Computer security
Label
Computer security
Name
Computer security
Source
cct
Focus
Actions
Incoming Resources
- Subject of33
- No safe harbor, the inside truth about cybercrime -- and how to protect your business, Mark Sangster
- Crypto, how the code rebels beat the government, saving privacy in the digital age, Steven Levy
- Threats, what every engineer should learn from Star Wars, Adam Shostack
- Cybersecurity, by Joseph Steinberg
- Future crimes, everything is connected, everyone is vulnerable and what we can do about it, Marc Goodman
- Hacking, by Kevin Beaver, CISSP
- Digital defense, a cybersecurity primer, Joseph N. Pelton, Indu B. Singh
- Cyber crisis, protecting your business from real threats in the virtual world, Eric Cole
- The security culture playbook, Perry Carpenter, Kai Roer
- Anatomy of cyberattack, Mikko S. Niemelä
- Coding democracy, how hackers are disrupting power, surveillance, and authoritarianism, Maureen Webb ; foreword by Cory Doctorow
- Cloud security, Ted Coombs
- Cult of the Dead Cow, how the original hacking supergroup might just save the world, Joseph Menn
- Hacking the future, privacy, identity, and anonymity on the Web, Cole Stryker
- End spyware forever!
- The art of attack, attacker mindset for security professionals, Maxie Reynolds
- My online privacy for seniors, Jason R. Rich
- PC magazine Windows XP security solutions, Dan DiNicolo
- How cybersecurity really works, a hands-on guide for total beginners, Sam Grubb
- Data and Goliath, the hidden battles to collect your data and control your world, Bruce Schneier
- Ransomware protection playbook, Roger A. Grimes
- Be cyber secure, edited by Jonathan Reuvid
- Elements of computer security, David Salomon
- Fighting phishing, everything you can do to fight social engineering and phishing, Roger A. Grimes with Dr. John N. Just
- Android hacker's handbook, by Joshua J. Drake [and five others]
- Privacy in a digital, networked world, technologies, implications and solutions, Sherali Zeadally, Mohamad Badra, editors
- Not with a bug, but with a sticker, attacks on machine learning systems and what to do about them, Ram Shankar Siva Kumar, Hyrum Anderson
- The mathematics of secrets, cryptography from Caesar ciphers to digital encryption, Joshua Holden
- If it's smart, it's vulnerable, Mikko Hypponen
- The ransomware hunting team, a band of misfits' improbable crusade to save the world from cybercrime, Renee Dudley and Daniel Golden
- Zero days, a Global Produce/Jigsaw production ; Magnolia Pictures and Participant Media present ; in association with Showtime Documentary Films ; produced by Marc Shmuger, Alex Gibney ; written and directed by Alex Gibney
- Hacking exposed, malware and rootkits : security secrets & solutions, Christopher C. Elisan, Michael A. Davis, Sean M. Bodmer, Aaron LeMasters
Outgoing Resources
- Focus1