Computer Security in 2009
Securing Library Technology
by
Wright, Adam, Earp, Paul W.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
by
Lyon, Gordon, Fyodor
HOWTO Secure and Audit Oracle 10g and 11g
by
Ben-Natan, Ron
Post-Quantum Cryptography Using Complexity
by
de Mare, Michael James
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement
by
Brotby Cism, W. Krag
TCP/IP - The Ultimate Protocol Guide: Volume 2 - Applications, Access and Data Security
by
Miller, Philip M.
TCP/IP - The Ultimate Protocol Guide: Volume 1 - Data Delivery and Routing
by
Miller, Philip M.
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
by
Nystrom, Martin, Fry, Chris
Information Security
by
Brotby, Krag
Data Governance Imperative (The)
by
Sarsfield, Steve
Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy
by
Alexander, Philip
Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20
by
Gritzalis, Dimitris, Lopez, Javier
Cisco ASA Configuration
by
Deal, Richard
Algorithmic Cryptanalysis
by
Joux, Antoine
Applied Combinatorics
by
Roberts, Fred, Tesman, Barry
Beautiful Security: Leading Security Experts Explain How They Think
by
Oram, Andy, Viega, John
Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities
by
Volkamer, Melanie
Information Theoretic Security
by
Liang, Yingbin, Poor, H. Vincent, Shamai, Shlomo
Comptia Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2e [With DVD ROM]
by
Cross, Michael, Fritz, Dustin, Krishnamurthy, Mohan
Cryptanalysis of RSA and Its Variants
by
Hinek, M. Jason
Security of Mobile Communications
by
Boudriga, Noureddine
Security Risk Management Body of Knowledge
by
Jakeman, Miles, Talbot, Julian
Elementary Cryptanalysis
by
Sinkov, Abraham
Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution
by
Teti, Antonio
Data Protection: Governance, Risk Management, and Compliance
by
Hill, David G.
Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks
by
Algebraic Cryptanalysis
by
Bard, Gregory
Information Warfare
by
Ventre, Daniel
Network Security Bible
by
Cole, Eric
Cyber-Security and Threat Politics: US Efforts to Secure the Information Age
by
Dunn Cavelty, Myriam
Pearls of Discrete Mathematics
by
Erickson, Martin
Conduite et Maîtrise de la Sécurité Informatique: La méthode CMSI
by
Hallepee, Didier
Foundations of Cryptography: Volume 2, Basic Applications
by
Goldreich, Oded
Protecting SQL Server Data
by
Magnabosco, John
Innovations in Digital Watermarking Techniques
by
Wang, Feng-Hsing
Security in Ad-Hoc and Sensor Networks
by
Beyah, Raheem A., Corbett, Cherita L., McNair, Janise
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
by
LeBlanc, David, Viega, John, Howard, Michael
I Contenuti Digitali: Tecnologie, Diritti E Libertà
by
Lucchi, Nicola
Hacking Exposed Computer Forensics
by
Philipp, Aaron
Guidelines on Firewalls and Firewall Policy
by
National Institute of Standards and Tech, Scarfone, Karen, Hoffman, Paul
NIST SP 800-41 Guidelines on Firewalls and Firewall Policy: NiST SP 800-41
by
National Institute of Standards and Tech
Eleventh Hour Security+: Exam Sy0-201 Study Guide
by
Dubrawsky, Ido
Network+: Exam N10-004 Study Guide
by
Alpern, Naomi
Cybercrime, Cyberterrorism, and Cyberwarfare
by
Uda, Robert T. Mba
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
by
Philipp, Aaron, Davis, Chris, Cowen, David
Algebraic Geometry in Coding Theory and Cryptography
by
Niederreiter, Harald, Xing, Chaoping
Trust Management for Service-Oriented Environments
by
Bouguettaya, Athman, Malik, Zaki
Kryptologie: Algebraische Methoden Und Algorithmen
by
Kiechle, Hubert, Karpfinger, Christian
Hacking: The Next Generation
by
Dhanjani, Nitesh, Rios, Billy, Hardin, Brett
Network Intrusion Detection and Prevention: Concepts and Techniques
by
Tavallaee, Mahbod, Ghorbani, Ali A., Lu, Wei
Enterprise Security for the Executive: Setting the Tone from the Top
by
Bayuk, Jennifer
Cyberdeterrence and Cyberwar
by
Libicki, Martin C.
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
by
Kumaraswamy, Subra, Latif, Shahed, Mather, Tim
Handbook of Data Compression
by
Motta, Giovanni, Salomon, David
Security for Web Services and Service-Oriented Architectures
by
Paci, Federica, Bertino, Elisa, Martino, Lorenzo
Modsecurity 2.5
by
Mischel, Magnus
Cyber Law
by
Kumar, Anupa P.
Security in Embedded Devices
by
Gebotys, Catherine H.
Kryptografie in Theorie Und PRAXIS: Mathematische Grundlagen Für Internetsicherheit, Mobilfunk Und Elektronisches Geld
by
Schwarzpaul, Thomas, Beutelspacher, Albrecht, Neumann, Heike B.