Computer security
Authority Link
(OCoLC)fst00872484
Label
Computer security
Name
Computer security
Source
fast
Focus
Actions
Incoming Resources
- Practical security, simple practices for defending your systems, Roman Zabicki
- Cybercrime, Noël Merino, book editor
- Future crimes, everything is connected, everyone is vulnerable and what we can do about it, Marc Goodman
- How to improve cyber security, produced by Bloomberg
- Futureproof, security aesthetics and the management of life, edited by D. Asher Ghertner, Hudson McFann, and Daniel M. Goldstein
- Epic win for Anonymous, how 4chan's army conquered the Web, Cole Stryker
- Data and Goliath, the hidden battles to collect your data and control your world, Bruce Schneier
- Toward a safer and more secure cyberspace, Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors
- Cyber security, written, produced, directed, & edited by Charlotte Angel & Kyle Boyd
- Crypto, how the code rebels beat the government, saving privacy in the digital age, Steven Levy
- Cybersecurity for small networks, a no-nonsense guide for the reasonably paranoid, by Seth Enoka
- What are the risks of cyber attacks on enemies?, produced by Bloomberg
- Cyber security culture, counteracting cyber threats through organizational learning and training, Peter Trim and David Upton
- Encyclopedia of information ethics and security, Marian Quigley [editor]
- The architecture of privacy, on engineering technologies that can deliver trustworthy safeguards, Courtney Bowman, Ari Gesher, John K. Grant and Daniel Slate ; edited by Elissa Lerner
- U.S., China prepare to discuss cybersecurity, produced by Bloomberg
- Social engineering, the art of human hacking, by Christopher Hadnagy ; [foreword by Paul Wilson]
- Cyber insecurity, navigating the perils of the next information age, edited by Richard M. Harrison and Trey Herr
- The Internet in everything, freedom and security in a world with no off switch, Laura DeNardis
- How to secure your online presence, produced by Bloomberg
- Database nation, the death of privacy in the 21st century, Simson Garfinkel
- Cult of the Dead Cow, how the original hacking supergroup might just save the world, Joseph Menn
- The private is political, networked privacy and social media, Alice E. Marwick
- Net privacy, how we can be free in an age of surveillance, Sacha Molitorisz
- Cyberpunk, outlaws and hackers on the computer frontier, Katie Hafner and John Markoff
- Cyberphobia, identity, trust, security and the Internet, Edward Lucas
- What should Yahoo become?, produced by Bloomberg
- Cyber self-defense, expert advice to avoid online predators, identity theft, and cyberbullying, Alexis Moore and Laurie J. Edwards
- Crimedotcom, from viruses to vote rigging, how hacking went global, Geoff White
- Digital fortress, Dan Brown
- Phishing and countermeasures, understanding the increasing problem of electronic identity theft, edited by Markus Jakobsson, Steven Myers
- Zen and the art of information security, Ira Winkler
- 'Quantum dawn 2' is a cyber-attack bank drill, produced by Bloomberg
- How can the U.S. better safeguard against hackers?, produced by Bloomberg
- The art of invisibility, the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data, Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen
- A business guide to information security, how to protect your company's IT assets, reduce risks and understand the law, Alan Calder
- The cyber security oasis in the Israeli desert, produced by Bloomberg
- Answering your questions on cybersecurity, featuring Janet Napolitano
- How to protect personal data online, produced by Bloomberg
- Securing the internet in a post 9/11 world, produced by Bloomberg
- The mathematics of secrets, cryptography from Caesar ciphers to digital encryption, Joshua Holden
- Information security, policy, processes, and practices, Detmar W. Straub, Seymour Goodman, Richard L. Baskerville, editors
- How much Silicon Valley data has been breached?, produced by Bloomberg
- Hacking the future, privacy, identity, and anonymity on the Web, Cole Stryker
- Techno Security's guide to managing risks, for IT managers, auditors, and investigators, Jack Wiles ; Russ Rogers, technical editor
- Ghost in the wires, my adventures as the world's most wanted hacker, Kevin Mitnick with William L. Simon
- Implementing Sourcefire's security products, produced by Bloomberg
- A new challenge for our age, securing America against the threat of cyber attack, produced by United States Department of Homeland Security
- Can Symantec keep up with hackers?, produced by Bloomberg
- Cybersecurity, current writings on threats and protection, edited by Joaquin Jay Gonzalez III and Roger L. Kemp
Outgoing Resources
- Focus1