win prizes katie fforde book price comparison finding gobi twitter
Search our site
The Treatment by C. L. Taylor Read the opening extract of the brand new C. L. Taylor book before its publication on 19/10/2017

Computer security books

See below for a selection of the latest books from Computer security category. Presented with a red border are the Computer security books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Computer security books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II by Simon N. Foley Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.The 54 revised full papers presented were carefully reviewed and...
Format: Paperback - Released: 20/09/2017

Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I by Simon N. Foley Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.The 54 revised full papers presented were carefully reviewed and...
Format: Paperback - Released: 18/09/2017

Cybersecurity Essentials by Charles J. Brooks, Philip Craig, Donald D. Short Cybersecurity Essentials
, ,
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.
Format: Paperback - Released: 18/09/2017

150 Things You Should Know about Security by Lawrence J. Fennelly, Perry 150 Things You Should Know about Security
,
150 Things You Should Know about Security, Second Edition covers the essential tips and techniques for the latest trends in physical security. This indispensable guide further covers the latest technological trends for managing the security needs of all kinds, from...
Format: Paperback - Released: 01/09/2017

Big Data Data Analytics in Cybersecurity by Onur Savas Big Data Data Analytics in Cybersecurity

Big data analytics provide more accurate, timely, and actionable decisions for both cybersecurity and IT management. This book gives a comprehensive coverage of state-of-the-art big data analytics in cybersecurity and IT management. The topics include threat analysis, vulnerability identification, mission...
Format: Hardback - Released: 31/08/2017

Information Security Management Systems A Novel Framework and Software as a Tool for Compliance with Information Security Standard by Heru (Indonesian Institute of Sciences and Tunghai University, Taichung, Taiwan) Susanto, Mohammad Nabil (Universiti Almunawar Information Security Management Systems A Novel Framework and Software as a Tool for Compliance with Information Security Standard
, , ,
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an...
Format: Hardback - Released: 30/08/2017

Fundamentals of Secure System Modelling by Raimundas Matulevicius Fundamentals of Secure System Modelling

This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software...
Format: Hardback - Released: 23/08/2017

Computer Security Principles and Practice by William Stallings, Lawrie Brown Computer Security Principles and Practice
,
For courses in computer/network security Balancing principle and practice-an updated survey of the fast-moving world of computer and network security Computer Security: Principles and Practice, 4th Edition, is ideal for courses in Computer/Network Security. The need for education in computer...
Format: Paperback - Released: 08/08/2017

Coming Soon

Automating Security in the Cloud by Tim Sandage, Ted Steffan Automating Security in the Cloud
,
Automate the fundamental structure of your cloud account with reliable coded security and governance in an Amazon Web Services (AWS) environment. This practical guide shows security professionals, DevOps teams, and others responsible for securing workloads in the cloud how to...
Format: Paperback - Released: 25/09/2017

Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18 - 20, 2017, Proceedings by Marc Dacier Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18 - 20, 2017, Proceedings

This book constitutes the refereed conference proceedings of the 20th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2017, held in Atlanta, GA, USA, in September 2017. The 21 revised full papers were selected from 105 submissions. They...
Format: Paperback - Released: 30/09/2017

Why CISOs Fail The Missing Link in Security Management--and How to Fix It by Barak Engel Why CISOs Fail The Missing Link in Security Management--and How to Fix It

This book provides insight as to why and how current security management practices fail at their basic foundation, resulting in overall dissatisfaction by practitioners and lack of success in the corporate environment. The author examines the reasons and how to...
Format: Paperback - Released: 03/10/2017

Network Security Metrics by Lingyu Wang, Sushil Jajodia, Anoop Singhal Network Security Metrics
, ,
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since...
Format: Hardback - Released: 10/10/2017

Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers by Gilbert Peterson Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some...
Format: Hardback - Released: 12/10/2017

Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings by Joaquin Garcia-Alfaro Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings

This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and...
Format: Paperback - Released: 12/10/2017

Security and Trust Management 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings by Giovanni Livraga Security and Trust Management 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings

This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. software security and...
Format: Paperback - Released: 15/10/2017

Cyberspace and Cybersecurity, Second Edition by George K. Kostopoulos Cyberspace and Cybersecurity, Second Edition

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities,...
Format: Hardback - Released: 18/10/2017

The Active Cyber Defense Cycle by Robert M. Lee The Active Cyber Defense Cycle


Format: Paperback - Released: 25/10/2017

Iris Biometric Model for Secured Network Access by Franjieh El Khoury Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model...
Format: Paperback - Released: 31/10/2017

Adversarial Machine Learning by Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar Adversarial Machine Learning
, , ,
This study allows readers to get to grips with the conceptual tools and practical techniques for building robust machine learning in the face of adversaries.
Format: Hardback - Released: 31/10/2017

Intrusion Detection Networks A Key to Collaborative Security by Carol Fung, Raouf Boutaba Intrusion Detection Networks A Key to Collaborative Security
,
The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve...
Format: Paperback - Released: 31/10/2017

Managing Cybersecurity Risk Cases Studies and Solutions by Jonathan Reuvid Managing Cybersecurity Risk Cases Studies and Solutions

This book provides detailed information about the cybersecurity environment and specific threats, and offers advice on the resources available to build defences and the selection of tools and managed services to achieve enhanced security at acceptable cost.
Format: Paperback - Released: 31/10/2017

Measurable and Composable Security, Privacy, and Dependability The Shield Methodology by Andrea (University of Roma Sapienza Italy) Fiaschetti Measurable and Composable Security, Privacy, and Dependability The Shield Methodology

With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the SPD requirements raised from existing and future IoT and M2M systems. On this baseline, it proposes a new approach to embedded...
Format: Hardback - Released: 31/10/2017

Collaborative Cyber Threat Intelligence Detecting and Responding to Advanced Cyber Attacks on National Level by Florian Skopik Collaborative Cyber Threat Intelligence Detecting and Responding to Advanced Cyber Attacks on National Level

Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel...
Format: Hardback - Released: 01/11/2017

Other books in this genre

Windows Forensics Cookbook by Oleg Skulkin, Scar de Courcier Windows Forensics Cookbook
,
Maximize the power of Windows Forensics to perform highly effective forensic investigations About This Book * Prepare and perform investigations using powerful tools for Windows, * Collect and validate evidence from suspects and computers and uncover clues that are otherwise...
Format: Paperback - Released: 04/08/2017

Network and Data Security for Non-Engineers by Frank M. Groom Network and Data Security for Non-Engineers

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to...
Format: Hardback - Released: 02/08/2017

Threat Level Red Cybersecurity Research Programs of the U.S. Government by Michael (Computer Economics) Erbschloe Threat Level Red Cybersecurity Research Programs of the U.S. Government

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research...
Format: Hardback - Released: 01/08/2017

Constructive Side-Channel Analysis and Secure Design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers by Sylvain Guilley Constructive Side-Channel Analysis and Secure Design 8th International Workshop, COSADE 2017, Paris, France, April 13-14, 2017, Revised Selected Papers

This book constitutes revised selected papers from the 8th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2017, held in Paris, France, in April 2017. The 17 papers presented in this volume were carefully reviewed and selected from...
Format: Paperback - Released: 29/07/2017

Secure Java For Web Application Development by Abhay Bhargav Secure Java For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web...
Format: Hardback - Released: 28/07/2017

Building an Information Security Awareness Program by Mark B. Desman Building an Information Security Awareness Program

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are...
Format: Hardback - Released: 28/07/2017

Building A Global Information Assurance Program by Raymond J. Curts Building A Global Information Assurance Program

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function....
Format: Hardback - Released: 28/07/2017

Securing and Controlling Cisco Routers by Peter T. Davis Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication,...
Format: Hardback - Released: 28/07/2017

Trust, Privacy and Security in Digital Business 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings by Javier Lopez Trust, Privacy and Security in Digital Business 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings

This book constitutes the refereed proceedings of the 14th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2017, held in Lyon, France, in August 2017 in conjunction with DEXA 2017. The 15 revised full papers presented were...
Format: Paperback - Released: 27/07/2017

Cyber Security on Azure An IT Professional's Guide to Microsoft Azure Security Center by Marshall Copeland Cyber Security on Azure An IT Professional's Guide to Microsoft Azure Security Center

Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective.Cyber Security on Azure explains how this 'security as a service' (SECaaS) business solution...
Format: Paperback - Released: 27/07/2017

Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings by Satoshi Obana Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings

This book constitutes the refereed proceedings of the 12th International Workshop on Security, IWSEC 2017, held in Hiroshima, Japan, in August/September 2017. The 11 regular papers and 3 short papers presented in this volume were carefully reviewed and selected from...
Format: Paperback - Released: 27/07/2017

Network and System Security 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings by Zheng Yan Network and System Security 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings

This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017. The 24 revised full papers presented in this book were carefully reviewed and selected from 83...
Format: Paperback - Released: 26/07/2017

Resilience and Risk Methods and Application in Environment, Cyber and Social Domains by Igor Linkov Resilience and Risk Methods and Application in Environment, Cyber and Social Domains

This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry,...
Format: Hardback - Released: 25/07/2017

Resilience and Risk Methods and Application in Environment, Cyber and Social Domains by Igor Linkov Resilience and Risk Methods and Application in Environment, Cyber and Social Domains

This volume addresses the challenges associated with methodology and application of risk and resilience science and practice to address emerging threats in environmental, cyber, infrastructure and other domains. The book utilizes the collective expertise of scholars and experts in industry,...
Format: Paperback - Released: 25/07/2017

Registered users have access to unique site features

Register now