Computer Security in 2009
Securing Library Technology
by
Earp, Paul W., Wright, Adam
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
by
Fyodor, Lyon, Gordon
Howto Secure and Audit Oracle 10g and 11g
by
Ben-Natan, Ron
Post-Quantum Cryptography Using Complexity
by
de Mare, Michael James
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement
by
Brotby Cism, W. Krag
TCP/IP - The Ultimate Protocol Guide: Volume 1 - Data Delivery and Routing
by
Miller, Philip M.
TCP/IP - The Ultimate Protocol Guide: Volume 2 - Applications, Access and Data Security
by
Miller, Philip M.
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
by
Nystrom, Martin, Fry, Chris
Information Security
by
Brotby, Krag
Data Governance Imperative (The)
by
Sarsfield, Steve
Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy
by
Alexander, Philip
Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20
by
Gritzalis, Dimitris, Lopez, Javier
Algorithmic Cryptanalysis
by
Joux, Antoine
Applied Combinatorics
by
Tesman, Barry, Roberts, Fred
Cisco ASA Configuration
by
Deal, Richard
Beautiful Security: Leading Security Experts Explain How They Think
by
Oram, Andy, Viega, John
Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities
by
Volkamer, Melanie
Information Theoretic Security
by
Poor, H. Vincent, Shamai, Shlomo, Liang, Yingbin
Cryptanalysis of RSA and Its Variants
by
Hinek, M. Jason
Comptia Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2e [With DVD ROM]
by
Krishnamurthy, Mohan, Cross, Michael, Fritz, Dustin
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
by
Viega, John, Howard, Michael, LeBlanc, David
Security of Mobile Communications
by
Boudriga, Noureddine
Security Risk Management Body of Knowledge
by
Talbot, Julian, Jakeman, Miles
Elementary Cryptanalysis
by
Sinkov, Abraham
Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution
by
Teti, Antonio
Data Protection: Governance, Risk Management, and Compliance
by
Hill, David G.
Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks
by
Police Leadership in a Democracy: Conversations with America's Police Chiefs
by
Isenberg, James
Algebraic Cryptanalysis
by
Bard, Gregory
Information Warfare
by
Ventre, Daniel
Pearls of Discrete Mathematics
by
Erickson, Martin
Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age
by
Dunn Cavelty, Myriam
Network Security Bible
by
Cole, Eric
Conduite et Maîtrise de la Sécurité Informatique: La méthode CMSI
by
Hallepee, Didier
Foundations of Cryptography: Volume 2, Basic Applications
by
Goldreich, Oded, Oded, Goldreich
Innovations in Digital Watermarking Techniques
by
Wang, Feng-Hsing
Protecting SQL Server Data
by
Magnabosco, John
Security in Ad-Hoc and Sensor Networks
by
Corbett, Cherita L., McNair, Janise, Beyah, Raheem A.
I Contenuti Digitali: Tecnologie, Diritti E Libertà
by
Lucchi, Nicola
Hacking Exposed Computer Forensics
by
Philipp, Aaron
Guidelines on Firewalls and Firewall Policy
by
Hoffman, Paul, National Institute of Standards and Tech, Scarfone, Karen
NIST SP 800-41 Guidelines on Firewalls and Firewall Policy: NiST SP 800-41
by
National Institute of Standards and Tech
Eleventh Hour Security+: Exam Sy0-201 Study Guide
by
Dubrawsky, Ido
Network+: Exam N10-004 Study Guide
by
Alpern, Naomi
Cybercrime, Cyberterrorism, and Cyberwarfare
by
Uda, Robert T. Mba
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
by
Davis, Chris, Cowen, David, Philipp, Aaron
Algebraic Geometry in Coding Theory and Cryptography
by
Niederreiter, Harald, Xing, Chaoping
Trust Management for Service-Oriented Environments
by
Bouguettaya, Athman, Malik, Zaki
Kryptologie: Algebraische Methoden Und Algorithmen
by
Karpfinger, Christian, Kiechle, Hubert
Hacking: The Next Generation
by
Dhanjani, Nitesh, Rios, Billy, Hardin, Brett
Network Intrusion Detection and Prevention: Concepts and Techniques
by
Lu, Wei, Tavallaee, Mahbod, Ghorbani, Ali A.
Cyberdeterrence and Cyberwar
by
Libicki, Martin C.
Enterprise Security for the Executive: Setting the Tone from the Top
by
Bayuk, Jennifer
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
by
Kumaraswamy, Subra, Latif, Shahed, Mather, Tim
Handbook of Data Compression
by
Motta, Giovanni, Salomon, David
Security for Web Services and Service-Oriented Architectures
by
Bertino, Elisa, Martino, Lorenzo, Paci, Federica
Modsecurity 2.5
by
Mischel, Magnus
Cyber Law
by
Kumar, Anupa P.
Security in Embedded Devices
by
Gebotys, Catherine H.
Kryptografie in Theorie Und PRAXIS: Mathematische Grundlagen Für Internetsicherheit, Mobilfunk Und Elektronisches Geld
by
Beutelspacher, Albrecht, Neumann, Heike B., Schwarzpaul, Thomas