UNLIMITED Audiobooks and eBooks
Over 40,000 books & works on all major devices
Get ALL YOU CAN for FREE for 30 days!
Security
Poul William Anderson
Book Overview:
“Security”, tells the story of a compartmentalized government physicist ordered by secret police to complete experiments aimed at developing a new weapon. He is brought to a hidden space station and put in charge of the project but there are many questions. In a world of spies watching spies it’s sometimes hard to know what’s patriotic.
“Security”, tells the story of a compartmentalized government physicist ordered by secret police to complete experiments aimed at developing a new weapon. He is brought to a hidden space station and put in charge of the project but there are many questions. In a world of spies watching spies it’s sometimes hard to know what’s patriotic.
How does All You Can Books work?
All You Can Books gives you UNLIMITED access to over 40,000 Audiobooks, eBooks, and Foreign Language courses. Download as many audiobooks, ebooks, language audio courses, and language e-workbooks as you want during the FREE trial and it's all yours to keep even if you cancel during the FREE trial. The service works on any major device including computers, smartphones, music players, e-readers, and tablets. You can try the service for FREE for 30 days then it's just $19.99 per month after that. So for the price everyone else charges for just 1 book, we offer you UNLIMITED audio books, e-books and language courses to download and enjoy as you please. No restrictions.
"Ummm—well—" It was too sudden. Lancaster had to hedge. "But look—I'll be supposedly coming back from an outdoor vacation, with a suntan and well rested. Somebody's going to get suspicious."
"There'll be sun lamps where you're going, my friend. And I think the chance to work independently on something that really interests you will prove every bit as restful to your nerves as a summer's travel. I know the scientific mentality." Berg chuckled. "Yes, indeed."
The exchange went off so smoothly that it was robbed of all melodrama, though Lancaster had an unexpectedly eerie moment when he confronted his double. It was his own face that looked at him, there in the impersonal hotel room, himself framed against blowing curtains and darkness of night. Then Berg gestured him to follow and they went down a cor. . . Read More
Try now for FREE!

"Love your service - thanks so much for what you do!"
- Customer Cathryn Mazer
"I did not realize that you would have so many audio books I would enjoy"
- Customer Sharon Morrison
"For all my fellow Audio Book & E-Book regulars:
This is about as close to nirvana as I have found!"
- Twitter post from @bobbyekat
Community Reviews
An impressive technical book that looks at security in all its forms (physical, computer based, social) and shows you the various ways security can be implemented and compromised.
This book also shows you why security should never be a 'by-the-way' or implemented after the fact but must be considered
This is for the Third Edition, released in 2020 and still phenomenal. I haven't found a better survey of the security engineering space yet, and highly recommend this to any security practitioner, especially people entering the field. I would have been significantly better off if I had read this bac
I enjoyed the book and there was moments I couldn't stop reading. however, I think it was vague sometimes, but despite the fact, I can't tell if it was the author's mistake. The topic is hard, it is about deception, understanding it, and find a way to defend against it. if something is easy to under
This is the penultimate book about InfoSec. A friend once said, "look, the app I'm making has nothing to do with security. It's for turning on lights." When their little program turned into a doorway for a nasty hackathon, they realized that all apps and api can be a doorway. So, I always recommend
Good book even though it is 10 year old. There are a lot of case of study but it is useless if you know nothing about information security. The book is not a guide to building a dependable system but rather a guide to system failures