Win £500 in book vouchers by helping us with a 7 minute reader survey click here.

newgen books for YA readers debuts of the month join us on facebook

Computer fraud & hacking books

See below for a selection of the latest books from Computer fraud & hacking category. Presented with a red border are the Computer fraud & hacking books that have been lovingly read and reviewed by the experts at Lovereading.

With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Computer fraud & hacking books and those from many more genres to read that will keep you inspired and entertained. And it's all free!


Recently Published

Fraud Prevention in Online Digital Advertising by Xingquan Zhu, Haicheng Tao, Zhiang Wu, Jie Cao Fraud Prevention in Online Digital Advertising
, , ,
The authors systematically review methods of online digital advertising (ad) fraud and the techniques to prevent and defeat such fraud in this brief. The authors categorize ad fraud into three major categories, including (1) placement fraud, (2) traffic fraud, and...
Format: Paperback - Released: 17/06/2017

Hacking the Hacker Learn From the Experts Who Take Down Hackers by Roger A. Grimes Hacking the Hacker Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women...
Format: Paperback - Released: 21/04/2017

The Cybersecurity to English Dictionary by Raef Meeuwisse The Cybersecurity to English Dictionary


Format: Paperback - Released: 06/02/2017

CEH Certified Ethical Hacker Bundle, Third Edition by Matt Walker CEH Certified Ethical Hacker Bundle, Third Edition

Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide
Format: Paperback - Released: 24/01/2017

Certified Ethical Hacker (CEH) Foundation Guide by Sagar Rahalkar Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from...
Format: Paperback - Released: 01/12/2016

Cyber Crimes History of World's Worst Cyber Attacks by Vannesa Pitts Cyber Crimes History of World's Worst Cyber Attacks


Format: Paperback - Released: 25/11/2016

Penetration Testing Essentials by Sean Philip Oriyano Penetration Testing Essentials

Your pen testing career begins here, with a solid foundation in essential skills and concepts Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity.
Format: Paperback - Released: 23/11/2016

Advanced Persistent Security A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies by Ira Winkler Advanced Persistent Security A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies...
Format: Paperback - Released: 22/11/2016

Other books in this genre

Hacking Wireless Access Points Cracking, Tracking, and Signal Jacking by Jennifer (Information Assurance Affiliate Faculty, Regis University, Denver, CO, USA) Kurtz Hacking Wireless Access Points Cracking, Tracking, and Signal Jacking
, , , ,
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology...
Format: Paperback - Released: 16/11/2016

Information Fusion for Cyber-Security Analytics by Izzat M Alsmadi Information Fusion for Cyber-Security Analytics

in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social...
Format: Hardback - Released: 22/10/2016

Identity Theft Breakthroughs in Research and Practice by Information Resources Management Association Identity Theft Breakthroughs in Research and Practice

Highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one's identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity...
Format: Hardback - Released: 16/09/2016

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition by Matt Walker CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition

Fully up-to-date coverage of every topic on the CEH v9 certification exam
Format: Book - Released: 08/09/2016

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Clint Bodungen, Bryan L. Singer, Aaron Shbeeb, Kyle Wilhoit Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
, , ,
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks with the tried-and-true Hacking Exposed way
Format: Paperback - Released: 22/07/2016

Hacked The Inside Story of America's Struggle to Secure Cyberspace by Charlie Mitchell Hacked The Inside Story of America's Struggle to Secure Cyberspace

Charlie Mitchell reveals the innovative and too-often hapless government and industry responses to growing cybersecurity threats. He examines internal government power struggles, the paralysis on Capitol Hill, and the industry's desperate effort to stay ahead of both the bad guys...
Format: Hardback - Released: 20/06/2016

Ceh V9 Certified Ethical Hacker Version 9 Study Guide by Sean Philip Oriyano Ceh V9 Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation.
Format: Paperback - Released: 22/04/2016

Registered users have access to unique site features

Register now