Computer Security in 2013
NIST SP 800-40 R3 Guide to Enterprise Patch Management Technologies: NiST SP 800-40 R3
by
National Institute of Standards and Tech
Enterprise Cyber Security: principles and practice
by
Dhillon, Gurpreet S.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
by
Engebretson, Patrick
Self-Learning Speaker Identification: A System for Enhanced Speech Recognition
by
Herbig, Tobias, Gerl, Franz, Minker, Wolfgang
Dynamic Secrets in Communication Security
by
Xiao, Sheng, Gong, Weibo, Towsley, Don
Handbook For Securing Your Home or Small Business Computer Network
by
Meyers, Andrew
Mobile Security: How to Secure, Privatize and Recover Your Devices
by
Speed, Timothy, Nykamp, Darla, Anderson, Joseph
Trustworthy Execution on Mobile Devices
by
McCune, Jonathan M., Vasudevan, Amit, Newsome, James
Web Penetration Testing with Kali Linux
by
Muniz, Joseph, Lakhani, Aamir
Cryptography Infosec Pro Guide
by
Oriyano, Sean-Philip
Introduction to Computer and Network Security: Navigating Shades of Gray
by
Brooks, Richard R.
Hacking the Human 2
by
Mann, Ian
Official (Isc)2 Guide to the Csslp Cbk
by
Paul, Mano
E-Discovery: Introduction to Digital Evidence (Book Only)
by
Godfrey, Ronald, Steuart, Christopher, Phillips, Amelia
Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models
by
Rehman, Rafeeq U.
X-Ways Forensics Practitioner's Guide
by
Zimmerman, Eric, Shavers, Brett
Online File Sharing: Innovations in Media Consumption
by
Andersson Schwarz, Jonas
Secure Information Management Using Linguistic Threshold Approach
by
Ogiela, Marek R., Ogiela, Urszula
Basic Politics of Movement Security: A Talk of Security with J. Sakai & G20 Repression & Infiltration in Toronto: An Interview with Mandy Hiscocks
by
Hiscocks, Mandy, Sakai, J.
Selinux Policy Administration
by
Vermeulen, Sven
The CEO's Manual on Cyber Security
by
Scott, James
Malware Narratives: An Introduction
by
Software Diagnostics Services, Vostokov, Dmitry
Cisco a Beginner's Guide, Fifth Edition
by
Velte, Anthony, Velte, Toby
Conduite et Maîtrise de l'Audit Informatique: La méthode CMAI
by
Hallepee, Didier
Cyber Security and It Infrastructure Protection
by
Vacca, John R.
Microsoft Directaccess Best Practices and Troubleshooting
by
Krause, Jordan
Secure IP Mobility Management for Vanet
by
Shen, Xuemin, Taha, Sanaa
Sichere Web-Anwendungen
by
Szameitat, Daniel
Sicherheit von Android-Betriebssystemen
by
Szameitat, Daniel, Haug, Martin
Kali Linux Cookbook
by
Pritchett, Willie
Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements
by
Watson, David Lilburn, Jones, Andrew
Cuckoo Malware Analysis
by
Muhardianto, Iqbal, Oktavianto, Digit
Private Information Retrieval
by
Paulet, Russell, Bertino, Elisa, Yi, Xun
The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice
by
Castrillo, Ileana, Rountree, Derrick
Business Continuity and Disaster Recovery Planning for IT Professionals
by
Rima, Chris, Snedaker, Susan
This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers
by
Greenberg, Andy
Vmware Vcloud Security
by
Sarkar, Prasenjit
Intrusion Detection for Ip-Based Multimedia Communications Over Wireless Networks
by
Tang, Jin, Cheng, Yu
IBM Mainframe Security
by
Dattani, Dinesh D.
Hardware Malware
by
Dabrowski, Adrian, Weippl, Edgar, Krieg, Christian
Security Basics for Computer Architects
by
Lee, Ruby B.
Practical Biometrics: From Aspiration to Implementation
by
Ashbourn, Julian
An Introduction to Information Security and ISO27001: 2013: A Pocket Guide
by
Watkins, Steve G.
ISO27001/ISO27002 a Pocket Guide - Second Edition: 2013
by
Calder, Alan
How to Secure Your Computer
by
Perry, William G.
Cryptographic Applications of Analytic Number Theory: Complexity Lower Bounds and Pseudorandomness
by
Shparlinski, Igor
Instant Windows PowerShell
by
Menon, Vinith
Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems
by
Lan, Pang-Chang, Kuo, C. -C Jay, Hong, Y. -W Peter
Cybercrime: Eine Gefährdung der Sicherheit im Informationszeitalter?
by
Hübert, Alexander
Femtocells: Secure Communication and Networking
by
Wong, Marcus
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
by
Winterfeld, Steve, Andress, Jason
Location Privacy Protection in Mobile Networks
by
Li, Xiaolin, Liu, Xinxin
Managing Intelligence: A Guide for Law Enforcement Professionals
by
Buckley, John
WordPress Security Fundamentals: Protect Your Website from Hackers and Identify WordPress Security Issues
by
Webster, Blake
Gns3 Network Simulation Guide
by
Welsh, Chris
Security Assessment in Vehicular Networks
by
Du, Suguo, Zhu, Haojin
Cybersecurity
by
Mowbray, Thomas J.
Distributed Denial of Service Attack and Defense
by
Yu, Shui
Security and the Networked Society
by
Glance, David, Gregory, Mark A.
Information and Network Security Management: Strategic Concept Applications
by
Adebiaye, Richmond S.
Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures
by
Pasanen, Sanna, Haataja, Keijo, Hyppönen, Konstantin
Black Code: Surveillance, Privacy, and the Dark Side of the Internet
by
Deibert, Ronald J.
Introduction to Information Security
by
Spring, Jonathan, Shimeall, Timothy
Policing Transnational Organized Crime and Corruption: Exploring the Role of Communication Interception Technology
by
Congram, M., Bell, P.
Spring Security 3.X Cookbook
by
Mankale, Anjana
Implementing Appfog
by
Nohr, Matthew
Computer Incident Response and Forensics Team Management
by
Johnson, Leighton
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters
by
Greene, James, Futral, William
Seitenkanalangriffe: Power Analysis
by
Hoffmann, Thomas
Getting Started with Fortigate
by
Rosato, Fabbri, Volpe, Fabrizio
The Case for the ISO27001: 2013 (Large Print Edition)
by
It Governance, Calder, Alan
Applied Information Security: A Hands-On Approach
by
Schläpfer, Michael, Basin, David, Schaller, Patrick
Vorratsdatenspeicherung: Zwischen Überwachungsstaat Und Terrorabwehr
by
Moser-Knierim, Antonie
Modern Cryptography Primer: Theoretical Foundations and Practical Applications
by
Kościelny, Czeslaw, Kurkowski, Miroslaw, Srebrny, Marian
Hacking with Kali: Practical Penetration Testing Techniques
by
Broad, James, Bindner, Andrew
Measuring Itsm: Measuring, Reporting, and Modeling the It Service Management Metrics That Matter Most to It Senior Executives
by
Steinberg, Randy A.
Introduction to Public Key Infrastructures
by
Wiesmaier, Alexander, Buchmann, Johannes A., Karatsiolis, Evangelos
Security Management: A Critical Thinking Approach
by
Land, Michael, Ricks, Bobby, Ricks, Truett
Instant Java Password and Authentication Security
by
Mayoral, Fernando
Applied Network Security Monitoring: Collection, Detection, and Analysis
by
Sanders, Chris, Smith, Jason
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud
by
Siepmann, Frank
Core Software Security: Security at the Source
by
Ransome, James, Misra, Anmol
Cloud Storage Forensics
by
Martini, Ben, Choo, Raymond, Quick, Darren
Border Gateway Protocol Security
by
Nist
Complete Guide to Anonymous Torrent Downloading and File-Sharing: A Practical, Step-By-Step Guide on How to Protect Your Internet Privacy and Anonymit
by
Bailey, Matthew
What Happens in Vegas Stays on YouTube: Privacy Is Dead. The New Rules of Reputation.
by
Qualman, Erik
Monitoring with Opsview
by
Wijntje, Alan
Security and Trust in Online Social Networks
by
Viviani, Marco, Carminati, Barbara, Ferrari, Elena
Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition
by
Collier, Mark, Endler, David
Spaßguerilla 2.0 oder globale Revolution?: Eine motivorientierte Analyse von Struktur, Kultur und Methoden der Anonymous-Bewegung
by
Knab, Julian
Building a Home Security System with Beaglebone
by
Pretty, Bill
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
by
Casey, Eoghan, Aquilina, James M., Malin, Cameron H.
Hackers and Crackers: Cyber-Criminal Have YOU Targeted!
by
Preston, Treat
RFID Security and Privacy
by
Deng, Robert, Bertino, Elisa, Li, Yingjiu