All CategoriesComputers & Technology → Security & Encryption

Listing 152 Free Ebooks at Amazon

Book Avg Rating Num Ratings Last Verified
Earn a Passive Income with Cryptocurrency Exchange by Donald Keyn 4.3 13 Sep 12
Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ... (Security and Cryptology Book by Flemming Nielson and David Sands 4.4 9 Jul 24
Security in Distributed, Grid, Mobile, and Pervasive Computing by Yang Xiao 0.0 0 May 22
Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ... Notes in Computer Science Boo by Lujo Bauer and Ralf Küsters 4.5 7 Jul 24
Information Security Governance Simplified: From the Boardroom to the Keyboard by Todd Fitzgerald 4.2 23 Jul 24
Security in Computer and Information Sciences: First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, ... Computer and Information Science Boo by Erol Gelenbe, Paolo Campegiani 4.2 91 Jul 24
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? ... (Simula SpringerBriefs on Com by Olav Lysne 4.3 72 Aug 15
Managing Risk and Information Security: Protect to Enable by Malcolm W. Harkins 4.5 74 Jul 24
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, ... Notes in Computer Science Bo by Daphne Tuncer, Robert Koch 3.9 52 Jul 24
Cybersecurity: Public Sector Threats and Responses (Public Administration and Public Policy Book 164) by Kim J. Andreasson 3.6 7 Jul 24
Symbiotic Interaction: 5th International Workshop, Symbiotic 2016, Padua, Italy, September 29–30, 2016, Revised Selected Papers (Lecture Notes in Computer Science Book 9961) by Luciano Gamberini, Anna Spagnolli 4.3 6 Aug 17
Handbook of Vascular Biometrics (Advances in Computer Vision and Pattern Recognition) by Andreas Uhl, Christoph Busch 3.1 4 Aug 17
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security by Will Arthur and David Challener 4.2 100 Jul 24
Unauthorized Access: The Crisis in Online Privacy and Security by Robert Sloan and Richard Warner 4.2 34 Jun 10
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value by Michelle Dennedy, Jonathan Fox 4.4 58 Jul 24
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine by Xiaoyu Ruan 4.4 16 Jul 24
International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019 (Mathematics for Industry Book 33) by Tsuyoshi Takagi, Masato Wakayama 4.4 12 Aug 15
The Coupling of Safety and Security: Exploring Interrelations in Theory and Practice (SpringerBriefs in Applied Sciences and Technology) by Corinne Bieder and Kenneth Pettersen Gould 5.0 1 Jul 24
Simula SpringerBriefs on Computing (7 Book Series) by 0 0.0 0 Oct 23
Data Privacy and Trust in Cloud Computing: Building trust in the cloud through assurance and accountability (Palgrave Studies in Digital Business & Enabling Technologies) by Theo Lynn, John G. Mooney 0.0 0 Aug 8
The InfoSec Handbook: An Introduction to Information Security by Umesha Nayak and Umesh Hodeghatta Rao 4.4 261 Jul 31
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security) by William Futral and James Greene 4.5 13 Jul 24
Palgrave Studies in Digital Business & Enabling Technologies (6 Book Series) by 0 0.0 0 Oct 23
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It by Jesse Varsalone and Matthew McFadden 4.3 246 Jul 24
Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment by Sunil Cheruvu, Anil Kumar 0.0 0 Aug 8
Sort by: Avg Rating | Num Ratings | Last Verified
Avg 4.3 of 13 ratings - Last Verified Sep 12
Avg 0.0 of 0 ratings - Last Verified May 22
Avg 4.2 of 23 ratings - Last Verified Jul 24
Avg 4.5 of 74 ratings - Last Verified Jul 24
Avg 3.1 of 4 ratings - Last Verified Aug 17
Avg 4.2 of 100 ratings - Last Verified Jul 24
Avg 4.2 of 34 ratings - Last Verified Jun 10
Avg 4.4 of 58 ratings - Last Verified Jul 24
Avg 5.0 of 1 ratings - Last Verified Jul 24
Avg 0.0 of 0 ratings - Last Verified Oct 23
The InfoSec Handbook: An Introduction to Information Security by Umesha Nayak and Umesh Hodeghatta Rao
Avg 4.4 of 261 ratings - Last Verified Jul 31
Avg 4.5 of 13 ratings - Last Verified Jul 24
Avg 0.0 of 0 ratings - Last Verified Oct 23
Avg 4.3 of 246 ratings - Last Verified Jul 24
Avg 0.0 of 0 ratings - Last Verified Aug 8