Computer Security in 2007
Developer's Guide to Web Application Security
by
Cross, Michael
Stealing the Network
by
Long, Mullen
Wardriving & Wireless Penetration Testing
by
Thornton, Frank, Hurley, Chris, Rogers, Russ
Secure Your Network for Free
by
Seagren, Eric
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
by
Contos, Brian T.
Rfid+ Study Guide and Practice Exams: Study Guide and Practice Exams
by
Sanghera, Paul
Geometric Spanner Networks
by
Narasimhan, Giri, Smid, Michiel
Foundations of Cryptography: Volume 1, Basic Tools
by
Goldreich, Oded
Botnets
by
Binkley, Schiller
Computer Related Occupational Deviance: Ein Mehr-Ebenen-Modell Zur Erklärung Und Prävention
by
Godschalk, David
Foundations of Security: What Every Programmer Needs to Know
by
Daswani, Neil, Kern, Christoph, Kesavan, Anita
Security for Wireless AD Hoc Networks
by
Anjum, Farooq, Mouchtaris, Petros
Cybercrime
by
Security Metrics: Replacing Fear, Uncertainty, and Doubt
by
Jaquith, Andrew
Biometric Technologies and Verification Systems
by
Vacca, John R.
Snort Intrusion Detection and Prevention Toolkit [With CDROM]
by
Caswell, Brian, Beale, Jay, Baker, Andrew
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
by
Walther, Henrik
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators [With CDROM]
by
Rogers, Russ, Long, Johnny, Wiles, Jack
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
by
Steele, James, Reyes, Anthony, Brittson, Richard
Computer Forensics: Evidence Collection and Management
by
Newman, Robert C.
Grid Computing Security
by
Chakrabarti, Anirban
Cyber-Safe Kids, Cyber-Savvy Teens: Helping Young People Learn to Use the Internet Safely and Responsibly
by
Willard, Nancy E.
Cybercrime: How to Avoid Becoming a Victim
by
Milhorn, H. Thomas
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised)
by
Barker, Elaine, Johnson, Don, Smid, Miles
How to Cheat at VoIP Security
by
Porter, Thomas Cissp, Gough, Michael
Zen and the Art of Information Security
by
Winkler, Ira
Xss Attacks: Cross Site Scripting Exploits and Defense
by
Petkov, Petko, Grossman, Jeremiah, Hansen, Robert
Building Robots with Lego Mindstorms NXT
by
Ferrari, Guilio, Ferrari, Mario
Elektronische Signaturen in Modernen Geschäftsprozessen: Schlanke Und Effiziente Prozesse Mit Der Eigenhändigen Elektronischen Unterschrift Realisiere
by
Gruhn, Volker, Wolff-Marting, Vincent, Köhler, Andre
Conquest in Cyberspace: National Security and Information Warfare
by
Libicki, Martin C.
Applied Cryptanalysis: Breaking Ciphers in the Real World
by
Stamp, Mark, Low, Richard M.
Linksys WRT54G Ultimate Hacking
by
Asadoorian, Paul, Pesce, Larry
A+, Network+, Security+ Exams in a Nutshell
by
Bhardwaj, Pawan K.
Physical and Logical Security Convergence: Powered by Enterprise Security Management
by
Derodeff, Colby, Crowell, William P., Contos, Brian T.
Conquest in Cyberspace: National Security and Information Warfare
by
Libicki, Martin C.
Alternate Data Storage Forensics
by
Cohen
How to Cheat at Microsoft Vista Administration
by
Kanclirz, Jan
Security Convergence: Managing Enterprise Security Risk
by
Tyson, Dave
Anti-Spam Measures: Analysis and Design
by
Schryen, Guido
Terrestrial Trunked Radio - TETRA: A Global Security Tool
by
Stavroulakis, Peter
Laboratory Biosecurity Handbook
by
Gaudioso, Jennifer, Brodsky, Benjamin H., Salerno, Reynolds M.
PRAXIS Des It-Rechts: Praktische Rechtsfragen Der It-Sicherheit Und Internetnutzung
by
Speichert, Horst
Netzwerke und deren Sicherheit
by
Protic, Dea Ana
Synchronizing Internet Protocol Security (Sipsec)
by
Shoniregun, Charles A.
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
by
Anley, Chris, Heasman, John, Lindner, Felix
Fighting Fraud: How to Establish and Manage an Anti-Fraud Program
by
Kovacich, Gerald L.
Avien Malware Defense Guide for the Enterprise
by
Harley, David
How to Cheat at Securing Linux
by
Seagren, Eric S., Krishnamurthy, Mohan, Alder, Raven
Practical Embedded Security: Building Secure Resource-Constrained Systems
by
Stapko, Timothy
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
by
Maynor, David
Shifting the Security Paradigm - The Risks of Information Assurance
by
Morgan, Grayson
Critical Information Infrastructures: Resilience and Protection
by
Hyslop, Maitland
Cybercrime: The Transformation of Crime in the Information Age
by
Wall, David S.
Pancreatic Cytopathology
by
Stelow, Edward B., Chhieng, David C.
NIST SP 800-44 Guidelines on Securing Public Web Servers: NiST SP 800-44 Version 2
by
National Institute of Standards and Tech
Implementing the ISO/IEC 27001 Information Security Management System Standard
by
Humphreys, Edward
How to Cheat at Securing Your Network
by
Dubrawsky, Ido
How to Cheat at Administering Office Communications Server 2007
by
Piltzecker, Anthony
How to Cheat at Deploying and Securing RFID
by
Sanghera, Paul, Thornton, Frank
The Best Damn Cybercrime and Digital Forensics Book Period: Your Guide to Digital Information Seizure, Incident Response, and Computer Forensics
by
Wiles, Jack, Reyes, Anthony
The Official Chfi Study Guide (Exam 312-49): For Computer Hacking Forensic Investigator
by
Kleiman, Dave
Security Power Tools
by
Granick, Jennifer Stisa, Burns, Bryan, Manzuik, Steve
Privacy-Respecting Intrusion Detection
by
Flegel, Ulrich
Variable-Length Codes for Data Compression
by
Salomon, David
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
by
Shaul, Josh, Ingram, Aaron
Kismet Hacking
by
Schearer, Michael J., Haines, Brad, Thornton, Frank
How to Cheat at Configuring VmWare ESX Server
by
Rule, David
Infosecurity 2008 Threat Analysis
by
Fogie, Seth, Derodeff, Colby, Schiller, Craig
The Best Damn IT Security Management Book Period
by
McCrie, Robert, Snedaker, Susan
The Best Damn Server Virtualization Book Period: Including VMware, Xen, and Microsoft Virtual Server
by
Rule, David, Dittner, Rogier
Securing Web Services: Practical Usage of Standards and Specifications
by
Periorellis, Panos
Fighting Terror Online: The Convergence of Security, Technology, and the Law
by
Golumbic, Martin Charles
Biorthogonal Systems in Banach Spaces
by
Hajek, Petr, Montesinos Santalucia, Vicente, Vanderwerff, Jon
Cryptanalytic Attacks on Rsa
by
Yan, Song Y.
How to Achieve 27001 Certification: An Example of Applied Compliance Management
by
Arnason, Sigurjon Thor, Willett, Keith D.
Cyber-Security and Threat Politics: US Efforts to Secure the Information Age
by
Dunn Cavelty, Myriam
Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing
by
Buttyán, Levente, Hubaux, Jean-Pierre
User's Guide to Securing External Devices for Telework and Remote Access
by
U. S. Department of Commerce, Scarfone, Karen, Souppaya, Murugiah
Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring
by
Carvey, Harlan
Dr. Tom Shinder's ISA Server 2006 Migration Guide
by
Shinder, Thomas W.
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
by
Wyler, Neil R., Cameron, Rob
Web Application Vulnerabilities: Detect, Exploit, Prevent
by
Palmer, Steven
Open Source Fuzzing Tools
by
Evron, Gadi, Rathaus, Noam
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
by
Menendez, Doug, Marcella Jr, Albert
Hacking: The Art of Exploitation, 2nd Edition [With CDROM]
by
Erickson, Jon
Random Curves: Journeys of a Mathematician
by
Koblitz, Neal
Securing Biometrics Applications
by
Crosier, Stephen, Shoniregun, Charles A.
VoIP Network Security and Forensic Models Using Patterns
by
Pelaez, Juan C.
Digital Watermarking and Steganography: Fundamentals and Techniques
by
Shih, Frank Y.
The Best of Freebsd Basics
by
Lavigne, Dru
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
by
Scambray, Joel
Identity Theft: A Comprehensive Guide
by
Mason, Jay
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
by
Cavelty, Myriam Dunn, Mauer, Victor