LitRes
Search
Please enter three or more letters to search
Log in
6
Do you know that...
Joining LitRes, you care about the environment
Sign up
Log in
My books
My books
Cart
Lists
About us
About & Contacts
Genres
New releases
Popular
Audiobooks
Books to read
Coupon
All 345 genres
Books
Knowledge and skills
Computers
Information security
Information security
Subgenres
One level up
(Computers)
New releases
Popular
E-books and audio books
E-books and audiobooks
E-books
442
Audiobooks
105
in all languages
551
in English
52
in French
1
in Italian
1
in Portuguese
1
in Russian
495
in Spanish
1
Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks
Б. В. Окунев
0
Public Key Cryptography. Applications and Attacks
Lynn Batten Margaret
0
Information Security. Principles and Practice
Mark Stamp
0
Hacking For Dummies
Kevin Beaver
1
CompTIA PenTest+ Study Guide. Exam PT0-001
Mike Chapple
0
Information Security. Principles and Practice
Mark Stamp
0
Data-Driven Security. Analysis, Visualization and Dashboards
Rudis Bob
0
IP Address Management Principles and Practice
Timothy Rooney
0
Public Key Cryptography. Applications and Attacks
Lynn Batten Margaret
4
The Death of the Internet
Markus Jakobsson
2
Wireless Mobile Internet Security
Man Rhee Young
0
Cybercrime and Cyber Warfare
Igor Bernik
0
The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Kevin D. Mitnick
0
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
Eric Greenberg
0
Hack Attacks Testing. How to Conduct Your Own Security Audit
John Chirillo
2
Unauthorised Access. Physical Penetration Testing For IT Security Teams
Wil Allsopp
0
Malicious Cryptography. Exposing Cryptovirology
Adam Young
0
The Oracle Hacker's Handbook. Hacking and Defending Oracle
David Litchfield
0
Schneier on Security
Bruce Schneier
0
Network Security Bible
Eric Cole
0
Computer Forensics For Dummies
Reynaldo Anzaldua
1
Network Security Foundations. Technology Fundamentals for IT Success
Matthew Strebe
0
Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails
Christopher Hadnagy
1
The Browser Hacker's Handbook
Wade Alcorn
1
Carry On. Sound Advice from Schneier on Security
Bruce Schneier
0
Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
Gary Jackson M.
0
Unmasking the Social Engineer. The Human Element of Security
Christopher Hadnagy
1
Microsoft Windows Security Essentials
Darril Gibson
0
Implementing SSL / TLS Using Cryptography and PKI
Joshua Davies
0
Web Commerce Security. Design and Development
Hadi Nahari
0
Cryptography Engineering. Design Principles and Practical Applications
Bruce Schneier
1
Wireshark for Security Professionals. Using Wireshark and the Metasploit Framework
Jeff Parker T.
1
CASP CompTIA Advanced Security Practitioner Study Guide. Exam CAS-002
Michael Gregg
0
Mastering Windows Network Forensics and Investigation
Steven Anson
0
Hacking For Dummies
Kevin Beaver
0
CompTIA CSA+ Study Guide. Exam CS0-001
Mike Chapple
0
The Best of 2600, Collector's Edition. A Hacker Odyssey
Emmanuel Goldstein
0
Cloud Security. A Comprehensive Guide to Secure Cloud Computing
Russell Vines Dean
0
Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code
Michael Ligh
0
Security Patterns
Eduardo Fernandez-Buglioni
0
0
0
PDF
Б. В. Окунев
Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks
0
0
PDF
Lynn Batten Margaret
Public Key Cryptography. Applications and Attacks
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
4,0
1
PDF
Kevin Beaver
Hacking For Dummies
0
0
PDF
Mike Chapple
CompTIA PenTest+ Study Guide. Exam PT0-001
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Rudis Bob
Data-Driven Security. Analysis, Visualization and Dashboards
0
0
PDF
Timothy Rooney
IP Address Management Principles and Practice
3,0
4
PDF
Lynn Batten Margaret
Public Key Cryptography. Applications and Attacks
5,0
2
PDF
Markus Jakobsson
The Death of the Internet
0
0
PDF
Man Rhee Young
Wireless Mobile Internet Security
0
0
PDF
Igor Bernik
Cybercrime and Cyber Warfare
0
0
PDF
Kevin D. Mitnick
The Art of Intrusion. The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
0
0
PDF
Eric Greenberg
Mission-Critical Security Planner. When Hackers Won't Take No for an Answer
1,0
2
PDF
John Chirillo
Hack Attacks Testing. How to Conduct Your Own Security Audit
0
0
PDF
Wil Allsopp
Unauthorised Access. Physical Penetration Testing For IT Security Teams
0
0
PDF
Adam Young
Malicious Cryptography. Exposing Cryptovirology
0
0
PDF
David Litchfield
The Oracle Hacker's Handbook. Hacking and Defending Oracle
0
0
PDF
Bruce Schneier
Schneier on Security
0
0
PDF
Eric Cole
Network Security Bible
3,0
1
PDF
Reynaldo Anzaldua
Computer Forensics For Dummies
0
0
PDF
Matthew Strebe
Network Security Foundations. Technology Fundamentals for IT Success
4,0
1
PDF
Christopher Hadnagy
Phishing Dark Waters. The Offensive and Defensive Sides of Malicious Emails
5,0
1
PDF
Wade Alcorn
The Browser Hacker's Handbook
0
0
PDF
Bruce Schneier
Carry On. Sound Advice from Schneier on Security
0
0
PDF
Gary Jackson M.
Predicting Malicious Behavior. Tools and Techniques for Ensuring Global Security
5,0
1
PDF
Christopher Hadnagy
Unmasking the Social Engineer. The Human Element of Security
0
0
PDF
Darril Gibson
Microsoft Windows Security Essentials
0
0
PDF
Joshua Davies
Implementing SSL / TLS Using Cryptography and PKI
0
0
PDF
Hadi Nahari
Web Commerce Security. Design and Development
5,0
1
PDF
Bruce Schneier
Cryptography Engineering. Design Principles and Practical Applications
5,0
1
PDF
Jeff Parker T.
Wireshark for Security Professionals. Using Wireshark and the Metasploit Framework
0
0
PDF
Michael Gregg
CASP CompTIA Advanced Security Practitioner Study Guide. Exam CAS-002
0
0
PDF
Steven Anson
Mastering Windows Network Forensics and Investigation
0
0
PDF
Kevin Beaver
Hacking For Dummies
0
0
PDF
Mike Chapple
CompTIA CSA+ Study Guide. Exam CS0-001
0
0
PDF
Emmanuel Goldstein
The Best of 2600, Collector's Edition. A Hacker Odyssey
0
0
PDF
Russell Vines Dean
Cloud Security. A Comprehensive Guide to Secure Cloud Computing
0
0
PDF
Michael Ligh
Malware Analyst's Cookbook and DVD. Tools and Techniques for Fighting Malicious Code
0
0
PDF
Eduardo Fernandez-Buglioni
Security Patterns. Integrating Security and Systems Engineering
1
2
3
4
5
...
14
Next
We use
cookies
to make your experience on our website faster and more convenient.
Read more
I agree