Computer Security in 2003
Cisco Security Specialist's Guide to Pix Firewall
by
Callisma, Inc
Fundamentals of Information Theory and Coding Design
by
Togneri, Roberto, Desilva, Christopher J. S.
The Weakest Security Link Series: 1st Edition
by
Medina, Luis F.
Fundamentals of Computer Security
by
Seberry, Jennifer, Pieprzyk, Josef, Hardjono, Thomas
802.11 Security
by
Potter, Bruce, Fleck, Bob
Web Services Security
by
O'Neill, Mark
Reshaping National Intelligence for an Age of Information
by
Treverton, Gregory F.
Computer and Intrusion Forensics
by
Collie, Byron, Vel, Olivier, Mohay, George
Internet Security: A Jumpstart for Systems Administrators and It Managers
by
Ellis, Juanita, Speed, Tim
Practical Unix and Internet Security
by
Schwartz, Alan, Garfinkel, Simson, Spafford, Gene
Check Point VPN-1/Fire Wall-1 NG Administration
by
Shah, Inti
The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet
by
Jennings, Charles, Fena, Lori
Symmetrische Verschlüsselungsverfahren: Design, Entwicklung Und Kryptoanalyse Klassischer Und Moderner Chiffren
by
Miller, Michael
Security Companion CD [With CDROM]
by
Spafford, Gene
Comprehensive VB .Net Debugging
by
Pearce, Mark
Stealing the Network: How to Own the Box
by
Syngress
Data Privacy and Security
by
Salomon, David
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
by
Sweeney, Mike, Syngress
Linux Security Cookbook
by
Barrett, Daniel J., Silverman, Richard E., Byrnes, Robert G.
PDA Security
by
The Center for Democracy and Technology and Internet Privacy in the U.S.: Lessons of the First Five Years
by
H-S Li, Joyce
Programming .Net Security: Writing Secure Applications Using C# or Visual Basic .Net
by
Freeman, Adam, Jones, Allen
Protocols for Authentication and Key Establishment
by
Boyd, Colin, Mathuria, Anish
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications
by
Schumacher, Markus
Secure Programming Cookbook for C and C++
by
Viega, John, Messier, Matt
Verschlüsselung Und Innere Sicherheit: Die Verfassungsrechtliche Zulässigkeit Eines Verschlüsselungsverbots Bei Elektronischer Datenkommunikation
by
Meyn, Christian
Composition of Secure Multi-Party Protocols: A Comprehensive Study
by
Lindell, Yehuda
Codierungstheorie: Eine Einführung
by
Schulz, Ralph-Hardo
HP Nonstop Server Security: A Practical Handbook
by
Xypro Technology Corp, Xypro Technology
Critical Incident Management
by
Sterneckert, Alan B.
Mission Critical Network Planning
by
Liotine, Matthew
Kerberos: The Definitive Guide
by
Garman, Jason
Cryptographic Security Architecture: Design and Verification
by
Gutmann, Peter
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User
by
Held, Gilbert
The Art of Deception: Controlling the Human Element of Security
by
Mitnick, Kevin D., Simon, William L.
Investigator's Guide to Steganography
by
Kipper, Gregory
Network Perimeter Security: Building Defense In-Depth
by
Riggs, Cliff
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach
by
Wang, Xiaoyang Sean, Jajodia, Sushil, Peng Ning
Real World Microsoft Access Database Protection and Security
by
Robinson, Garry
Best Damn Cisco Internetworking Book Period
by
Syngress
The ABCs of LDAP: How to Install, Run, and Administer LDAP Services
by
Voglmaier, Reinhard E.
Fundamentals of Network Security
by
Maiwald, Eric
Synchronizing E-Security
by
Williams, Godfried B.
Surviving Security: How to Integrate People, Process, and Technology
by
Andress, Amanda
Information Security and Auditing in the Digital Age
by
Umar, Amjad
System-On-Chip Architectures and Implementations for Private-Key Data Encryption
by
McCanny, John V., McLoone, Máire