Computer Security in 2013
Locally Decodable Codes and Private Information Retrieval Schemes
by
Yekhanin, Sergey
PRAGMATIC Security Metrics: Applying Metametrics to Information Security
by
Hinson, Gary, Brotby, W. Krag
Effective Monitoring and Alerting: For Web Operations
by
Ligus, Slawek
Comp Arch Security C
by
Wang, Shuangbao Paul, Ledley, Robert S.
Juniper Networks Warrior
by
Southwick, Peter
Wireless Network Securities
by
Weiser, Eugene
Arquitectura de Seguridad Informática: Un manual para gerentes, directores y consultores
by
Castro Reynoso, Sergio
Darknet: A Beginner's Guide to Staying Anonymous Online
by
Henderson, Lance
C(I)SO - And Now What?: How to Successfully Build Security by Design
by
Oberlaender, Michael S.
Microsoft Forefront Uag Mobile Configuration Starter
by
Volpe, Fabrizio
Comp Cryptography C
by
Yan, Song Y.
Cybersecurity
by
Office, Government Accountability
Cybresecurity: Selected Legal Issues
by
Dolan, Alissa M., Stevens, Gina, Ruane, Kathleen Ann
Securing Cloud and Mobility: A Practitioner's Guide
by
Hourani, Paul, Lim, Ian, Coolidge, E. Coleen
WordPress Security: Protection from Hackers
by
Klein, Lambert
Cloud Computing Protected: Security Assessment Handbook
by
Rhoton, John
The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online
by
Cherry, Denny
The Little Book of Cloud Computing SECURITY, 2013 Edition
by
Nielsen, Lars
Mobile Access Safety: Beyond Byod
by
Assing, Dominique, Calé, Stéphane
The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud
by
Rocha, Francisco, Abreu, Salvador, Correia, Miguel
Governance and Internal Controls for Cutting Edge It
by
Worstell, Karen F.
Instant Citrix Security How-to
by
Jacob, Carmel
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
by
Shavers, Brett
What's My Password?
by
Speciale, Corbett
Computational Number Theory
by
Das, Abhijit
Applied Cyber Security and the Smart Grid: Implementing Security Controls Into the Modern Power Infrastructure
by
Knapp, Eric D., Samani, Raj
Information Security Policy Development for Compliance: Iso/Iec 27001, Nist Sp 800-53, Hipaa Standard, PCI Dss V2.0, and Aup V5.0
by
Williams, Barry L.
Instant Apple Configurator How-to
by
D. Houston, Timothy, Jr., Stephen Edge, Charles, Jr.
Secret History: The Story of Cryptology
by
Bauer, Craig P.
Security for Wireless Implantable Medical Devices
by
Hei, Xiali, Du, Xiaojiang
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Fiel
by
Malin, Cameron H., Casey, Eoghan, Aquilina, James M.
The Practical Guide to Hipaa Privacy and Security Compliance
by
Beaver, Kevin, Herold, Rebecca
Network Security Traceback Attack and React in the United States Department of Defense Network
by
Machie, Edmond K.
Network Security Traceback Attack and React in the United States Department of Defense Network
by
Machie, Edmond K.
Crisis Management at the Speed of the Internet: Trend Report
by
Kotwica, Kathleen, Hayes, Bob
From One Winning Career to the Next: Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line
by
Quilter, J. David
Nine Practices of the Successful Security Leader: Research Report
by
Hayes, Bob, Kotwica, Kathleen
Advanced Dpa Theory and Practice: Towards the Security Limits of Secure Embedded Circuits
by
Peeters, Eric
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
by
Van Tilborg, Henk C. a.
Advances in Cyber Security: Technology, Operations, and Experiences
by
Hsu, D. Frank, Marinucci, Dorothy
Advances in Cyber Security: Technology, Operations, and Experiences
by
Hsu, D. Frank, Marinucci, Dorothy
Business Continuity: Playbook
by
Hayes, Bob, Kotwica, Kathleen
Darknet Ecosystems: Surfacing Underground Economies
by
Pritchard, Michael J.
Android Security: Attacks and Defenses
by
Misra, Anmol, Dubey, Abhishek
Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training
by
Upton, David, Trim, Peter
Spam-Filter - Mechanismen und Algorithmen, Chancen und Gefahren: Einführung Spambekämpfung
by
Mösinger, Alexander
Computer Forensics InfoSec Pro Guide
by
Cowen, David
Critical Infrastructure System Security and Resiliency
by
Vugrin, Eric, Warren, Drake, Biringer, Betty
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure
by
Rountree, Derrick
Instant Traffic Analysis with Tshark How-to
by
Merino, Borja
Solarwinds Orion Network Performance Monitor
by
Dissmeyer, Joseph
Dynamic Mixed Models for Familial Longitudinal Data
by
Sutradhar, Brajendra C.
Expert Oracle Application Express Security
by
Spendolini, Scott
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach
by
Peng Ning, Jajodia, Sushil, Wang, Xiaoyang Sean
America is Under Cyber Attack: Why Urgent Action is Needed
by
Subcommittee on Oversight, Investigation
Quantum Attacks on Public-Key Cryptosystems
by
Yan, Song Y.
Privacy for Location-Based Services
by
Ghinita, Gabriel
Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
by
Shinder, Thomas W., Diogenes, Yuri, Littlejohn Shinder, Debra
Optical Coding Theory with Prime
by
Kwong, Wing C., Yang, Guu-Chang
Oracle Weblogic Server 12c Advanced Administration Cookbook
by
Iwazaki, Dalton
Guide to the De-Identification of Personal Health Information
by
El Emam, Khaled
Iris Biometric Model for Secured Network Access
by
Khoury, Franjieh El
The Zealots Guide To Computer Security 2013
by
Taylor, Brian
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic
by
Shimonski, Robert
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
by
Mohammed, Mohssen, Pathan, Al-Sakib Khan
It-Sicherheitsmanagement Nach ISO 27001 Und Grundschutz: Der Weg Zur Zertifizierung
by
Reuter, Jürgen, Kersten, Heinrich
Backtrack - Testing Wireless Network Security
by
Cardwell, Kevin
NISTIR 7298 r2 Glossary of Key Information Security Terms: NISTIR 7298 r2
by
National Institute of Standards and Tech
Defending an Open, Global, Secure, and Resilient Internet
by
Palmisano, Samuel J., Segal, Adam, Negroponte, John D.
You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets
by
Webb, William
Discrete Dynamical Systems and Chaotic Machines: Theory and Applications
by
Guyeux, Christophe, Bahi, Jacques
The Benefits and Security Risks of Web-Based Applications for Business: Trend Report
by
Kotwica, Kathleen
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend
by
Griffin, Dan
Potential for Data Loss from Security Protected Smartphones: Investigate how to use protective security measures from the PC world to secure Smartphon
by
Rajole, Vikas
Using Security Patterns in Web-Application
by
Alam, Shahnawaz
Cyber Crime Protection for Beginners: The Battle Against Cyber Crime in the 21st Century
by
Taiwo, Felix
Android Malware
by
Jiang, Xuxian, Zhou, Yajin
Linguistic Identity Matching
by
Meyer, Victoria, Lisbach, Bertrand
Network Anomaly Detection: A Machine Learning Perspective
by
Bhattacharyya, Dhruba Kumar, Kalita, Jugal Kumar
Android Application Security Essentials
by
Rai, Pragati
Cyber Crime & Warfare: All That Matters
by
Warren, Peter
The Beginner's Guide to the Internet Underground
by
Martin, Jeremy
Security for Cloud Storage Systems
by
Yang, Kan, Jia, Xiaohua
Stop Cyber Crime from Ruining Your Life!: Sixty Secrets to Keep You Safe
by
James, Cynthia
Handbook of Communications Security
by
Garzia, F.
Cryptography in C and C++
by
Welschenbach, Michael
Access Control, Authentication, and Public Key Infrastructure: Print Bundle
by
Ballad, Tricia, Chapple, Mike, Ballad, Bill
Sicherheit in SIP-basierten VoIP-Netzen
by
Sauer, Michael
Botnets
by
Tiirmaa-Klaar, Heli, Gassen, Jan, Gerhards-Padilla, Elmar
Ten Successful Ways to Keep Windows Secure: The Windows Maintenance Guide
by
Maluth, John Monyjok
Automated Biometrics: Technologies and Systems
by
Zhang, David D.
Vmware View Security Essentials
by
Langenhan, Daniel
Dissecting the Ethical Hacker: A guide for the Wine'n Cheese Crowd (a.k.a. Suits & Technology Executives)
by
Willburn, Michael
Speech Spectrum Analysis
by
Fulop, Sean A.
Active Directory Cookbook: Solutions for Administrators & Developers
by
Svidergol, Brian, Allen, Robbie
Sicherheit in Kommunikationsnetzen
by
Sorge, Christoph, Lo Iacono, Luigi, Gruschka, Nils
Hackers and Hacking: A Reference Handbook
by
Holt, Thomas, Schell, Bernadette
Practical Paranoia: OS X Security Essentials for Home and Business: The easy step-by-step guide to hardening your OS X security
by
Mintz, Marc L.
Practical Anonymity: Hiding in Plain Sight Online
by
Loshin, Peter
Instant Ossec Host-Based Intrusion Detection System
by
Lhotsky, Brad
Android Security Cookbook
by
Makan, Keith
Hacking Exposed Mobile: Security Secrets & Solutions
by
Rouse, Jason, Bergman, Neil, Stanfield, Mike