Win £500 in book vouchers by helping us with a 7 minute reader survey click here.

rebus 30th anniversary book price comparison likeyoulove
Search our site
The Woman in the Window by A. J. Finn Read the opening extract of the brand new A. J. Finn book before its publication on 22/01/2018

Computer security books

See below for a selection of the latest books from Computer security category. Presented with a red border are the Computer security books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Computer security books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings by Phong Q. Nguyen Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.
Format: Paperback - Released: 21/11/2017

Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers by Pooya Farshim Innovative Security Solutions for Information Technology and Communications 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks...
Format: Paperback - Released: 19/11/2017

Adversarial Machine Learning by Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar Adversarial Machine Learning
, , ,
This study allows readers to get to grips with the conceptual tools and practical techniques for building robust machine learning in the face of adversaries.
Format: Hardback - Released: 31/10/2017

Managing Cybersecurity Risk Cases Studies and Solutions by Jonathan Reuvid Managing Cybersecurity Risk Cases Studies and Solutions

This book provides detailed information about the cybersecurity environment and specific threats, and offers advice on the resources available to build defences and the selection of tools and managed services to achieve enhanced security at acceptable cost.
Format: Paperback - Released: 31/10/2017

Measurable and Composable Security, Privacy, and Dependability The Shield Methodology by Andrea (University of Roma Sapienza Italy) Fiaschetti Measurable and Composable Security, Privacy, and Dependability The Shield Methodology

With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the SPD requirements raised from existing and future IoT and M2M systems. On this baseline, it proposes a new approach to embedded...
Format: Hardback - Released: 31/10/2017

Codes, Cryptology and Curves with Computer Algebra: Volume 1 by Ruud (Technische Universiteit Eindhoven, The Netherlands) Pellikaan, Xin-Wen (Griffith University, Queensland) Wu, Sta Bulygin Codes, Cryptology and Curves with Computer Algebra: Volume 1
, , , ,
Graduate-level introduction to error-correcting codes, which are used to protect digital data and applied in public key cryptosystems.
Format: Paperback - Released: 31/10/2017

Codes, Cryptology and Curves with Computer Algebra: Volume 1 by Ruud (Technische Universiteit Eindhoven, The Netherlands) Pellikaan, Xin-Wen (Griffith University, Queensland) Wu, Sta Bulygin Codes, Cryptology and Curves with Computer Algebra: Volume 1
, , , ,
Graduate-level introduction to error-correcting codes, which are used to protect digital data and applied in public key cryptosystems.
Format: Hardback - Released: 31/10/2017

Predictive Computing and Information Security by P. K. Gupta, Vipin Tyagi, S. K. Singh Predictive Computing and Information Security
, ,
This book describes various methods and recent advances in predictive computing and information security. Coverage also includes the frameworks for eTransportation and eHealth, security techniques, and algorithms for predictive computing and information security based on Internet-of-Things and Cloud computing.
Format: Hardback - Released: 26/10/2017

Collaborative Cyber Threat Intelligence Detecting and Responding to Advanced Cyber Attacks on National Level by Florian Skopik Collaborative Cyber Threat Intelligence Detecting and Responding to Advanced Cyber Attacks on National Level

Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel...
Format: Hardback - Released: 24/10/2017

Coming Soon

Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings by Ming Xu Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions.
Format: Paperback - Released: 27/11/2017

Cyberspace Safety and Security 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017, Proceedings by Sheng Wen Cyberspace Safety and Security 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017, Proceedings

This book constitutes the proceedings of the 9th International Symposium on Cyberspace Safety and Security, CSS 2017, held in Xi'an, China in October 2017.
Format: Paperback - Released: 27/11/2017

Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product by Ken (Oakland Community College, Auburn Hills, Michigan, USA) Sigler, Dan (University of Detroit Mercy, Michigan, USA Shoemaker Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
, , , , , ,
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish...
Format: Hardback - Released: 27/11/2017

Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product by Ken (Oakland Community College, Auburn Hills, Michigan, USA) Sigler, Dan (University of Detroit Mercy, Michigan, USA Shoemaker Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product
, , , , , ,
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish...
Format: Paperback - Released: 27/11/2017

Attribute-Based Access Control by Vincent C. Hu, David F. Ferraiolo, Ramaswamy Chandramouli, Richard Kuhn Attribute-Based Access Control
, , ,
This book presents a combination of technical and administrative instructions for the development of attribute-based access control to improve information sharing within organizations.
Format: Hardback - Released: 30/11/2017

Security in Computing and Communications 5th International Symposium, SSCC 2017, Manipal, India, September 13-16, 2017, Proceedings by Sabu M. Thampi Security in Computing and Communications 5th International Symposium, SSCC 2017, Manipal, India, September 13-16, 2017, Proceedings

This book constitutes the refereed proceedings of the 5th International Symposium on Security in Computing and Communications, SSCC 2017, held in Manipal, India, in September 2017. The 21 revised full papers presented together with 13 short papers were carefully reviewed...
Format: Paperback - Released: 30/11/2017

Transactions on Computational Science XXX Special Issue on Cyberworlds and Cybersecurity by Marina Gavrilova Transactions on Computational Science XXX Special Issue on Cyberworlds and Cybersecurity

The remaining 5 papers focus on a range of topics, including privacy assurance in online location services, human gait recognition using KINECT sensors, hand-gesture recognition for computer games, scene matching between the source image and the target image for virtual...
Format: Paperback - Released: 30/11/2017

Deploying Identity and Access Management with Free Open Source Software by Michael (Professor Emeritus State University of New York - Stony Brook USA) Schwartz Deploying Identity and Access Management with Free Open Source Software

Learn to leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than...
Format: Paperback - Released: 04/12/2017

String Analysis for Software Verification and Security by Tevfik Bultan, Muath Alkhalaf, Fang Yu, Abdulbaki Aydin String Analysis for Software Verification and Security
, , ,
This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis...
Format: Hardback - Released: 05/12/2017

Building a HIPAA-Compliant Cybersecurity Program Using NIST 800-30 and CSF to Secure Protected Health Information by Eric Thompson Building a HIPAA-Compliant Cybersecurity Program Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security...
Format: Paperback - Released: 08/12/2017

Decision and Game Theory for Security 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings by Stefan Rass Decision and Game Theory for Security 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings

This book constitutes the refereed proceedings of the 8th International Conference on Decision and Game Theory for Security, GameSec 2017, held in Vienna, Austria, in October 2017.The 24 revised full papers presented together with 4 short papers were carefully reviewed...
Format: Paperback - Released: 10/12/2017

Computer Security Art and Science by Matt Bishop Computer Security Art and Science


Format: Hardback - Released: 11/12/2017

Big Data Analytics with Applications in Insider Threat Detection by Pallabi Parveen, Bhavani Thuraisingham, Mohammad Mehedy Masud, Latifur Khan Big Data Analytics with Applications in Insider Threat Detection
, , ,
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those...
Format: Hardback - Released: 12/12/2017

The Realities of Securing Big Data by Davi Ottenheimer The Realities of Securing Big Data

Big data requires big security; here's what you need to know More data is collected, at a higher speed, in more formats than ever before. Traditional information security simply has been unable to keep up with this transformation, which presents...
Format: Paperback - Released: 18/12/2017

Infosec Rock Star How to Accelerate Your Career Because Geek Will Only Get You So Far by Ted Demopoulos Infosec Rock Star How to Accelerate Your Career Because Geek Will Only Get You So Far


Format: Paperback - Released: 02/01/2018

Other books in this genre

Cyberspace and Cybersecurity, Second Edition by George K. Kostopoulos Cyberspace and Cybersecurity, Second Edition

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities,...
Format: Hardback - Released: 18/10/2017

Poc | Gtfo by Manul Laphroaig Poc | Gtfo


Format: Hardback - Released: 12/10/2017

Why CISOs Fail The Missing Link in Security Management--and How to Fix It by Barak Engel Why CISOs Fail The Missing Link in Security Management--and How to Fix It

This book provides insight as to why and how current security management practices fail at their basic foundation, resulting in overall dissatisfaction by practitioners and lack of success in the corporate environment. The author examines the reasons and how to...
Format: Paperback - Released: 05/10/2017

Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18 - 20, 2017, Proceedings by Marc Dacier Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18 - 20, 2017, Proceedings

They are organized in the following topics: software security, intrusion detection, systems security, android security, cybercrime, cloud security, network security.
Format: Paperback - Released: 04/10/2017

HCI Challenges and Privacy Preservation in Big Data Security by Daphne Lopez HCI Challenges and Privacy Preservation in Big Data Security

Discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academics, researchers,...
Format: Hardback - Released: 30/09/2017

Computer Safety, Reliability, and Security SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings by Stefano Tonetta Computer Safety, Reliability, and Security SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings

This book constitutes the refereed proceedings of five workshops co-located with SAFECOMP 2017, the 36th International Conference on Computer Safety, Reliability, and Security, held in Trento, Italy, in September 2017. The 38 revised full papers presented together with 5 introductory...
Format: Paperback - Released: 29/09/2017

Python Digital Forensics Cookbook by Preston Miller, Chapin Bryce Python Digital Forensics Cookbook
,
Over 60 recipes to help you learn digital forensics and leverage Python scripts to amplify your examinations About This Book * Develop code that extracts vital information from everyday forensic acquisitions. * Increase the quality and efficiency of your forensic...
Format: Paperback - Released: 26/09/2017

Automating Security in the Cloud by Tim Sandage, Ted Steffan Automating Security in the Cloud
,
Automate the fundamental structure of your cloud account with reliable coded security and governance in an Amazon Web Services (AWS) environment. This practical guide shows security professionals, DevOps teams, and others responsible for securing workloads in the cloud how to...
Format: Paperback - Released: 25/09/2017

Cybersecurity Essentials by Charles J. Brooks, Philip Craig, Donald D. Short Cybersecurity Essentials
, ,
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications.
Format: Paperback - Released: 25/09/2017

Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Efforts by Maurizio Martellini Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Efforts

This book covers the security and safety of CBRNE assets and management, and illustrates which risks may emerge and how to counter them through an enhanced risk management approach.
Format: Hardback - Released: 21/09/2017

Security and Trust Management 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings by Giovanni Livraga Security and Trust Management 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings

This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. software security and...
Format: Paperback - Released: 14/09/2017

Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings by Joaquin Garcia-Alfaro Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings

This book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and...
Format: Paperback - Released: 13/09/2017

Intelligence-Driven Incident Response by Scott Roberts, Rebekah Brown Intelligence-Driven Incident Response
,
With this practical guide, incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts will learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process.
Format: Paperback - Released: 05/09/2017

Big Data Data Analytics in Cybersecurity by Onur Savas Big Data Data Analytics in Cybersecurity

Big data analytics provide more accurate, timely, and actionable decisions for both cybersecurity and IT management. This book gives a comprehensive coverage of state-of-the-art big data analytics in cybersecurity and IT management. The topics include threat analysis, vulnerability identification, mission...
Format: Hardback - Released: 31/08/2017

IT Convergence and Security 2017 Volume 1 by Kuinam J. Kim IT Convergence and Security 2017 Volume 1

This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field. It explores how IT convergence and security issues...
Format: Hardback - Released: 31/08/2017

Registered users have access to unique site features

Register now