Computer Security in 2010
Info Security Risk Management
by
Minoli, Daniel, Kouns, Jake
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention)
by
Christodonte II, Marcos
Power Analysis Side Channel Attacks
by
Parameswaran, Sri, Ambrose, Jude, Ignjatovic, Alexandar
Mobile Application Security
by
Clark, Chris, Dwivedi, Himanshu, Thiel, David
Net Neutrality: Towards a Co-Regulatory Solution
by
Marsden, Christopher T.
Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition
by
Yang, Yi Xian, Niu, Xin Xin, Xu, Cheng Qing
IT Induction and Information Security Awareness
by
Maddock, Valerie
Decrypted Secrets: Methods and Maxims of Cryptology
by
Bauer, Friedrich L.
Asset Protection through Security Awareness
by
Speed, Tyler Justin
Cryptography Engineering: Design Principles and Practical Applications
by
Kohno, Tadayoshi, Schneier, Bruce, Ferguson, Niels
Datenschutz Kompakt Und Verständlich: Eine Praxisorientierte Einführung
by
Witt, Bernhard C.
Permutation Complexity in Dynamical Systems: Ordinal Patterns, Permutation Entropy and All That
by
Amigó, José
Information Security Risk Analysis
by
Peltier, Thomas R.
Seven Deadliest Web Application Attacks
by
Shema, Mike
Seven Deadliest Microsoft Attacks
by
Alpern, Naomi, Kraus, Rob, Barber, Brian
Seven Deadliest Wireless Technologies Attacks
by
Haines, Brad
Broadband Quantum Cryptography
by
Rogers, Daniel
Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings
by
McGovern, Glenn P.
Sicher & Mobil: Sicherheit in Der Drahtlosen Kommunikation
by
Osterhage, Wolfgang W.
Loganalysis Tools für Datamining in Logfiles
by
Hurm, Dominic
Information Security Risk Management for ISO27001/Iso27002
by
Watkins, Steve G., Calder, Alan
Seven Deadliest Unified Communications Attacks
by
York, Dan
Seven Deadliest USB Attacks
by
Anderson, Brian, Anderson, Barbara
Seven Deadliest Social Network Attacks
by
Timm, Carl, Perez, Richard
The Illusion of Due Diligence: Notes from the CISO Underground
by
Bardin, Jeffrey S.
Analysis Techniques for Information Security
by
Datta, Anupam, Jha, Somesh, Li, Ninghui
Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives
by
Implications of Aggregated Dod Information Systems for Information Assurance Certification and Accreditation
by
Gonzales, Daniel, Ohlandt, Chad, Landree, Eric
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments
by
Kipper, Greg, Barrett, Diane
The Cryptography of Shakespeare V1
by
Arensberg, Walter Conrad
CISSP Exam Prep Questions, Answers & Explanations: 1000+ CISSP Practice Questions with Detailed Solutions
by
Ssi Logic
Combinatorial Designs for Authentication and Secrecy Codes
by
Huber, Michael
Handbook of Electronic Security & Digi..
by
Jahankhani, Hamid, Me, Gianluigi, Watson, David Lilburn
Secure and Resilient Software Development
by
Merkow, Mark S., Raghavan, Lakshmikanth
Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World
by
Fried, Stephen
Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation
by
Schuckers, Michael E.
Risiko-Assessments Für Datenqualität: Konzept Und Realisierung
by
Harrach, Hakim
Web Service Mining: Application to Discoveries of Biological Pathways
by
Zheng, George, Bouguettaya, Athman
Digital Triage Forensics: Processing the Digital Crime Scene
by
Pearson, Stephen, Watson, Richard
Network Flow Analysis
by
Lucas, Michael W.
It Security Management: It Securiteers - Setting Up an It Security Function
by
Partida, Alberto, Andina, Diego
Handbook of FPGA Design Security
by
Huffmire, Ted, Irvine, Cynthia, Nguyen, Thuy D.
802.11 Wireless Networks: Security and Analysis
by
Holt, Alan, Huang, Chi-Yu
Hackers & Painters: Big Ideas from the Computer Age
by
Graham, Paul
Least Privilege Security for Windows 7, Vista and XP
by
Smith, Russell
It Security Metrics: A Practical Framework for Measuring Security & Protecting Data
by
Hayden, Lance
Surviving Cyberwar
by
Stiennon, Richard
Surviving Cyberwar
by
Stiennon, Richard
Privacy, Identity, and Cloud Computing
by
Katzan, Harry, Jr.
Access Control, Security, and Trust: A Logical Approach
by
Older, Susan Beth, Chin, Shiu-Kai
Privacy, Identity, and Cloud Computing
by
Katzan, Harry, Jr.
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
by
Introduction to Cryptography with Mathematical Foundations and Computer Implementations
by
Stanoyevitch, Alexander
Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques
by
Fu, Ada Wai-Chee, Fung, Benjamin C. M., Wang, Ke
Wireless Network Administration a Beginner's Guide
by
Soyinka, Wale
Adaptive Cryptographic Access Control
by
Kayem, Anne V. D. M., Akl, Selim G., Martin, Patrick
Elements of Computer Security
by
Salomon, David
What Kind of Information Society?: Governance, Virtuality, Surveillance, Sustainability, Resilience
by
Dynamic Police Training
by
Bumbak, Ann R.
Managing an Information Security and Privacy Awareness and Training Program
by
Herold, Rebecca
Advanced Statistical Steganalysis
by
Böhme, Rainer
Swanson on Internal Auditing: Raising the Bar
by
Swanson, Dan
Securing the Information Infrastructure
by
Kizza, Joseph M., Kizza, Florence M.
Securing Strats in Linux Platforms and Applications
by
Jang, Michael
A Guide to Kernel Exploitation: Attacking the Core
by
Oldani, Massimiliano, Perla, Enrico
Emergency Notification
by
Chandler, Robert
Spyware and Adware
by
Aycock, John
Citrix XenDesktop Implementation: A Practical Guide for IT Professionals
by
James, Gareth R.
Junos Security: A Guide to Junos for the Srx Services Gateways and Security Certification
by
Woodberg, Brad, Giecco, Patricio, Cameron, Rob
Cyber Terrorism: Political and Economic Implications
by
Colarik, Andrew M.
Conducting Biosocial Surveys: Collecting, Storing, Accessing, and Protecting Biospecimens and Biodata
by
Committee on Population, National Research Council, Division of Behavioral and Social Sciences and Education
Secure Group Communications Over Data Networks
by
Zou, Xukai, Ramamurthy, Byrav, Magliveras, Spyros S.
Brute Force: Cracking the Data Encryption Standard
by
Curtin, Matt
Security Strategy: From Requirements to Reality
by
Stackpole, Bill, Oksendahl, Eric
Foundations of Computer Security
by
Salomon, David
Secure Systems Development with UML
by
Jürjens, Jan
Preserving Privacy in Data Outsourcing
by
Foresti, Sara
Linguistisches Identity Matching: Paradigmenwechsel in Der Suche Und Im Abgleich Von Personendaten
by
Lisbach, Bertrand
Grid Computing Security
by
Chakrabarti, Anirban
Anti-Spam Measures: Analysis and Design
by
Schryen, Guido
Coding for Data and Computer Communications
by
Salomon, David
Security in Computing Systems: Challenges, Approaches and Solutions
by
Biskup, Joachim
Security Engineering for Service-Oriented Architectures
by
Hafner, Michael, Breu, Ruth
Model-Driven Risk Analysis: The Coras Approach
by
Solhaug, Bjørnar, Stølen, Ketil, Lund, Mass Soldal
Human Ear Recognition by Computer
by
Bhanu, Bir, Chen, Hui
Guide to Computer Network Security
by
Kizza, Joseph Migga
Algebraic Aspects of Cryptography
by
Koblitz, Neal
Network Security: A Decision and Game-Theoretic Approach
by
Alpcan, Tansu, Başar, Tamer
RFID Security and Privacy: Concepts, Protocols, and Architectures
by
Henrici, Dirk
Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20
by
Gritzalis, Dimitris, Lopez, Javier