Computer Security in 2006
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
by
Gavrilenko, Konstantin, Mikhailovsky, Andrei, Vladimirov, Andrew
Security Log Management: Identifying Patterns in the Chaos
by
Babbin, Jacob, Kleiman, Dave, Carter, Everett F., Jr.
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
by
Mitnick, Kevin D., Simon, William L.
Complexity and Cryptography: An Introduction
by
Talbot, John, Welsh, Dominic
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
by
Killmeyer, Jan
How to Cheat at Managing Microsoft Operations Manager 2005
by
Piltzecker, Anthony
Information Security For The Little Guy
by
Hoffman, Joseph M.
Writing Security Tools and Exploits
by
Foster, James C.
Guide for Developing Security Plans for Federal Information Systems
by
Bowen, Pauline, Swanson, Marianne, Hash, Joan
NIST SP 800-18 R 1 Developing Security Plans for Federal Information Systems: Feb 2006
by
National Institute of Standards and Tech
The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology
by
Gattiker, Urs E.
Information Security: A Strategic Approach
by
Leveque, Vincent
Privacy Protection for E-Services
by
Yee, George
Professional Windows Desktop and Server Hardening
by
Grimes, Roger A.
Configuring Sonicwall Firewalls
by
Bendell, Dan
How to Cheat at Designing Security for a Windows Server 2003 Network
by
Ruston, Chris, Peiris, Chris
Understanding Voice-Over IP Security
by
Johnston, Alan B., Piscitello, David M.
Securing Converged IP Networks
by
Macaulay, Tyson
Information Assurance: Security in the Information Environment
by
Blyth, Andrew, Kovacich, Gerald L.
Information Security: Contemporary Cases: Contemporary Cases
by
Wright, Marie A., Kakalik, John S.
Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions
by
Pollino, David, Bradley, Tony, Pennington, Bill
Practical Voip Security
by
Porter Cissp Ccnp Ccda Ccs, Thomas
Guide to Wireless Network Security
by
Vacca, John R.
Codes and Ciphers - A History of Cryptography
by
D'Agapeyeff, Alexander
Individualisierung Und Datenschutz: Rechtskonformer Umgang Mit Personenbezogenen Daten Im Kontext Der Individualisierung
by
Schwenke, Matthias
Quantum Cryptography and Secret-Key Distillation
by
Assche, Gilles Van
Information Security: Design, Implementation, Measurement, and Compliance
by
Layton, Timothy P.
Professional Pen Testing for Web Applications
by
Andreu, Andres
Protecting Information: From Classical Error Correction to Quantum Cryptography
by
Loepp, Susan, Wootters, William K.
Computer Security Basics: Computer Security
by
Gangemi, G. T., Lehtinen, Rick
Protecting Information: From Classical Error Correction to Quantum Cryptography
by
Wootters, William K., Loepp, Susan
The Language of Compliance: A Glossary of Terms, Acronyms, and Extended Definitions
by
Cougias, Dorian J., Halpern, Marcelo
Multivariate Public Key Cryptosystems
by
Gower, Jason E., Schmidt, Dieter S., Ding, Jintai
The Internet: The Missing Manual
by
Pogue, David, Biersdorfer, J. D.
Computer Security Dictionary
by
Cordovana, James, Minoli, Daniel
Firewall Policies and VPN Configurations
by
Lucas, Mark, Singh, Abhishek, Cantrell, Chris
Configuring Ipcop Firewalls: Closing Borders with Open Source
by
Eaton-Lee, James, Dempster, Barrie
How to Cheat at Securing a Wireless Network
by
Hurley, Chris, Barken, Lee
Formale Modellierung Von Authentifizierungs- Und Autorisierungsinfrastrukturen: Authentizität Von Deskriptiven Attributen Und Privilegien Auf Der Basi
by
Wölfl, Thomas
Dictionary of Information Security
by
Slade, Robert
Assessment of Access Control Systems NISTIR 7316: NiSTIR 7316
by
National Institute of Standards and Tech
Practical Hacking Techniques and Countermeasures [With CDROM]
by
Spivey, Mark D.
Syngress Force Emerging Threat Analysis
by
Graham
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
by
Bradley, T.
The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals
by
Bocij, Paul
Improving Business Statistics Through Interagency Data Sharing: Summary of a Workshop
by
National Research Council, Division of Behavioral and Social Sciences and Education, Committee on National Statistics
Pranks 2
by
Web Services Security and E-Business
by
Radhamani, G., Rao, G. S. V. Radha Krishna
Microsoft Windows Security Fundamentals
by
Grillenmeier, Guido, de Clercq, Jan
Cryptography for Developers
by
St Denis
Preserving Privacy in On-Line Analytical Processing (Olap)
by
Wijesekera, Duminda, Jajodia, Sushil, Wang, Lingyu
HTML & Xhtml: The Definitive Guide
by
Musciano, Chuck, Kennedy, Bill
How to Cheat at Windows System Administration Using Command Line Scripts
by
Bhardwaj, Pawan K.
Fisma Certification and Accreditation Handbook
by
Taylor, L., Taylor, Laura P.
Elsevier's Dictionary of Information Security
by
Radichkova, B., Manoilov, G.
Network Security Hacks: Tips & Tools for Protecting Your Privacy
by
Lockhart, Andrew
It-Sicherheit Kompakt Und Verständlich: Eine Praxisorientierte Einführung
by
Witt, Bernhard C.
Electronic Postage Systems: Technology, Security, Economics
by
Bleumer, Gerrit
Network Security Policies and Procedures
by
Frye, Douglas W.
Complete Guide to CISM Certification
by
Peltier, Thomas R., Peltier, Justin
Critical Information Infrastructures Security: First International Workshop, Critis 2006, Samos Island, Greece, August 31 - September 1, 2006
by
Lopez, Javier
Hack the Stack
by
Watkins, Stephen, Mays, George, Bandes, Ronald M.