Computer Security in 2012
CRIME On eBay
by
Ford, Michael
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
by
Six, Jeff
Corporate Cyberwar (Mandarin)
by
Teng, Dr Michael
An Introduction to Hacking and Crimeware: A Pocket Guide
by
Loewengart, Victoria
Microsoft Windows Intune 2.0: QuickStart Administration
by
Overton, David
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
by
U. S. Department of Commerce-Nist
Online Child Safety: Law, Technology and Governance
by
Savirimuthu, Joseph
Mehr It-Sicherheit Durch Pen-Tests: Optimierung Der It-Sicherheit Durch Gelenktes "Hacking" -- Von Der Planung Über Die Vertragsgestaltung Zur Realisi
by
Thumann, Michael, Rey, Enno
Mike Meyers' Comptia Network+ Guide to Managing and Troubleshooting Networks Lab Manual, 3rd Edition (Exam N10-005)
by
Meyers, Mike, Haley, Dennis
Mastering Microsoft Forefront Uag 2010 Customization
by
Ben-Ari, Erez, Amara, Rainier
Liars and Outliers: Enabling the Trust That Society Needs to Thrive
by
Schneier, Bruce
Noiseless Steganography: The Key to Covert Communications
by
Desoky, Abdelrahman
Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
by
Zdziarski, Jonathan
Shields Up: Complete Guide to Windows Security and Mac Privacy
by
Cornwell, Liz
Role Mining in Business: Taming Role-Based Access Control Administration
by
Di Pietro, Roberto, Colantonio, Alessandro, Ocello, Alberto
Network Intrusion Detection and Prevention: Concepts and Techniques
by
Lu, Wei, Ghorbani, Ali A., Tavallaee, Mahbod
The Holistic Operational Readiness Security Evaluation: HORSE Project Series: Governance Documentation and Information Technology Security Policies De
by
Peters, Michael D.
Guidelines for Securing Wireless Local Area Networks (WLANS)
by
U. S. Department of Commerce, Souppaya, Murugiah, Scarfone, Karen
Entzifferte Geheimnisse: Methoden Und Maximen Der Kryptologie
by
Bauer, Friedrich L.
Security in Embedded Devices
by
Gebotys, Catherine H.
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
by
Chappell, Laura
21st Century Chinese Cyberwarfare
by
Hagestad, William T.
Algebraic and Stochastic Coding Theory
by
Kythe, Prem K., Kythe, Dave K.
Click Fraud - Analyse und Methode zur Identifzierung
by
Diesenbacher, Otto
Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security
by
Bowen, Pauline, Hash, Joan, Wilson, Mark
Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology: NIST Special Publication 800-95
by
Scarfone, Karen, Winograd, Theodore, Singhal, Anoop
Sicherheitsanalyse Webserver
by
Hofer, Reinhard
Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special
by
Hash, Joan, Smith, Jonathan, Korow-Diks, Karen
Information Security Management: Global Challenges in the New Millennium
by
Dhillon, Gurpreet S.
Innovations in Digital Watermarking Techniques
by
Wang, Feng-Hsing
Software Similarity and Classification
by
Cesare, Silvio, Xiang, Yang
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System
by
Blunden, Bill
A Survey of Data Leakage Detection and Prevention Solutions
by
Elovici, Yuval, Rokach, Lior, Shabtai, Asaf
Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development
by
Kleidermacher, David, Kleidermacher, Mike
Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology: Special Publication 800-92
by
Kent, Karen, Souppaya, Murugiah
Today's Impact on Communication System by IP Spoofing and Its Detection and Prevention
by
Linta, Sharmin Rashid, Khan, MD Ridgewan
Analyse von TK-Anlagen unter Sicherheitsanforderungen
by
Steinmann, Michael
How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone
by
Cambridge, Rodney D.
Computer, Network, Soft & Hard
by
Schneidewind, Norman F.
Crittografia Nel Paese Delle Meraviglie
by
Venturi, Daniele
Cyber War: The Next Threat to National Security and What to Do about It
by
Clarke, Richard A., Knake, Robert
Informationssicherheit: Implementierung eines zertifizierten ISMS nach ISO27001 für IT-Dienstleister
by
Groß, Markus
Cloud Computing Assessing the Risks
by
Carstensen, Jared, Golden, Bernard, It Governance
Enabling Programmable Self with Healthvault: An Accessible Personal Health Record
by
Bhandari, Vaibhav
Cryptographic Protocol: Security Analysis Based on Trusted Freshness
by
Chen, Kefei, Dong, Ling
Cyber Security Policy Guidebook
by
Healey, Jason, Rohmeyer, Paul, Bayuk, Jennifer L.
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
by
Mitnick, Kevin
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
by
Allen, Lee
Cyber Forensics
by
Marcella, Albert J., Guillossou, Frederic
The Little Black Book of Computer Security, Second Edition
by
Dubin, Joel
Permutation Complexity in Dynamical Systems: Ordinal Patterns, Permutation Entropy and All That
by
Amigó, José
Ethical and Social Issues in the Information Age
by
Kizza, Joseph Migga
Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)
by
Clarke, Nathan, Furnell, Steven
Instant Messaging and Cross Site Scripting (XSS)
by
Kurek, Katharina
The Illusion of Intimacy: Problems in the World of Online Dating
by
Bridges, John
802.11n: A Survival Guide: Wi-Fi Above 100 Mbps
by
Gast, Matthew S.
Wireless Network Security a Beginner's Guide
by
Wrightson, Tyler
Communication System Security
by
Chen, Lidong, Gong, Guang
The 7 Qualities of Highly Secure Software
by
Paul, Mano
Cloud Computing Synopsis and Recommendations
by
U. S. Department of Commerce, Patt-Corner, Robert, Grance, Tim
Anonymous Security Systems and Applications: Requirements and Solutions
by
Tamura, Shinsuke
Guidelines on Security and Privacy in Public Cloud Computing
by
Jansen, Wayne, Grance, Timothy, And Technology, National Institute of St
Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology
by
Grance, Tim, Patt-Corner, Robert, Voas, Jeff
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
by
Theohary, Catherine a., Finklea, Kristin M.
Network Forensics: Tracking Hackers Through Cyberspace
by
Ham, Jonathan, Davidoff, Sherri
Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
by
Petrovska-Delacretaz, Dijana, Dorizzi, Bernadette, Kanade, Sanjay
Mastering Windows Network Forensics and Investigation
by
Anson, Steve, Bunting, Steve, Johnson, Ryan
Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i: Recommendations of the National Institute of Standards and Technology (Specia
by
Eydt, Bernard, Owens, Les, Scarfone, Karen
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1)
by
Scarfone, Karen, Chen, Lily, Padgette, John
Identity Theft and Fraud: Evaluating and Managing Risk
by
Yuan, Yufei, Archer, Norm, Sproule, Susan
Wireless LAN Security in a SOHO Environment: A Holistic Approach
by
Wimmer, Christian
Cloud Security and Control
by
Griffin, Dan
Wirtschaftsspionage Und Intelligence Gathering: Neue Trends Der Wirtschaftlichen Vorteilsbeschaffung
by
Tsolkas, Alexander, Wimmer, Friedrich
Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology (Special Publication 800-63-1)
by
Newton, Elaine M., Perlner, Ray a., Dodson, Donna F.
BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology (Special Publication 800-147)
by
Polk, William, Regenscheid, Andrew, Souppaya, Murugiah
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2: Recommendations of the National Institute of Standa
by
Halbardier, Adam, Scarfone, Karen, Quinn, Stephen
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher: NIST Special Publication 800-67, Revision 2
by
Commerce, U. S. Department of, And Technology, National Institute of St, Barker, Elaine
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations: National Institute of Standards and Technology Sp
by
Chawla, Nirali Shah, Johnson, Arnold, Johnston, Ronald
Mobile Forensic Reference Materials: A Methodology and Reification (NIST IR 7617)
by
Delaitre, Aurelien, Jansen, Wayne
NIST Handbook 150-17, NVLAP (National Voluntary Laboratory Accreditation Program) Cryptographic and Security Testing
by
Commerce, U. S. Department of, And Technology, National Institute of St, Leaman, Dana S.
Guide for Security-Focused Configuration Management of Information Systems: The National Institute of Standards and Technology Special Publication 800
by
Ross, Ron, Gupta, Sarbari, Dempsey, Kelley
Der Hackerbegriff in den Medien: Ein Diskurs
by
Witte, Randy
Street Cryptography: A Quick and Dirty Way to Maintain Your Secret Conspiracy
by
Forrest, Christopher
Cybersecurity: Selected Legal Issues
by
Dolan, Alissa M., Stevens, Gina, Ruane, Kathleen Ann
Cybersecurity: Authoritative Reports and Resources
by
Tehan, Rita
Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)
by
Chappell, Laura
Data Protection from Insider Threats
by
Bertino, Elisa
Webserver Security
by
Ermolin, Pavel
Reverse Deception: Organized Cyber Threat Counter-Exploitation
by
Carpenter, Gregory, Kilger, Max, Bodmer, Sean M.
Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with Scap
by
Witte, Greg, Cook, Melanie, Kerr, Matt
Secure Data Management: 9th Vldb Workshop, Sdm 2012, Istanbul, Turkey, August 27, 2012, Proceedings
by
Policing Cyber Hate, Cyber Threats and Cyber Terrorism
by
Blakemore, Brian
Safeguarding Critical E-Docume
by
Smallwood, Robert F.
Hacking Exposed 7: Network Security Secrets and Solutions
by
Scambray, Joel, McClure, Stuart, Kurtz, George
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
by
McCarthy, N. K., Todd, Matthew, Klaben, Jeff
The Legal Challenges of Global Cyberspace: Why National Regulations Fail to Protect Digital Assets on Cyberspace
by
Mishago, Tilahun
Cloud Computing
by
Adams, Randee, Bauer, Eric
Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática
by
Castro Reynoso, Sergio
Digital Forensics for Handheld Devices
by
Doherty, Eamon P.
Mobile Authentication: Problems and Solutions
by
Jakobsson, Markus
Concepts and Case Studies in Threat Management
by
Calhoun, Frederick S., Weston J. D., Stephen W.
Microsoft Forefront Identity Manager 2010 R2 Handbook
by
Nordstr M., Kent
Recommendation for Applications Using Approved Hash Algorithms: NIST Special Publication 800-107 Revision 1
by
Dang, Quynh, U. S. Department of Commerce
SP 800-61 R 2 Computer Security Incident Handling Guide: August 2012
by
National Institute of Standards and Tech
Computer Security Incident Handling Guide: NIST Special Publication 800-61, Revision 2
by
Mllar, Tom, Scarfone, Karen, Grance, Tim