Computer Security in 1999
The Limits of Privacy
by
Etzioni, Amitai
Virtual Private Networks: Turning the Internet Into Your Private Network
by
Scott, Charlie, Wolfe, Paul, Erwin, Mike
Practical Intranet Security: Overview of the State of the Art and Available Technologies
by
Ashley, Paul M., Vandenwauver, M.
Using and Managing PPP: Help for Network Administrators
by
Sun, Andrew
The Twofish Encryption Algorithm
by
Schneier, Bruce
I-Way Robbery: Crime on the Internet
by
Boni, William C.
Digitale Signatur: Grundlagen, Funktion Und Einsatz
by
Brisch, Klaus M., Bitzer, Frank
Hackers: Crime and the Digital Sublime
by
Taylor, Paul
Hackers: Crime and the Digital Sublime
by
Taylor, Paul
Oracle8i Internal Services for Waits, Latches, Locks, and Memory
by
Adams, Steve
Information Hiding Techniques for Steganography and Digital Watermarking
by
Katzenbeisser, Stefan
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
by
Van Tilborg, Henk C. a.