Computer Security in 2005
Aspectj Cookbook
by
Miles, Russ
Hardening Linux
by
Turnbull, James
Network Security: A Practical Approach
by
Harrington, Jan L.
Intrusion Prevention and Active Response: Deploying Network and Host IPS
by
Orebaugh, Angela D., Pinkard, Becky, Rash, Michael
Microsoft Log Parser Toolkit
by
Giuseppini, Gabriele, Burnett, Mark
Honeypots for Windows
by
Grimes, Roger A.
Brute Force: Cracking the Data Encryption Standard
by
Curtin, Matt
Buffer Overflow Attacks
by
Deckard, Jason
Linux Server Security
by
Bauer, Michael D.
Datenschutz Durch Technik: Rechtliche Förderungsmöglichkeiten Von Privacy Enhancing Technologies Am Beispiel Der Videoüberwachung
by
Stechow, Constantin
Risk Management for Computer Security: Protecting Your Network & Information Assets
by
Jones, Andy, Ashenden, Debi
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
by
Simon, William L., Mitnick, Kevin D.
Protecting Critical Infrastructures Against Cyber-Attack
by
Lukasik, Stephen
Windows XP in a Nutshell
by
Karp, David A., Mott, Troy, O'Reilly, Tim
Preventing Identity Theft in Your Business: How to Protect Your Business, Customers, and Employees
by
Collins, Judith M.
The German Enigma Cipher Machine
by
Deavours, Cipher a., Kruh, Louis, Winkel, Brian J.
Aggressive Network Self-Defense
by
Wyler, Neil R., Fogie, Seth, Archibald, Neil
Coding for Data and Computer Communications
by
Salomon, David
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
by
Foster, James C.
Principles and Practices for a Federal Statistical Agency: Third Edition
by
Division of Behavioral and Social Sciences and Education, Committee on National Statistics, National Research Council
Unix, Solaris and Linux: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications
by
Loza, Boris
802.11 Wlans and IP Networking
by
Prasad, Neeli, Prasad, Anand
Deploying Citrix Metaframe Presentation Server 3.0 with Windows Server 2003 Terminal Services
by
Craft, Melissa
Cisco PIX Firewalls
by
Khan
Mastering FreeBSD and OpenBSD Security
by
Hope, Paco, Potter, Bruce, Korff, Yanek
Snort Cookbook
by
Orebaugh, Angela, Biles, Simon, Babbin, Jacob
Network Security Tools
by
Clarke, Justin, Dhanjani, Nitesh
The Lottery Industry: : Cases, Problems & Preventable Incidents
by
Delehanty, Herb
Codes: The Guide to Secrecy from Ancient to Modern Times
by
Mollin, Richard A.
Cryptography in C and C++
by
Welschenbach, Michael
Steganography
by
Bailey, Karen, Curran, Kevin
Ssh, the Secure Shell: The Definitive Guide
by
Silverman, Richard E., Byrnes, Robert G., Barrett, Daniel J.
Infosec Career Hacking: Sell Your Skillz, Not Your Soul
by
Long, Johnny, Hurley, Chris, Bayles, Aaron W.
Im Instant Messaging Security
by
Ransome, James F., Rittinghouse, John
Implementing Database Security and Auditing
by
Ben-Natan, Ron
Database Hacker's Handbook w/WS
by
Litchfield, David, Anley, Chris, Heasman, John
Swing Hacks: Tips and Tools for Killer GUIs
by
Marinacci, Joshua, Adamson, Chris
Security in E-Learning
by
Weippl, Edgar R.
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar
by
Golomb, Solomon W., Gong, Guang
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
by
Oppleman, Victor, Friedrichs, Oliver, Watson, Brett
Mapping Hacks: Tips & Tools for Electronic Cartography
by
Gibson, Rich, Walsh, Jo, Erle, Schuyler
Contemporary Cryptology
by
Cramer, Ronald, Damgard, Ivan, Catalano, Dario
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes)
by
Shoniregun, Charles A.
Codici Cifrati: Arne Beurling E La Crittografia Nella II Guerra Mondiale
by
Beckman, Bengt
Network Security Evaluation Using the Nsa Iem
by
Rogers, Russ, Fuller, Ed, Miles, Greg
Software Piracy Exposed
by
Honick, Ron
Stealing the Network: How to Own an Identity
by
Riley, Peter A., Russell, Ryan, Beale, Jay
Configuring Vmware Esx Server 2.5
by
Wilson, Seburn, Muller, Al
Beginning Cryptography with Java
by
Hook, David
The Ciso Handbook: A Practical Guide to Securing Your Company
by
August, Thomas D., Gentile, Michael, Collette, Ron
Security in Wireless LANs and Mans
by
Hardjono, Thomas
Digital Identity: Unmasking Identity Management Architecture (Ima)
by
Windley, Phillip
Computer Security: 20 Things Every Employee Should Know
by
Rothke, Ben
Pro PHP Security
by
Snyder, Chris, Southwell, Michael
Multimedia-Assistenten Im Betrieb: Datenschutzrechtliche Anforderungen, Rechtliche Regelungs- Und Technische Gestaltungsvorschläge Für Mobile Agentens
by
Steidle, Roland
Proceedings of Defining the State of the Art in Software Security Tools Workshop
by
Fong, Elizabeth, Black, Paul E., U. S. Department of Commerce
AAA and Network Security for Mobile Access: Radius, Diameter, Eap, Pki and IP Mobility
by
Nakhjiri, Mahsa, Nakhjiri, Madjid
Phishing Exposed
by
James, Lance
Security and Usability: Designing Secure Systems That People Can Use
by
Cranor, Lorrie Faith, Garfinkel, Simson
Computer Insecurity: Risking the System
by
Furnell, Steven M.
Configuring Check Point Ngx Vpn-1/Firewall-1
by
Desmeules, Simon, Stiefel, Barry J.
Sicherheit Und Datenschutz ALS Notwendige Eigenschaften Von Computergestützten Informationssystemen: Ein Integrierender Gestaltungsansatz Für Vertraue
by
Lange, Jörg Andreas
Essential SNMP: Help for System and Network Administrators
by
Mauro, Douglas, Schmidt, Kevin
Web and Information Security
by
Ferrari, Elena
Hardening Windows
by
Hassell, Jonathan
Enterprise Security Architecture: A Business-Driven Approach
by
Sherwood, Nicholas
Internet Forensics: Using Digital Evidence to Solve Computer Crime
by
Jones, Robert
Computer Security and Telerobotics for Everyone
by
Doherty Ph. D., Eamon P.
Multimedia Encryption and Watermarking
by
Socek, Daniel, Furht, Borko, Muharemagic, Edin
Essential PHP Security
by
Shiflett, Chris
Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and Technology
by
Nusbaum, Joseph, Kent, Karen, U. S. Department of Commerce
Creating a Patch and Vulnerability Management Program: Recommendations of the National Institute of Standards and Technology (NIST)
by
Bergeron, Tiffany, Henning, David, U. S. Department of Commerce
Securing Im and P2P Applications for the Enterprise
by
Baskin, Brian, Sachs, Marcus, Piccard, Paul
Perfect Password: Selection, Protection, Authentication
by
Burnett, Mark
Access Control Systems: Security, Identity Management and Trust Models
by
Benantar, Messaoud
Foundations of Computer Security
by
Salomon, David
SAP Security: SAP Security Essentials
by
Stewart, Jim
Guide to IPsec VPNs: NiST SP 800-77
by
National Institute of Standards and Tech
Guide to IPsec VPNs: Recommendations of the National Institute of Standards and Technology
by
Lewkowski, Ryan, Orebaugh, Angela D., Kent, Karen