Computer Security in 2002
McOmmerce Security: A Beginner's Guide
by
Raina, Kapil, Harsh, Anurag
Configuring Symantec AntiVirus
by
Syngress
Cisco Avvid and IP Telephony Design and Implementation
by
Lawson, Wayne
XML Security
by
A Guide to Data Compression Methods [With CD-ROM]
by
Salomon, David
The Design of Rijndael: AES - The Advanced Encryption Standard
by
Rijmen, Vincent, Daemen, Joan
Introduction to Communication Electronic Warfare Systems
by
Poisel, Richard A.
Security for Ubiquitous Computing
by
Stajano, Frank
Hardening Cisco Routers
by
Akin, Thomas
Locksmithing and Electronic Security Wiring Diagrams
by
Schum, John L.
Principles of Secure Network Systems Design
by
Ghosh, Sumit
World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Computing
by
Hunter, Richard S.
Hackproofing Your Wireless Network
by
Syngress
Web Performance Tuning
by
Killelea, Patrick
Hack Proofing Your Network
by
Syngress
Securing and Controlling Cisco Routers Ology, and Profits
by
Davis, Peter T.
Informed Watermarking
by
Eggers, Joachim, Girod, Bernd
Information Assurance: Managing Organizational It Security Risks
by
Boyce, Joseph G., Jennings, Dan W.
Local Area Network Management,
by
Mikalsen, Arne, Borgesen, Per
Managing Cisco Network Security
by
Syngress
Smart Card Application Development Using Java
by
Hansmann, Uwe, Nicklous, Martin S., Schäck, Thomas
Internet Security Dictionary
by
Phoha, Vir V.
Network Security with OpenSSL: Cryptography for Secure Communications
by
Messier, Matt, Chandra, Pravir, Viega, John
IIS Security
by
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
by
Speed, Tim, Ellis, Juanita, Carrington, Charles
Cryptography: A Very Short Introduction
by
Murphy, Sean, Piper, Fred
Configuring Ipv6 for Cisco IOS
by
Syngress
Verschlüsselungsalgorithmen: Angewandte Zahlentheorie Rund Um Sicherheitsprotokolle
by
Brands, Gilbert
Hacker Contest: Sicherheitsprobleme, Lösungen, Beispiele
by
Moschgath, Marie-Luise, Schumacher, Markus, Roedig, Utz
The Art of Deception: Controlling the Human Element of Security
by
Mitnick, Kevin D., Simon, William L.
Performing Security Analyses of Information Systems
by
Smith, Charles L., Sr.
Radius: Securing Public Access to Private Resources
by
Hassell, Jonathan
The Art of the Steal: How to Protect Yourself and Your Business from Fraud, America's #1 Crime
by
Abagnale, Frank W.
The Hacking of America: Who's Doing It, Why, and How
by
Schell, Bernadette H., Dodge, John L.
Implementing Intrusion Detection Systems
by
Crothers, Tim
Biometrics
by