Etiquetas relacionadas
Temas relacionados
Computer networks › Security measures (104)
Operating systems (Computers) (37)
Operating systems (Computers) (34)
Data protection (32)
Computer networks › Security measures (30)
Linux (28)
Computer crimes (28)
Computer hackers (28)
Cryptography (26)
Internet › Security measures (21)
Data encryption (Computer science) (20)
Computer crimes (17)
Cryptography (15)
Data protection (15)
Grupos de etiquetas relacionados
security, --windows (89)
computer, security (78)
computer security, -fiction (74)
computer security, programming (72)
security, --linux (70)
security, software (60)
internet, security (55)
linux, security (35)
hacking, non-fiction (32)
security, unix (30)
Asunto: Computer security
Sub-temas
Computer Security (119 obras)
Computer security (157 obras)
Computer security › Australia (2 obras)
Computer security › Australia (1 obras)
Computer security › Congresses (1 obras)
Computer security › Congresses (2 obras)
Computer security › Dictionaries (1 obras)
Computer security › Drama (1 obras)
Computer security › Evaluation (1 obras)
Computer security › Evaluation (1 obras)
Computer security › Examinations › Study guides (6 obras)
Computer security › Examinations › Study guides (2 obras)
Computer security › Fiction (4 obras)
Computer security › Fiction (3 obras)
Computer security › Great Britain (1 obras)
Computer security › Handbooks, manuals, etc (1 obras)
Computer security › Handbooks, manuals, etc (100 obras)
Computer security › Management (2 obras)
Computer security › Management › Handbooks, manuals, etc (3 obras)
Computer security › Management › Handbooks, manuals, etc (1 obras)
Computer security › Management (2 obras)
Computer security › Mathematics (1 obras)
Computer security › New York (1 obras)
Computer security › New York (State) › New York (1 obras)
Computer security › Software (1 obras)
Computer security › Standards (1 obras)
Computer security › United States (9 obras)
Computer security › United States › Biography (1 obras)
Computer security › United States (2 obras)
Computer security › United States. › Law and legislation (1 obras)
Computer security (70 obras)
Computer security equipment industry (1 obras)
Libros bajo este tema
- La fortaleza digital por Dan Brown (17,921 copias)
- The Art of Deception: Controlling the Human Element of… por Kevin D. Mitnick (1,404 copias)
- Secrets and lies : digital security in a networked world por Bruce Schneier (1,055 copias)
- Crypto: How the Code Rebels Beat the Government Saving… por Steven Levy (823 copias)
- Hackers : secretos y soluciones para la seguridad de redes por Stuart McClure (661 copias)
- The Art of Intrusion: The Real Stories Behind the Exploits… por Kevin D. Mitnick (568 copias)
- Cyberpunk: Outlaws and Hackers on the Computer Frontier por Katie Hafner (495 copias)
- The Zenith Angle por Bruce Sterling (467 copias)
- Applied Cryptography: Protocols, Algorithms, and Source… por Bruce Schneier (427 copias)
- Practical UNIX and Internet Security por Simson Garfinkel (419 copias)
- Masters of Deception: The Gang That Ruled Cyberspace por Michelle Slatalla (383 copias)
- Murder in the Sentier por Cara Black (344 copias)
- Writing Secure Code, Second Edition por Michael Howard (333 copias)
- Security Engineering: A Guide to Building Dependable… por Ross J. Anderson (314 copias)
- How to Be Invisible: The Essential Guide to Protecting Your… por J.J. Luna (277 copias)
- Cryptography and Network Security: Principle and Practice por William Stallings (269 copias)
- Practical Cryptography por Niels Ferguson (266 copias)
- Reversing : Secrets of Reverse Engineering por Eldad Eilam (246 copias)
- Database Nation : The Death of Privacy in the 21st Century por Simson Garfinkel (225 copias)
- The Shellcoder's Handbook: Discovering and Exploiting… por Jack Koziol (196 copias)
- Network Security Hacks por Andrew Lockhart (191 copias)
- Hacking For Dummies por Kevin Beaver (176 copias)
- Exegesis por Astro Teller (174 copias)
- Exploiting Software: How to Break Code por Greg Hoglund (147 copias)
- Security in Computing, 4th Edition por Charles P. Pfleeger (145 copias)
- Underground: Tales of Hacking, Madness, and Obsession on… por Suelette Dreyfus (142 copias)
- Hackers En Linux por Brian Hatch (134 copias)
- Network Intrusion Detection (3rd Edition) por Stephen Northcutt (132 copias)
- Rootkits: Subverting the Windows Kernel por Greg Hoglund (124 copias)
- Decrypted Secrets: Methods and Maxims of Cryptology por Friedrich L. Bauer (121 copias)
- Maximum Security por Anonymous (117 copias)
- Maximum Linux Security: A Hacker's Guide to Protecting Your… por Anonymous (117 copias)
- The Watchman: The Twisted Life and Crimes of Serial Hacker… por Jonathan Littman (115 copias)
- Network Security: Private Communication in a Public World por Charlie Kaufman (114 copias)
- The Unwanted Gaze: The Destruction of Privacy in America por Jeffrey Rosen (111 copias)
- Secure Coding: Principles and Practices por Mark G. Graff (103 copias)
- Secrets of a Super Hacker por Knightmare (101 copias)
- Building Secure Software: How to Avoid Security Problems… por John Viega (98 copias)
- Java Security (2nd Edition) por Scott Oaks (92 copias)
- Network Security Essentials: Applications and Standards… por William Stallings (89 copias)
- Secure Programming Cookbook for C and C : Recipes for… por John Viega (87 copias)
- The Art of Computer Virus Research and Defense por Peter Szor (82 copias)
- Software Security: Building Security In por Gary McGraw (81 copias)
- Cryptography Decrypted por H. X. Mel (77 copias)
- Computer Security Basics por Deborah Russell (71 copias)
- Computer Security por Matt Bishop (68 copias)
- Secure Coding in C and C++ por Robert C. Seacord (67 copias)
- 19 Deadly Sins of Software Security (Security One-off) por Michael Howard (63 copias)
- Computer Forensics: Computer Crime Scene Investigation… por John R. Vacca (62 copias)
- Tangled Web: Tales of Digital Crime from the Shadows of… por Richard Power (62 copias)