online Privacy for Journalists

Post date: 29 Aug 2017
A must-have guide for journalism in 2017. Topics include how to protect your source and sensitive data, maintaining your anonymity online, and securing your emails.
Publisher: Self-publishing
Publication date: 31 Mar 2017
Document Type: Book


Open Source Security Tools: Practical Guide to Security Applications

Post date: 15 Oct 2008
A practical, hands-on introduction to open source security tools.
Publisher: Prentice Hall
Publication date: 01 Aug 2004
Document Type: Book
 
Open Source Security Tools: Practical Guide to Security Applications

Open Source Security Tools: Practical Guide to Security Applications

Post date: 15 Oct 2008
A practical, hands-on introduction to open source security tools.
Publisher: Prentice Hall
Publication date: 01 Aug 2004
Document Type: Book


Own Your Space: Keep Yourself and Your Stuff Safe Online

Post date: 14 Nov 2016
Written for Internet savvy "tweens" and teens specifically, this book is also a useful resource for the adults to keep up with the latest computer and online safety issues and help kids learn to avoid them.
Publication date: 31 Dec 2010
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 United States
Document Type: Book
 
Own Your Space: Keep Yourself and Your Stuff Safe Online

Own Your Space: Keep Yourself and Your Stuff Safe Online

Post date: 14 Nov 2016
Written for Internet savvy "tweens" and teens specifically, this book is also a useful resource for the adults to keep up with the latest computer and online safety issues and help kids learn to avoid them.
Publication date: 31 Dec 2010
License: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 United States Document Type: Book


Safeguarding Your Technology

Post date: 19 Dec 2007
Written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively secure their organization's sensitive information, critical systems, and computer equipment.
Publication date: 31 Dec 1998
 
Safeguarding Your Technology

Safeguarding Your Technology

Post date: 19 Dec 2007
Written to help educational administrators and staff at the building, campus, district, and state levels better understand why and how to effectively secure their organization's sensitive information, critical systems, and computer equipment.
Publication date: 31 Dec 1998


Book Categories
Sponsors