Computer Security in 2000
The International Handbook of Computer Security
by
Qureshi, Anique A., Shim, Jae, Siegel, Joel G.
Trusted Computing Platforms: Design and Applications
by
Smith, Sean W.
Computer Networks and Open Systems: An Application Development Perspective: An Application Development Perspective
by
Cassel, L. N., Austing, R. H.
Cisco Access Lists Field Guide
by
Held, Gilbert, Hundley, Kent
The Limits of Privacy
by
Etzioni, Amitai
Automated Biometrics: Technologies and Systems
by
Zhang, David D.
Building Internet Firewalls
by
Zwicky, Elizabeth D., Cooper, Simon, Chapman, D. Brent
Biometrics: Advanced Identity Verification: The Complete Guide [With CDROM]
by
Ashbourn, Julian
Netspionage: The Global Threat to Information
by
Boni, William C.
Improving Access to and Confidentiality of Research Data: Report of a Workshop
by
Committee on National Statistics, National Research Council, Commission on Behavioral and Social Sciences and Education
Financial Privacy & Electronic Commerce: Who's in My Business
by
Robinson, Benjamin E., III
Java and Internet Security
by
Shrader, Theodore
Security Fundamentals for E-Commerce
by
Hassler, Vesna
E-mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
by
Syngress
FAA Computer Security: Recommenations to Address Continuing Weaknesses
by
U S General Accounting Office
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures
by
Johnson, Neil F., Duric, Zoran, Jajodia, Sushil