Computer Security in 2011
IP Address Management
by
Rooney, Timothy
Implementing SSL / Tls Using Cryptography and Pki
by
Davies, Joshua
Konzeption Eines Systems Zur Überbetrieblichen Sammlung Und Nutzung Von Quantitativen Daten Über Informationssicherheitsvorfälle
by
Nowey, Thomas
Protecting Against The Unknown: A guide to improving network security to protect the Internet against future forms of security hazards
by
Akman, Kemal
Identitätsdiebstahl Und Identitätsmissbrauch Im Internet: Rechtliche Und Technische Aspekte
by
Stuckenberg, Carl-Friedrich, Borges, Georg, Schwenk, Jörg
Microsoft Forefront Uag 2010 Administrator's Handbook
by
Ben-Ari, Erez, Dolev, Ran
Dynamic Mixed Models for Familial Longitudinal Data
by
Sutradhar, Brajendra C.
Practical Methods for Legal Investigations: Concepts and Protocols in Civil and Criminal Cases
by
Beers
IBM Websphere Application Server V7.0 Security
by
Siliceo, Omar
Kryptographie Und It-Sicherheit: Grundlagen Und Anwendungen
by
Swoboda, Joachim, Spitz, Stephan, Pramateftakis, Michael
Intrusion Detection: A Machine Learning Approach
by
Tsai, Jeffrey J. P., Yu, Zhenwei
Computer Security
by
Gollmann, Dieter
Computer Forensics Jumpstart
by
Tittel, Ed, Solomon, Michael G., Rudolph, Kai
Security Sound Bites: Important Ideas About Security from Smart-Ass, Dumb-Ass, & Kick-Ass Quotations (2nd Edition)
by
Johnston, Roger G.
Backtrack 4: Assuring Security by Penetration Testing
by
Tedi, Heriyanto, Ali, Shakeel
Pfsense 2 Cookbook
by
Williamson, Matt
Introduction to Computer Forensics: With 33 Real Life Cases
by
Pelton, Gordon E.
Managing Information Security Risk: Organization, Mission, and Information System View
by
U. S. Department of Commerce-Nst
NIST SP 800-39 Managing Information Security Risk: March 2011
by
National Institute of Standards and Tech
Security Patch Management
by
Nicastro, Felicia
Identity-Based Encryption
by
Chatterjee, Sanjit, Sarkar, Palash
Guide to Biometrics for Large-Scale Systems: Technological, Operational, and User-Related Factors
by
Ashbourn, Julian
Healthy Passwords: Learn to make strong passwords you can remember
by
Klein, Ken S.
Voice Over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
by
Keromytis, Angelos D.
Metriken - Der Schlüssel Zum Erfolgreichen Security Und Compliance Monitoring: Design, Implementierung Und Validierung in Der PRAXIS
by
Sowa, Aleksandra
Digital Forensics with Open Source Tools
by
Carvey, Harlan, Altheide, Cory
NIST Special Publication 800-53 Information Security
by
National Institute of Standards and Tech
Data Mining and Machine Learning in Cybersecurity
by
Dua, Sumeet, Du, Xian
Securing and Sustaining the Olympic City: Reconfiguring London for 2012 and Beyond
by
Hobbs, Dick, Coaffee, Jon, Fussey, Pete
NIST SP 800-147 & -155 BIOS Protection Guidelines & BIOS Integrity Measurement: Recommendations
by
National Institute of Standards and Tech
Cyber Infrastructure Protection
by
Saadawi, Tarek, Jordan, Louis
Cloud-Computing-Security
by
Tajts, Tiberiu
IT-Sicherheit in Firmennetzwerken: Vergleich der IT-Governance Modelle Cobit(R), ITIL(R) und MOF(R)
by
Wiedner, Stefan
Introduction to Cryptography with Open-Source Software
by
McAndrew, Alasdair
Staying Safe at School
by
Bassetti, W. H. C., Quarles, Chester L., Quarles, Tammy F.
Management in der Malware-Industrie: Die zunehmende Professionalisierung auf Seiten der Malware-Industrie und ihrer Gegner
by
Kexel, Sebastian
Speech Spectrum Analysis
by
Fulop, Sean A.
Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and o
by
Scarfone, Karen, Stouffer, Keith, Falco, Joe
FIPS 140 Demystified: An Introductory Guide for Vendors
by
Potter, Ray, Higaki, Wesley Hisao
50 Tips and Tricks for MongoDB Developers: Get the Most Out of Your Database
by
Chodorow, Kristina
IT-Security und Botnetze. Aktuelle Angriffs- und Abwehrmethoden
by
Wagner, Dominik
Information Security for Automatic Speaker Identification
by
El-Samie, Fathi E. Abd
Wordpress 3 Ultimate Security
by
Connelly, Olly
Self-Learning Speaker Identification: A System for Enhanced Speech Recognition
by
Gerl, Franz, Minker, Wolfgang, Herbig, Tobias
Microsoft Windows Security Essentials
by
Gibson, Darril
Cyber Storm III
by
Department of Homeland Security
Influences on the Adoption of Multifactor Authentication
by
Libicki, Martin C.
Junos Enterprise Routing: A Practical Guide to Junos Routing and Certification
by
Marschke, Doug, Southwick, Peter, Reynolds, Harry
It-Notfallmanagement Mit System: Notfälle Bei Der Informationsverarbeitung Sicher Beherrschen
by
Schröder, Klaus-Werner, Kersten, Heinrich, Klett, Gerhard
Complete Guide to Internet Privacy, Anonymity & Security
by
Bailey, Matthew
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations
by
Jaishankar, K., Halder, Debarati
Virtual Chaos: Our Vulnerability to Cyber-Crime and How to Prevent It
by
Rohrbach, Shawn
Finding Services for an Open Architecture: A Review of Existing Applications and Programs in Peo C4i
by
Dryden, James, Connor, Kathryn, Porche, Isaac R.
Studies in Complexity and Cryptography: Miscellanea on the Interplay Between Randomness and Computation
by
Goldreich, Oded
Auditing Cloud Computing
by
Halpert, Ben
Not Again!: How The Online "Bad Guys" Get Us and How You Can Beat Them!
by
Wimer, Robert D.
Lattice Basis Reduction: An Introduction to the LLL Algorithm and Its Applications
by
Bremner, Murray R.
Secure Data Managment: 8th Vldb Workshop, Sdm 2011, Seattle, Wa, Usa, September 2, 2011, Proceedings
by
Security Risk Analysis of Enterprise Networks Using Probabilistic Atttack Graphs: Nistir 7788
by
National Institute of Standards and Tech
NIST SP 800-128 Guide for Security-Focused Configuration Management of Informati: Recomendations
by
National Institute of Standards and Tech
Einführung in Die Quanteninformatik: Quantenkryptografie, Teleportation Und Quantencomputing
by
Brands, Gilbert
The Hidden Corporation: A Data Management Security Novel
by
Schlesinger, David
Spyware
by
Harkins, John M.
Biorthogonal Systems in Banach Spaces
by
Hajek, Petr, Montesinos Santalucia, Vicente, Vanderwerff, Jon
Backtrack 5 Wireless Penetration Testing Beginner's Guide
by
Ramachandran, Vivek
Step by Step Procedure: A little Handbook for System Administrator
by
Kalingaraj, S.
How to Spot Scams Online: First Edition
by
Gower III, John
PC Viruses: Detection, Analysis and Cure
by
Solomon, Alan
Corporate Cyberwar
by
Teng, Michael
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
by
Marchette, David J.
Physical-Layer Security: From Information Theory to Security Engineering
by
Barros, João, Bloch, Matthieu
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java
by
Coffin, David
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
by
Stuttard, Dafydd, Pinto, Marcus
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
by
Chawla, Nirali Shah, Johnson, Arnold, Johnston, Ronald
Terrestrial Trunked Radio - Tetra: A Global Security Tool
by
Stavroulakis, Peter
Police Reform in China
by
Wong, Kam C.
Preventing Good People from Doing Bad Things: Implementing Least Privilege
by
Anderson, Brian, Mutch, John
Digitale Forensik und Werkzeuge zur Untersuchung wirtschaftskrimineller Aktivitäten im Umfeld von Kreditinstituten
by
Schimpf, Ralph
Email Forensics: Eliminating Spam, Scams and Phishing
by
Hatton, Les
Applied Information Security: A Hands-On Approach
by
Basin, David, Schaller, Patrick, Schläpfer, Michael
Securing the Clicks: Network Security in the Age of Social Media
by
Inasi, Jason, Bahadur, Gary, De Carvalho, Alex
Cloud Computing und Datenschutz
by
Janisch, Fabian
Privacy and Big Data: The Players, Regulators, and Stakeholders
by
Craig, Terence, Ludloff, Mary E.
Quantitative Security Risk Assessment of Enterprise Networks
by
Ou, Xinming, Singhal, Anoop
Differential Cryptanalysis of the Data Encryption Standard
by
Biham, Eli, Shamir, Adi
Security Metrics, a Beginner's Guide
by
Wong, Caroline
A critical analysis of Google's behavior towards its users in relation to the EU Data Protection Act and the US Safe Harbour Act
by
Elmers, Sven
RC4 Stream Cipher and Its Variants
by
Maitra, Subhamoy, Paul, Goutam
Web Application Security
by
Sullivan, Bryan, Liu, Vincent
The ABC of Information Security: Part One(1)
by
Asiedu, Timothy