Computer Security in 2008
Microsoft Forefront Security Administration Guide
by
Varsalone, Jesse
Internet-Security Aus Software-Sicht: Grundlagen Der Software-Erstellung Für Sicherheitskritische Bereiche
by
Kriha, Walter, Schmitz, Roland
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
by
Cannings, Rich, Dwivedi, Himanshu, Lackey, Zane
Cybercrime: Secure It or Lose It
by
Chatam, Denise M.
Cryptography and Security Services: Mechanisms and Applications
by
Mogollon, Manuel
OS X Exploits and Defense
by
Long, Johnny, Harley, David, Hurley, Chris
Secrets Stolen, Fortunes Lost
by
Power, Richard, Burgess, Christopher
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
by
Long, Johnny
Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities
by
Thomas, Stephen
The Real McTs/McItp Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions [With Dvdrom]
by
Piltzecker, Anthony
Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers
by
Alexander, Philip
The Real McTs/McItp Exam 70-643 Prep Kit: Independent and Complete Self-Paced Solutions
by
Posey, Brien, Martin, Jeffery A., Bowern, Colin
Screenos Cookbook: Time-Saving Techniques for Screenos Administrators
by
Davar, Vik, Delcourt, David, Brunner, Stefan
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
by
Tiensivu, Aaron
RFID Security and Privacy: Concepts, Protocols, and Architectures
by
Henrici, Dirk
Malware Forensics: Investigating and Analyzing Malicious Code
by
Malin, Cameron H., Aquilina, James M., Casey, Eoghan
The Best Damn Windows Server 2008 Book Period
by
Piltzecker, Anthony
Trusted Computing Systeme: Konzepte Und Anforderungen
by
Müller, Thomas
Internet Security For Parents: Discover The Hidden Dangers That You And Your Children Face Online
by
Ivancic, Dan
Information Assurance Architecture
by
Willett, Keith D.
Human Ear Recognition by Computer
by
Chen, Hui, Bhanu, Bir
Security for Telecommunications Networks
by
Traynor, Patrick, McDaniel, Patrick, La Porta, Thomas
Information Security: Policy, Processes, and Practices
by
Straub, Detmar W., Goodman, Seymour, Baskerville, Richard
Exposing Internet Address Use to EnhanceNetwork Security
by
Cooke, Evan M.
Guide to General Server Security
by
Tracy, Miles, U. S. Department of Commerce-, Jansen, Wayne
Guide to Securing Legacy IEEE 802.11 Wireless Networks
by
Dicoi, Derrick, Sexton, Matthew, Tibbs, Cyrus
NIST SP 800-123 Guide to General Server Security: NiST SP 800-123
by
National Institute of Standards and Tech
Fuzzing for Software Security
by
Takanen, Ari, Demott, Jared D., Miller, Charles
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
by
Melnick, Jim, Dunham, Ken
Building an Effective Information Security Policy Architecture
by
Bacik, Sandy
Quantum Computing for Computer Scientists
by
Yanofsky, Noson S., Mannucci, Mirco A.
Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
by
Dube, Roger R.
Forensic Filtering of Cell Phone Protocols
by
Jansen, Wayne, Delaitre, Aurelien
NIST SP 800-60 Guide for Mapping Types of Information and Information Systems to: Nist SP 800-60
by
National Institute of Standards and Tech
Computer Forensics For Dummies
by
Anzaldua, Reynaldo, Pollard, Carol
Operating System Security
by
Jaeger, Trent
Hacking Wall Street: Attacks And Countermeasures
by
Krinklebine, Karlos
Gfi Network Security and PCI Compliance Power Tools
by
Posey, Brien
Using the BACnet Communications DLL v1.0
by
Galler, Michael a.
NIST SP 800-115 Technical Guide to Information Security Testing and Assessment: NiST SP 800-115
by
National Institute of Standards and Tech
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection
by
Wang, Yun
Green It: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line
by
Velte, Anthony, Elsenpeter, Robert C., Velte, Toby
Spam 2 Scam How 2 B E-Safe
by
Manikantan, K. P.
Security Engineering for Service-Oriented Architectures
by
Breu, Ruth, Hafner, Michael
Hacking VoIP: Protocols, Attacks, and Countermeasures
by
Dwivedi, Himanshu
Wireless Internet Security
by
Kempf, James
Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
by
Johnson, Paul M., Souppaya, Murugiah, Scarfone, Karen
Ciso Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives
by
Gentile, Michael, Gentile, Skye, Collette, Ron
Constraint-based Analysis of Security Properties
by
Sarna-Starosta, Beata
Codes and Ciphers - A History of Cryptography
by
D'Agapeyeff, Alexander
How to Complete a Risk Assessment in 5 Days or Less
by
Peltier, Thomas R.
Introduction to Network Security
by
Jacobson, Douglas
Security in Computing Systems: Challenges, Approaches and Solutions
by
Biskup, Joachim
Open Source Systems Security Certification
by
Ardagna, Claudio Agostino, El Ioini, Nabil, Damiani, Ernesto
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
by
Hope, Paco, Walther, Ben
Securing Emerging Wireless Systems: Lower-Layer Approaches
by
Xu, Wenyuan, Trappe, Wade, Chen, Yingying
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
by
Cooper, David, Scarfone, Karen, Mehta, Ketan
Security in an IPv6 Environment
by
Kouns, Jake, Minoli, Daniel
Secure Multi-Party Non-Repudiation Protocols and Applications
by
Zhou, Jianying, Onieva, José a.
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
by
Dunstone, Ted, Yager, Neil
Secure Key Establishment
by
Choo, Kim-Kwang Raymond
Privatsphäre Durch Die Delegation Von Rechten
by
Wohlgemuth, Sven
Finite Automata and Application to Cryptography
by
Tao, Renji