Skip to main content

Shopping Cart

You're getting the VIP treatment!

Item(s) unavailable for purchase
Please review your cart. You can remove the unavailable item(s) now or we'll automatically remove it at Checkout.
itemsitem
itemsitem

Recommended For You

Loading...

Computer Security eBooks

If you like Computer Security eBooks, then you'll love these top picks.
Showing 1 - 24 of 6535 Results
Skip side bar filters
  • Advanced Digital Auditing

    Theory and Practice of Auditing Complex Information Systems and Technologies

    Series series Progress in IS
    This open access book discusses the most modern approach to auditing complex digital systems and technologies. It combines proven auditing approaches, advanced programming techniques and complex application areas, and covers the latest findings on theory and practice in this rapidly developing field. Especially for those who want to learn more about novel approaches to testing complex information ... Read more

    Free

  • Cyber Security

    17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers

    Series Book 1299 - Communications in Computer and Information Science
    This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020.The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security ... Read more

    Free

  • Die Zukunft von Privatheit und Selbstbestimmung

    Analysen und Empfehlungen zum Schutz der Grundrechte in der digitalen Welt

    Series series DuD-Fachbeiträge
    Die in diesem Open-Access-Buch zusammengeführten interdisziplinären Untersuchungen des „Forums Privatheit“ gehen der Frage nach, wie sich die Verwirklichungsbedingungen von Privatheit und Selbstbestimmung durch die Digitalisierung aller Lebensbereiche radikal ändern. Nahezu jede Lebensregung hinterlässt Datenspuren, ermöglicht vielfältige und intensive Datensammlungen über Menschen, unterstützt ... Read more

    Free

  • Data Privacy: What Enterprises Need to Know?

    by Deepak Gupta ...
    "Data is the new oil" — it has become a cliché now: any enterprise today understands that data is not just an opportunity; managing data is almost how managing a business is. The success of tech companies that tailored solutions to meet consumer needs and alleviate pain points demonstrates the power of data and the modern data economy.How can enterprises become competitive in this paradigm shift ... Read more

    Free

  • Principles of Security and Trust

    8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings

    Edited by Flemming Nielson, David Sands ...
    Series Book 11426 - Lecture Notes in Computer Science
    This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019.The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with ... Read more

    Free

  • Principles of Security and Trust

    7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings

    Edited by Lujo Bauer, Ralf Küsters ...
    Series Book 10804 - Lecture Notes in Computer Science
    This open access book constitutes the proceedings of the 7th International Conference on Principles of Security and Trust, POST 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The 13 papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers are ... Read more

    Free

  • Buy Bitcoin, You'll Thank Yourself In The Future

    by BBCD Satoshi ...
    "If you want to know more about investing in Bitcoin, this book is great" Andy, USA (5 Star Review)The purpose of this book is to show and give confidence to someone, looking to dip their toes into buying and or holding (hodling) Bitcoin.Bitcoin is unique. Bitcoin is a chance. Now maybe the window of opportunity.This a book intended for anyone considering buying Bitcoin as a strategic investment ... Read more

    Free

  • Preparing for Digital Disruption

    Series series Research for Policy
    This open access book offers an analysis of why preparations for digital disruption should become a stated goal of security policy and policies that aim to safeguard the continuity of critical infrastructure. The increasing use of digital technology implies new and significant vulnerabilities for our society. However, it is striking that almost all cyber-security measures taken by governments, ... Read more

    Free

  • Security Infrastructure Technology for Integrated Utilization of Big Data

    Applied to the Living Safety and Medical Fields

    Edited by Atsuko Miyaji, Tomoaki Mimoto ...
    This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and ... Read more

    Free

  • PODRECZNIK DLA INSTRUKTOROW - WARSZTAT IDentifEYE

    WprowadzenieWitamy instruktorów! Dziękujemy za zainteresowanie projektem IDentifEYE.Celem projektu IDentifEYE jest zwiększenie bezpieczeństwa online uczniów poprzez zwiększanie odporności online uczniów. Jednak nie będziesz instruował uczniów. Będziesz instruował nauczycieli. Powodem tego jest skalowalność. By dotrzeć do uczniów istnieją dwa sposoby: poprzez rodziców lub nauczycieli. Ponieważ ... Read more

    Free

  • A Practical Guide to TPM 2.0

    Using the Trusted Platform Module in the New Age of Security

    A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the ... Read more

    Free

  • Building Blocks for IoT Analytics Internet-of-Things Analytics

    Edited by John Soldatos ...
    Internet-of-Things (IoT) Analytics are an integral element of most IoT applications, as it provides the means to extract knowledge, drive actuation services and optimize decision making. IoT analytics will be a major contributor to IoT business value in the coming years, as it will enable organizations to process and fully leverage large amounts of IoT data, which are nowadays largely ... Read more

    Free

  • The Coupling of Safety and Security

    Exploring Interrelations in Theory and Practice

    Series series SpringerBriefs in Applied Sciences and Technology
    This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional implications that accompany approaching them as separate entities and combining them, respectively.The book ... Read more

    Free

  • Everything You Want To Know About Bitcoin But Are Afraid To Ask. Questions and Answers About Bitcoin

    by BBCD Satoshi ...
    Discover the intriguing world of Bitcoin, with "Everything You Want To Know About Bitcoin (But Are Afraid To Ask). Questions and Answers About Bitcoin".As we traverse an era of economic unpredictability, there's a financial game-changer breaking boundaries - Bitcoin. Despite its transformative power, understanding its intricacies can often feel like decrypting an enigma due to the dispersed and ... Read more

    Free

  • Symbiotic Interaction

    5th International Workshop, Symbiotic 2016, Padua, Italy, September 29–30, 2016, Revised Selected Papers

    Series Book 9961 - Lecture Notes in Computer Science
    This book is published open access under a CC BY license.This book constitutes the proceedings of the 5th International Workshop on Symbiotic Interaction, Symbiotic 2016, held in Padua, Italy, in October 2016.The 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The idea of symbiotic systems put forward in this workshop capitalizes ... Read more

    Free

  • Managing Cybersecurity: A Project Management Approach

    by Dragan Kesic ...
    Unlock the power of effective project management in the realm of cybersecurity. In this comprehensive e-book, discover a strategic approach to safeguarding your digital assets while optimizing your resources. Bridge the Gap: Learn how to bridge the gap between cybersecurity and project management, aligning your efforts for maximum protection and efficiency.️ Holistic Defense: Explore a holistic ... Read more

    Free

  • Platform Embedded Security Technology Revealed

    Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

    by Xiaoyu Ruan ...
    Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light ... Read more

    Free

  • Intel Trusted Execution Technology for Server Platforms

    A Guide to More Secure Datacenters

    "This book is a must have resource guide for anyone who wants to ... implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”John McAuley,EMC Corporation"This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever ... Read more

    Free

  • Building the Infrastructure for Cloud Security

    A Solutions View

    For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here ... Read more

    Free

  • Data Spaces

    Design, Deployment and Future Directions

    This open access book aims to educate data space designers to understand what is required to create a successful data space. It explores cutting-edge theory, technologies, methodologies, and best practices for data spaces for both industrial and personal data and provides the reader with a basis for understanding the design, deployment, and future directions of data spaces.The book captures the ... Read more

    Free

  • Co-governed Sovereignty Network

    Legal Basis and Its Prototype & Applications with MIN Architecture

    by Hui Li, Xin Yang ...
    This open access book introduces MIN, a novel networking architecture to implement the sovereign equality of all countries in the cyberspace. Combining legal theory and network technology, it first discusses the historical development of sovereignty and expounds the legal basis of cyberspace sovereignty. Then, based on the high-performance blockchain, it describes a new network architecture ... Read more

    Free

  • The Future and Opportunities of Cybersecurity in the Workforce

    "Every 39 seconds, hackers attack a server or network somewhere. And by 2020, the estimated per data breach will cost more than $150 million."These basic cybersecurity statistics should alarm everyone.With those stats in mind, people should understand the internet is never fully safe. Everything can be hacked, and the few safe spots on the internet are kept that way thanks to teams of ... Read more

    Free

  • Free Is Bad TLDR

    by John Marshall ...
    Ad tech pays for everything that’s free online. Email, search, games, news, entertainment. It’s caused countless problems and we just want a way out of the mess.In just 80 pages this book contains the essential knowledge to understand the problem, and fix your own online life. The original Free Is Bad contains more detailed explanations of the history and business decisions made by the tech giants ... Read more

    Free

  • Easy Password Creation Systems For Life (Introduction)

    Series series Easy Password Creation Systems For Life
    Let's create our own password system which can be used anywhere for all of the passwords we will ever need. We want to make them easy to formulate yet be secure enough.The grid system that you finally choose can easily be recreated any time you like on a piece of paper. You will need to take that piece of paper everywhere you go but you can keep it in your wallet, purse etc. Even if it is exposed ... Read more

    Free