vertical_align_top
View:
Images:
S · M

Computer security books

This list has 1 sub-list and 19 members. See also Computer science books, Computer books, Works about security and surveillance, Works about computer security
FLAG
      
favorite
Cryptography books
Cryptography books 1 L, 15 T
  • Underground (Dreyfus book)
    Underground (Dreyfus book) book by Suelette Dreyfus
     0    0
    rank #1 ·
    Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier is a 1997 book by Suelette Dreyfus, researched by Julian Assange. It describes the exploits of a group of Australian, American, and British black hat hackers during the late 1980s and early 1990s, among them Assange himself.
  • Hacking: The Art of Exploitation
    Hacking: The Art of Exploitation 2003 book by Jon "Smibbs" Erickson
     0    0
    rank #2 ·
    Hacking: The Art of Exploitation (ISBN 1-59327-007-0) is a book by Jon "Smibbs" Erickson about computer security and network security. It was published by No Starch Press in 2003, with a second edition in 2008. All the examples in the book were developed, compiled, and tested on Gentoo Linux. The accompanying CD provides a Linux environment containing all the tools and examples referenced in the book.
  • Winn Schwartau
    Winn Schwartau AMerican computer security expert
     0    0
    rank #3 ·
    Winn Schwartau (born July 1, 1952 in New York City) is an expert on security, privacy, infowar, cyber-terrorism and related topics.
  • Hirosh Joseph Person
     0    0
    rank #4 ·
    Hirosh Joseph is a Information security analyst,He was one of the contributor to the book entitled, Vulnerability Analysis and Defense for the Internet, published by Springer (ISBN 0387743898). He is one of the speaker at defcon 2008, a famous security conference. He is the author of several of articles at codeproject.com, a famous site for source code reference.
  • Tom Liston American analyst
     0    0
    rank #5 ·
    Tom Liston is a senior analyst for the Washington, D.C.-based network security consulting firm, InGuardians, Inc.
  • The Plot to Hack America
    The Plot to Hack America book by Malcolm Nance
     0    0
    rank #6 ·
    The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election is a non-fiction book by Malcolm Nance about the Russian interference in the 2016 United States elections. It was published in paperback, audiobook, and e-book formats in 2016 by Skyhorse Publishing. A second edition was also published the same year, and a third edition in 2017. Nance researched Russian intelligence, working as a Russian interpreter and studying KGB history.
  • Reverse Deception
     0    0
    rank #7 ·
    Reverse Deception: Organized Cyber Threat Counter-Exploitation is a book by Sean Bodmer, Max Kilger, Gregory Carpenter, and Jade Jones. It investigates methods and criteria to address organizational responses to Advanced Persistent Threats and cyber deception. It details how to identify APTs and prioritize actions by applying skilled, field-tested private and government sector processes and methods, which often involve cyber deception.
  • Cypherpunks (book)
    Cypherpunks (book) 2012 book by Julian Assange
     0    0
    rank #8 ·
    Cypherpunks: Freedom and the Future of the Internet is a 2012 book by Julian Assange, in discussion with Internet activists and cypherpunks Jacob Appelbaum, Andy Müller-Maguhn and Jérémie Zimmermann. Its primary topic is society's relationship with information security. In the book, the authors warn that the Internet has become a tool of the police state, and that the world is inadvertently heading toward a form of totalitarianism. They promote the use of cryptography to protect against state surveillance.
  •  0    0
    rank #9 ·
    Firewalls and Internet Security: Repelling the Wily Hacker is a 1994 book by William R. Cheswick and Steven M. Bellovin that helped define the concept of a network firewall. Describing in detail one of the first major firewall deployments at AT&T, the book influenced the formation of the perimeter security model, which became the dominant network security architecture in the mid-1990s.
  • The Art of Intrusion
    The Art of Intrusion book by Kevin Mitnick
     0    0
    rank #10 ·
    GloudSim has an article by Sheng Di and Franck Capello that offers in-depth information about virtual machines. This connects to The Art of Intrusion because it talks about how "1200 jobs can be done simultaneously over 112 virtual machines" (Di & Capello, 2015). This is important because this book talks about how the hackers at the casino were able to figure out the random number generator and use multiple virtual drives. These virtual machines would be similar because you could perform many tasks with multiple virtual machines anywhere you go to keep the instructions of their hacking or just important data without it being on your main computer screen for others to see. This is related to how multiple virtual drives and virtual machines are very similar in being able to hold a lot of data and offer easy accessibility.
Desktop | Mobile
This website is part of the FamousFix entertainment community. By continuing past this page, and by your continued use of this site, you agree to be bound by and abide by the Terms of Use. Loaded in 0.23 secs.
Terms of Use  |  Copyright  |  Privacy
Copyright 2006-2025, FamousFix