Computer security
Label
Computer security
Name
Computer security
Focus
Actions
Incoming Resources
- Honeypots and routers, collecting internet attacks, Mohssen Mohammed and Habib-ur Rehman
- Hacking multifactor authentication, Roger A. Grimes
- Oracle 11g Anti-hacker's Cookbook
- Data breach preparation and response, breaches are certain, impact is not, Kevvie Fowler ; Curtis Rose, technical editor
- Software transparency, supply chain security in an era of a software-driven society, Chris Hughes and Tony Turner ; foreword by Allan Friedman ; technical editor, Steve Springett
- Federated identity primer, Derrick Rountree
- Security testing handbook for banking applications, Arvind Doraiswamy [and six others]
- Fundamentals of secure software, Derek Fisher
- Linux basics for hackers, getting started with networking, scripting, and security in Kali, by OccupyTheWeb
- Taking control of your personal data
- The CERT C secure coding standard, Robert C. Seacord
- Cybersecurity threats, malware trends, and strategies, mitigate exploits, malware, phishing, and other social engineering attacks, Tim Rains
- Basiswissen Sichere Software, aus- und Weiterbildung zum ISSECO Certified Professionell for Secure Software Engineering, Sachar Paulus
- Ransomware revealed, a beginner's guide to protecting and recovering from ransomware attacks, by Nihad A. Hassan
- Open source intelligence techniques, resources for searching and analyzing online information, Michael Bazzell
- IOS an quan fang hu = Hacking and securing iOS applications, Jonathan Zdziarski zhu ; Chen Jiaxin yi
- Threat hunting, a guide to proactive network defense, Michael Collins
- Mastering Metasploit, write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach, Nipun Jaswal
- Intelligent systems for security informatics, Christopher C. Yang [and others]
- Building secure firmware, armoring the foundation of the platform, Jiewen Yao, Vincent Zimmer
- Metasploit revealed, secrets of the expert pentester : build your defense against complex attacks : a course in three modules
- Techno security's guide to e-discovery and digital forensics, Jack Wiles [and others]
- Geekonomics, the real cost of insecure software, David Rice
- Simple steps to data encryption, a practical guide to secure computing, Peter Loshin
- CompTIA security+ (SYO-401), complete video course, Michael J. Shannon
- Web hacking, become a professional web pentester, Geri Revay
- Information security fundamentals, Thomas R. Peltier
- Healthcare information security and privacy, Sean P. Murphy
- Learn computer forensics, your one-stop guide to searching, analyzing, acquiring, and securing digital evidence, William Oettinger
- Operating system forensic analysis
- Windows security monitoring, scenarios and patterns, Andrei Miroshnikov
- Windows Server 2003 security, a technical reference, Roberta Bragg
- Cryptography in C and C++, Michael Welschenbach ; translated by David Kramer
- IT induction and information security awareness, a pocket guide, Valerie Maddock
- An introduction to security in a CSM 1.3 for AIX 5L environment, [Octavian Lascu and others]
- The security culture playbook, an executive guide to reducing risk and developing your human defense layer, Perry Carpenter, Kai Roer
- Seven deadliest social network attacks, Carl Timm, Richard Perez ; technical editor, Adam Ely
- Practical network scanning, capture network vulnerabilities using standard tools such as Nmap and Nessus, Ajay Singh Chauhan
- Core software security, security at the source, James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt
- Information security management metrics, a definitive guide to effective security monitoring and measurement, W. Krag Brotby
- Cisco NetFlow, Omar Santos
- Mastering Python forensics, master the art of digital forensics and analysis with Python, Michael Spreitzenbarth, Johann Uhrmann
- . Net Security and Cryptography
- Mac OS X security and mobility v10.6, Robert Kite, Michele Hjörleifsson, and Patrick Gallagher
- Security in computing, Charles P. Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp
- Security awareness for dummies, by Ira Winkler
- Managing information security breaches, studies from real life, Michael Krausz
- Kubernetes security, attacking and defending Kubernetes, Andrew Martin
- The cybersecurity playbook for modern enterprises, Jeremy Wittkop
- The CERT Oracle Secure Coding Standard for Java, Fred Long [and others]
Outgoing Resources
- Focus1