Skip to main content Skip to search Skip to search

See All Categories COMPUTERS

Browse Books in Security

LPI Security Essentials Study Guide

Exam 020-100

by (author) David Clinton

Computer Security and the Internet

Tools and Jewels from Malware to Bitcoin

by (author) Paul C. van Oorschot

Cryptography, Information Theory, and Error-Correction

A Handbook for the 21st Century

by (author) Aiden A. Bruen, Mario A. Forcinito & James M. McQuillan

Introduction to Bitcoin: Understanding Peer-to-Peer Networks, Digital Signatures, the Blockchain, Proof-of-Work, Mining, Network Attacks, Bitcoin Core Software, and Wallet Safety (With Color Images & Diagrams)

by (author) David Ricardo

CompTIA A+ Certification All-in-One For Dummies

by (author) Glen E. Clarke, Edward Tetz & Timothy L. Warner

Real-World Bug Hunting

A Field Guide to Web Hacking

by (author) Peter Yaworski

Introductory Computer Forensics

A Hands-on Practical Approach

by (author) Xiaodong Lin

Ubiquitous Computing and Computing Security of IoT

by (author) N. Jeyanthi
edited by Ajith Abraham & Hamid Mcheick

Security and Privacy in Communication Networks

SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings

by (author) Xiaodong Lin
edited by Ali Ghorbani, Kui Ren, Sencun Zhu & Aiqing Zhang

Security and Privacy in Communication Networks

13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings

by (author) Xiaodong Lin
edited by Ali Ghorbani, Kui Ren, Sencun Zhu & Aiqing Zhang

Privileged Attack Vectors

Building Effective Cyber-Defense Strategies to Protect Organizations

by (author) Morey J. Haber & Brad Hibbert

Security Requirements Engineering

Designing Secure Socio-Technical Systems

by (author) Fabiano Dalpiaz, Elda Paja & Paolo Giorgini

Business Cyberbullies and How To Fight Back

by (author) Debbie Elicksen

When Technocultures Collide

Innovation from Below and the Struggle for Autonomy

by (author) Gary Genosko

Identity Theft and Fraud

Evaluating and Managing Risk

by (author) Norm Archer, Susan Sproule, Yufei Yuan, Ken Guo & Junlian Xiang

Dynamic Mixed Models for Familial Longitudinal Data

by (author) Brajendra C. Sutradhar

Information Theoretic Security

Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings

by (author) Reihaneh Safavi-Naini

Selected Areas in Cryptography

14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

by (author) Carlisle Adams
edited by Ali Miri & Michael Wiener

Privacy Enhancing Technologies

7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007 Revised Selected Papers

by (author) Nikita Borisov
edited by Philippe Golle

Selected Areas in Cryptography

13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers

by (author) Eli Biham
edited by Amr M. Youssef

Identify Theft Toolkit

How to recover from and avoid identity theft.

by (author) John Lenardon

Privacy Enhancing Technologies

4th International Workshop, PET 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers

by (author) David Martin
edited by Andrei Serjantov

Selected Areas in Cryptography

11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers

by (author) Helena Handschuh
edited by Anwar Hasan

Selected Areas in Cryptography

10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers

by (author) Mitsuru Matsui
edited by Robert Zuccherato

Page 1 of 2