This is the "Home" page of the "Computer Security" guide.
Alternate Page for Screenreader Users
Skip to Page Navigation
Skip to Page Content

Computer Security  

Last Updated: Jul 10, 2017 URL: Print Guide
Home Print Page

Google Books

You can read online books on Google Books. For most entries, you will only get sections from the book, not the entire content.

Google Scholar

Use Google Scholar to research the Web for information on your topic.


Books on Computer Security

Computer Security     Printer Friendly PDF

Acquisti, A., Gritzalis, Sl., Lambrinoudakis, C., & Di Capitani di Vimercati, S. (Eds.). (2008). Digital privacy: Theory, technologies, and practices.  New York, NY: Auerbach Publications. (QA 76.9 .A25 .D528 2008)

Andress, A. (2004). Surviving security: How to integrate, people, process, and technology. Boca Raton, FL: CRC Press. (QA 76.9 .A25 A545 2004)

Anonymous, et al. (2002). Maximum security: A hacker's guide to protecting your computer systems and network (4th ed.). Indianapolis, IN: Sams. (QA76.9.A25 M39 2002) Accompanying CD

Azari, R. (Ed.). (2003). Current security management & ethical issues of information technology. Hershey, PA: IRM Press. (QA 76.9 .A25 C86 2003)

Bahadur, G., Chan, W., & Weber, C. (2002). Privacy defended: Protecting yourself online. Indianapolis, IN: Que. (E-book).

Bishop, M. (2003). Computer security: Art and science. Boston, MA: Addison-Wesley. (QA 76.9 .A25 B56 2003)

Bishop, M. (2005). Introduction to computer security. Boston, MA: Addison-Wesley. (QA 76.9 .A25 .B563 2005)

Bosworth, S., & Kabay, M. E. (Eds.). (2002). Computer security handbook. New York, NY: John Wiley & Sons. (HF 5548.37 .C64 2002)

Brancik, K. C. (2008). Insider computer fraud: An in-depth framework for detecting and defending against insider it attacks. Boca Raton, FL: Auerbach Publications. (QA 76.9 .A25 B725 2008)

Branigan, S. (2005). High-tech crimes revealed: Cyberwar stories from the digital front. Boston, MA: Addison-Wesley. (HV 6773 .B73 2005)

Britz, M. T. (2004). Computer forensics and cyber crime: An introduction. Upper Saddle River, NJ: Pearson/Prentice Hall. QA 76.9 .A25 .B77 2004

Bonk, C. (2016). Cyber threat: The rise of information geoplitics in U.S. National security. Santa Barbara, CA: Praeger/ABC-CLIO, LLC. (TK 5105.8854 .B76 2016)

Cady, G. H., & McGregor, P. (2002). Protect your digital privacy! Indianapolis, IN: Que. (E-book)

Calder, A. (2005).  A business guide to information security: How to protect your company's IT assets, reduce risks and understand the law.  Sterling, VA: Kogan Page. (QA 76.9 .A25 .C34188 2005) 

Caldwell, W. R. (2003). Computer security sourcebook. Detroit, MI: Omnigraphics. (QA 76.9 .A25 C658 2003)

Carera, G. (2016). Cyberspies: The secret history of surveillance, hacking, and digital espionage. New York, NY: Pegasus Books. (HV 6773.C66 2016)

Casey, E. (Ed.). (2002). Handbook of computer crime investigation: Forensic tools and technology. San Diego, CA: Academic Press. (HV 8079 .C65 H36 2002)

Chapman, D. W., Jr., & Fox, A. (2002). Cisco secure PIX firewalls. Indianapolis, IN: Cisco Press. (QA 76.3 .C495 2002)

Chen, W. W. S. (2005). Statistical methods in computer security. New York, NY: Marcel Dekker. (QA 76.9.A25 C435 2005)

Chirillo, J., & Blaul, S. (2003). Storage security: Protecting SANs, NAS, and DAS. Indianapolis, IN: Wiley Pub. (TK 5105.86 .C47 2003)

Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council. (2002). Cybersecurity today and tomorrow: Pay now or pay later. Washington, DC: National Academy Press. (E-Book)

Delfs, H. (2015). Introduction to cryptography: Principles and applications. New York, NY: Heidelberg Springer. (QA 268 .D45 2015)

Dent, A. W., & Mitchell, C. J. (2004). User's guide to cryptography and standards. Boston, MA: Artech House. (E-book)

Donaldson, S. E. Siegel, S. G., Williams, C. K., & Aslam, A. (2015). Enterprise security: How to build a successful cyberdefense program against advanced threats. New York, NY: Apress. (QA 76.9 .A25 2015)

Dykstra, J. (2015). Essential cybersecurity science: Build, test, and evaluate secure systems. Sebastopol, CA: O'Reilly Media, (QA 76 .A25 .D95 2016)

Egan, M. (with Mather, T. (2005). The executive guide to information security: Threats, challenges, and solutions. Indianapolis, IN: Addison-Wesley. (QA 76.9 .A25 .E4 2005)

Farmer, D., & Venema, W. (2005). Forensic Discovery. Upper Saddle River, NJ: Addison-Wesley. (QA 76.9 .A25 .F34 2005)

Foster, J. C. et al. (2005). Buffer overflow attacks: Detect, exploit, prevent. Rockland, MA: Syngress. (E-book).

Fugini, M., & Bellettini, C. (Eds.). Information security policies and actions in modern integrated systems. Hershey, PA: Idea Group Pub. (QA 76.9 .A25 I541545 2004)

Garfinkel, S. (with Spafford, G.). (2002). Web security, privacy and commerce (2nd ed., expanded & updated). Sebastopol, CA: O'Reilly. (TK 5105.59 .G57 2002)

Goodman, M. (2015). Future crimes: Everything is connected, everyone is vulnerable and what we can do about it. New York, NY: Doubleday. (HV 6773 .G66 2015)

Gordon, L. A., & Loeb, M. P. (2006). Managing cybersecurity resources: A cost-benefit analysis. New York, NY: McGraw-Hill. (HF 5548.37 .G67 2006)

Gustin, J. F. (2004). Cyber terrorism: A guide for facility managers. New York: Marcel Dekker. (HV 6773 .G87 2004)

Hadji-Janev, M. (2016). Handbook of research on civil society and national security in the era of cyber warfare. Hershey, PA: Information Science Reference. (HV 6773.15 .C97 .H36 2016)

Halbert, T., & Ingulli, E. (2005). Cyberethics. Mason, OH: Thomson South-Western. (QA 76.9 .M65 .H35) 2005

Hennessy, J. L., Patterson, D. A., & Lin, H. S. (Eds.). (2003). Information technology for counterterrorism: Immediate actions and future possibilities. Washington DC: National Academies Press. (HV 6432 .N38 2003)

Hill, J., & Marion, N.E. (2016). Introduction to cybercrime: Computer crimes, laws, and policing in the 21st century. Santa Barbara, CA: Prager. (HV 6773 .H554 2016)

Hoglund, G., & Butler, J. Rootkits: Subverting the Windows kernel. Upper Saddle River, NJ: Addison-Wesley. QA 76.9 .A25 .H637 2006

Hoglund, G., & McGraw, G. (2004). Exploiting software: How to break code. Boston, MA: Addison-Wesley. (QA 76.9 .A25 .H635 2004)

Howard, M., & Le Blanc, D. (2002). Writing secure code. Redmond, WA: Microsoft Press. (QA76.9.A25 H698 2002)

Johnson, T. A. (Ed.). (2006). Forensic computer crime investigation. Boca Raton, FL: CRC Press, 2006. (HV 8079 .C65 .F67 2006)

Jones, K. J., Bejtlich, R., & Rose, C. W. (2006). Real digital forensics: Computer security and incident response. Upper Saddle River, NJ: Addison-Wesley. (QA 76.9 .A25 .J66 2006)

Kapland, F. M. (2016). Dark territory: The secret history of cyber war. New York, NY: Simon & Schuster. (HV 6773.15 .lC97. K37 2016)

Kevvie, F. (2016). Data breach preparation and response: Breaches are certain, impact is not. Cambridge, MA: Syngress. (TK 5105.59 .F68 2016)

Khosrow-Pour, M. (2004). E-commerce security: Advice from Experts. Hershey, PA: CyberTech Publishing. (HF 5548.32 E1864 2004)

Killmeyer, J. (2006). Information security architecture: An integrated approach to security in the organization (2nd. ed.). Boca Raton, FL: Auerbach Publications. (QA 76.9 .A25 .T83 2006)

Kizza, J. M. (2006).  Computer network security and cyber ethics (2nd ed.). Jefferson, NC: McFarland & Company, Inc.  (TK 5105.59 .K59 2006)

Know your enemy: Learning about security threats (2nd ed.) The Honeynet Project. (2004). Boston, MA: Addison-Wesley. (QA 76.9 .A25 .K624 2004)

Kovacich, G. L. (2003). The information systems security officer’s guide: Establishing and managing an information protection program. Boston, MA: Butterworth-Heinemann. (QA 76.9 .A25 K68 2003)

Kruse II, W. G., II, & Heiser, J. G. (2002). Computer forensics: Incident response essentials. Boston, MA: Addison-Wesley. (QA 76.9.A25 .V33 2002)

Krutz, R. L., & Vines, R. D. (2003). The CISM prep guide: Mastering the five domains of information security management. New York, NY: Wiley Pub. (QA 76.3 .K79 2003)

Lininger, R. & V, R. D. (2005). Phishing: Cutting the identity theft line. Indianapolis, IN: Wiley Publishing, Inc. (HV 6773 .L56 2005)

Marcella, A. J., & Greenfield, R. S. (Eds.). Cyber forensics: A field manual for collecting, examining, and preserving evidence of computer crimes. Boca Raton, FL: Auerbach. (HV 8079.C65 C93 2002)

Marcella, A. J., Jr., & Stucki, Carol. (2003). Privacy handbook: Guidelines, exposures, policy implementation, and international issues. Hoboken, NJ: John Wiley. (JC 596.2 .U5 .M317 2003)

McClure, S. Shah, S., & Shah, S. (2002). Web hacking: Attacks and defense. Boston, MA: Addison-Wesley. (TK 5105.59 .M483 2002)

McNab, C. (2004). Network security assessment. Sebastopol, CA: O'Reilly Media, Inc. (QA 76.76 .063 M36 2004)

Melnick, D. (2003). PDA security: Incorporating handhelds into the enterprise. New York, NY: McGraw-Hill. (QA 76.9 .A25 M445 2003)

Merkow, M. S., & Breithaupt, J. (2002). The e-privacy imperative: Protect your customers’ Internet privacy and ensure your company’s survival in the electronic age. New York, NY: AMACOM. (HF 5548.32 .M47 2002)

Middleton, B. (2004). Cyber crime investigator's field guide (2nd ed.). Boca Raton, FL: Auerbach Publications. (HV 8079 .C65 .M53 2004)

Mirkovic, J., Dietrich, S., Dietrich, D., & Reiher, P. (2005). Internet denial of service: Attack and defense mechanisms. New York, NY: Prentice Hall Professional Technical Reference. (TK 5105.59 .I5455 2005)  .M575 2016)

Mitchell, C. (2016). Hacked: The inside story of America's struggle to secure cyberspace. Lanham, MD: Rowman & Littlefield. (TK 5105.875 .I57

Mitnick, K. D., & Simon, W. L. (2002). The art of deception: Controlling the human element of security. Indianapolis, IN: Wiley. (QA 76.9 .A25 M58 2002)

Mollin, R. A. (2005). Codes: The guide to secrecy from ancient to modern times. Boca Raton, FL: Chapman & Hall/CRC. (QA 76.9 .A25 M67 2005)

Northcutt, S., et al. (2005). Inside network perimeter security (2nd ed.). Indianapolis, IN: Sams Publishing. (TK 5105.59 .I53 2005)

Northcutt, S., & Novak, J. (2002). Network intrusion detection (3rd ed.). Indianapolis, IN: New Riders; London [UK]: Pearson Education. (TK 5105.59 .N475 2002)

Oliva, L. M. (2004). IT security: Advice from experts. Hershey [PA]: CyberTech Pub. (QA 76.9 .A25 O64 2004)

Parenty, T. J. (2003). Digital defense: What you should know about protecting your company’s assets. Boston, MA: Harvard Business School Press. (HD 30.38 .P37 2003)

Pastore, M. (2003). Security+: Study guide. San Francisco, CA: SYBEX.
(RESERVES QA 76.9 .A25 P385 2003)

Patterson, T. (with Blue, S. G.). (2005). Mapping security: The corporate security sourcebook for today's global economy. Upper Saddle River: Addison-Wesley. (HF 5548.37 .P38 2005)

Peltier, T. R. (2002). Information security policies and procedures: A practitioner's reference (2nd ed.). Boca Raton, FL: Auerbach Publications. (QA 76.9 .A25 P428 2004)

Peltier, T. R. (2005). Information security risk analysis (2nd ed.). Boca Raton, FL: Auerbach Publications. (QA76.9.A25 P429 2005)

Peltier, T. R., Peltier, J., & Blackley. J. A. (2003). Managing a network vulnerability assessment. Boca Raton, FL: Auerbach Publications. (TK 5105.59 .P453 2003)

Pelton, J. N., & Singh, I. B. (2015). Digital defense: A cybersecurity primer. New York, NY: Springer Cham Heidelberg. (QA 76.9 .A25 .P44 2015)

Qing, Li. (2015). Security intelligence: A practitioner's guide to solving enterprise security challenges. Indianapolis, IN: John Wiley & Sons, Inc. (TK 5105.59 .L5 2015)

Rehman, R. U. (2003). Intrusion detection systems with Snort: Advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID. Upper Saddle River, NJ: Prentice Hall, 2003. (TK 5105.59 .R44 2003)

Rogers, R., Miles, G., Fuller, E. Hoagberg, M. P., & Dykstra, T. (2004). Security assessment: Case studies for implementing the NSA IAM. Rockland, MA: Syngress. (QA 76.9 .A25 S38 2004)

Scott, J. (2016) Cybersecurity 101: What you absolutely must know! NA: Createspace Independent Publishinhg Platform. (QA 76.9 .A25 .S68 2016)

Sherif, M. H. (2004). Protocols for secure electronic commerce. Boca Raton, FL: CRC Press. (HF 5548.32 .S5213 2004)

Shinn, M. & Shinn, S. (2005). Troubleshooting Linux firewalls. Upper Saddle River, NJ: Addison-Wesley, 2005. (QA 76.76 .O63 .S5556 2005)

Skoudis, E. (2004). Malware: Fighting malicious code. New York, NY: Prentice Hall. (QA 76.9 .A25 .S58 2004)

Smith, G. E. (2004). Control and security of e-commerce. Hoboken, NJ: John Wiley. (HF 5548.32 .S5943 2004)

Smith, R. E. (2002). Authentication: From passwords to public keys. Boston, MA: Addison-Wesley. (QA 76.9 .A25 .S65 2002

Stallings, W. (2003). Cryptology and network security: Principles and practice. Upper Saddle River, NJ: Prentice Hall. (TK 5105.59 .S713 2003)

Stallings, W. (2014). Network security essentials: Applications and standards. Boston, MA: Pearson. (TK 5105.59 .S725 2014)

Szor, P. (2005). The art of computer virus research and defense. Upper Saddle River, NJ: Addison-Wesley. (QA 76.76 .C68 .S96 2005)

Tipton, H. F., & Krause, M. (Eds.). (2003). Information Security Management Handbook (4th ed.). Vol. 4. Boca Raton, FL: Auerbach Publications. (REF QA 76.9 .A25 .H36 2003)

Tipton, H. F., & Krause, M. (Eds.). (2004). Information Security Management Handbook (5th ed.). Boca Raton, FL: Auerbach Publications. (REF QA 76.9 .A25 .H36 2004)

Tipton, H. F., & Krause, M. (Eds.). (2005). Information Security Management Handbook (5th ed.). Vol. 2. Boca Raton, FL: Auerbach Publications. (REF QA 76.9 .A25 .H36 2005)

Tittel, E., Chapple, M., & Stewart, J. M. (2003). CISSP: Certified Information Systems Security Professional study guide. San Francisco, CA: SYBEX. (QA 76.9 .A25 P384 2003)

Touhill, G. J. (2014). Cybersecurity for executives: A practical guide. New York, NY: AICHE; Hoboken, NJ: Wiley. (E-book)

Vacca, J. R. (2002). Computer forensics: Computer crime scene investigation. Hingham, MA: Charles River Media. (QA 76.9 .A25 V33 2002)

Van der Linden, M. A. (2007). Testing code security. Boca Raton, FL: Auerbach Publications. (QA 76.9 .A25 .V359 2007)

Viega, J. (2009). The myths of security: What the computer security industry doesn't want you to know. Cambridge: O'Reilly. (QA 76.9 .A25 .V54 2009)

Wallace, M., & Webber, L. (2008). IT policies & procedures: Tools & techniques that work. New York: Aspen Publishers. (REF T 58.6 .J52 2008)

Welch-Abernath, D. D. (2004). Essential Check Point Firewall-1 NG: An installation, configuration, and troubleshooting guide. Boston: Addison-Wesley. (TK 5105.59 .W455 2004)

Whitman, M. E. (2013). Guide to network security. Boston, MA; Course Technology. (QA 76.9 .A25 .W458 2013)





Suggested Subjects to Search

business enterprises--computer networks--security measures

computer crimes--prevention

computer crimes--investigation

computer hackers

computer security

computer security--computer programs

computer security--examinations

computer security--statistical methods

computer networks--security measures

computer viruses

computers--moral and ethical aspects

contingency planning


cyber terrorism

data breach

data encryption

data integrity

data protection

disaster planning/recovery

electronic commerce--security measures


forensic sciences

incident response

internal security

Internet--security measures

network security

polls & surveys

risk assessment

security management

storage area networks (computer networks)


web sites--security measures

World Wide Web--security measures


Loading  Loading...