Computer Security in 2014
Drugs on the Dark Net: How Cryptomarkets Are Transforming the Global Trade in Illicit Drugs
by
Martin, J.
Cybersecurity and Cyberwar: What Everyone Needs to Know(r)
by
Friedman, Allan, Singer, P. W.
Mobile Platform Security
by
Dmitrienko, Alexandra, Asokan, N., Davi, Lucas
Cyber-War: The Anatomy of the Global Security Threat
by
Richards, J.
Surveillance and Threat Detection: Prevention Versus Mitigation
by
Kirchner, Richard
Internet and the Law: Technology, Society, and Compromises
by
Schwabach, Aaron
Password Keeper: Password Reminder Book (Keyboard Cover)
by
Journals, Cool
What Is Computer Science?: An Information Security Perspective
by
Smart, Nigel, Page, Daniel
NSA, BND & Co.: Die Möglichkeiten der Geheimdienste: Technik, Auswertung, Gegenmaßnahmen
by
Brands, Gilbert
Computer Security: Bibliography Of Selected Computer Security Publications January 1980-October 1989
by
Nist
Anonymizing Health Data: Case Studies and Methods to Get You Started
by
Arbuckle, Luk, Emam, Khaled El
Introduction to Biometrics
by
Jain, Anil K., Ross, Arun A., Nandakumar, Karthik
The Privacy Engineer's Manifesto: Getting from Policy to Code to Qa to Value
by
Finneran, Tom, Dennedy, Michelle, Fox, Jonathan
419 the Cyberscam Game: Knowing the Hidden Corners of Their Lives
by
Fonba Jf, Jules Fonba
Anti-Hacker Tool Kit, Fourth Edition
by
Shema, Mike
Sicherheit Und Vertrauen Im Internet: Eine Technische Perspektive
by
Sack, Harald, Meinel, Christoph
Unmasking the Social Engineer: The Human Element of Security
by
Hadnagy, Christopher
Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation
by
Gazet, Alexandre, Bachaalany, Elias, Dang, Bruce
Threat Modeling: Designing for Security
by
Shostack, Adam
Recommendation for Key Management - Part 2: Best Practices for Key Management Organization
by
Barker, William, Burr, William, Barker, Elaine
Communication Networks for Smart Grids: Making Smart Grid Real
by
Budka, Kenneth C., Deshpande, Jayant G., Thottan, Marina
Gitolite Essentials
by
Chamarty, Sitaram
Computer Security: Adware or spyware removal and protection
by
Hicks, Allen E.
Penetration Testing with Backbox
by
Umit Uygur, Stefan
Identifying Denial of Service attacks and appropriate mitigation strategies for Small to Medium Sized Enterprises
by
Reed, Andy
Achieving Higher-Fidelity Conjunction Analyses Using Cryptography to Improve Information Sharing
by
Baiocchi, Dave, Welser, William, IV, Hemenway, Brett
Cyber Escroquerie: L`art Spectaculaire De FOUR-ONE-NINE
by
Fonba, Jules
Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency: Is Hollywood's blueprint for Chaos coming true
by
Osborne, Mark
Reversible Digital Watermarking: Theory and Practices
by
Chakraborty, Rajat Subhra, Naskar, Ruchira
Mobility Data Management and Exploration
by
Pelekis, Nikos, Theodoridis, Yannis
ELSTER - Die elektronische Steuererklärung
by
Dieter, Susanne
Cloud Encrypted storage system and method, Attendance Management System: Provisional application #61875050
by
Liubachev, Mikhail Leonidovich
The Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk
by
Young, Carl
DODI No 8500.01 Cybersecurity: DODI No. 8500.01
by
Department of Defense
Learning Pentesting for Android
by
Gupta, Aditya
A Cryptography Primer: Secrets and Promises
by
Klein, Philip N.
A Cryptography Primer: Secrets and Promises
by
Klein, Philip N.
Network Hardening: An Automated Approach to Improving Network Security
by
Albanese, Massimiliano, Jajodia, Sushil, Wang, Lingyu
Extending Symfony 2 Web Application Framework
by
Armand, Sebastien
The Browser Hacker's Handbook
by
Orru, Michele, Alcorn, Wade, Frichot, Christian
Cryptography and Secure Communication
by
Blahut, Richard E.
Praktische ASP.NET Forms, MVC, Web API & SignalR Sicherheitstipps: Sicherheitsanalyse von Microsoft Komponenten
by
Szameitat, Daniel
Android Hacker's Handbook
by
Lanier, Zach, Mulliner, Collin, Drake, Joshua J.
Building the Infrastructure for Cloud Security: A Solutions View
by
Castro-Leon, Enrique, Yeluri, Raghuram
Kali Linux - Assuring Security by Penetration Testing: With Kali Linux you can test the vulnerabilities of your network and then take steps to secure
by
Allen, Lee, Ali, Shakeel, Heriyanto, Tedi
Framework for Improving Critical Infrastructure Cybersecurity
by
National Institute of Standards and Tech
Protecting Oracle Database 12c
by
Wright, Paul
Collaboration with Cloud Computing: Security, Social Media, and Unified Communications
by
Messier, Ric
The Nsa Report: Liberty and Security in a Changing World
by
Clarke, Richard A., Morell, Michael J., President's Review Group on Intelligence and Communications
Learning Veeam(r) Backup and Replication for Vmware Vsphere
by
Mohn, Christian
Security for Service Oriented Architectures
by
Williams, Walter
Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense
by
Ackroyd, Richard, Watson, Gavin, Mason, Andrew
Unimodal and Multimodal Biometric Data Indexing
by
Dey, Somnath, Samanta, Debasis
Password Journal
by
Speedy Publishing LLC
PCI Compliance: The Definitive Guide
by
Bhargav, Abhay
Cyberwar, Cyberterror, Cybercrime: An In-Depth Guide to the Role of Standards in the Cybersecurity Environment - Second Edition
by
Mehan, Julie E.
To implement a Multi-level Security in Cloud Computing using Cryptography Novel Approach: Security in Cloud Computing
by
Dhivakar, Ashwin
ForensicsNet?/ForensicsLab?: Cyber Security in a Cloud!
by
Preston, Treat
Mastering Kali Linux for Advanced Penetration Testing
by
Beggs, Robert
Mastering Metasploit
by
Jaswal, Nipun
Qc-Ldpc Code-Based Cryptography
by
Baldi, Marco
No Trace Left: Internet Privacy Tips and Strategies to Protect Your Personal and Financial Information
by
Simmons, Rj
Querying Over Encrypted Data in Smart Grids
by
Lu, Rongxing, Liang, Xiaohui, Wen, Mi
Disaster Recovery Using Vmware Vsphere(r) Replication and Vcenter Site Recovery Manager
by
Gb, Abhilash
Information Security Breaches: Avoidance and Treatment Based on Iso27001 - Second Edition
by
Krausz, Michael
Secure Data Management: 10th Vldb Workshop, Sdm 2013, Trento, Italy, August 30, 2013, Proceedings
by
Computer Forensics and Digital Investigation with EnCase Forensic v7
by
Widup, Suzanne
Stuxnet: The True Story of Hunt and Evolution
by
Poroshyn, Roman
To the Cloud: Big Data in a Turbulent World
by
Mosco, Vincent
To the Cloud: Big Data in a Turbulent World
by
Mosco, Vincent
NISTIR 7924 Reference Certificate Policy: Draft
by
National Institute of Standards and Tech
Game Theory Applications in Network Design
by
Kim, Sungwook
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
by
Parno, Bryan Jeffrey
The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice
by
Andress, Jason
Your Digital Footprint: Password Protection Requirements
by
Hudkins, Ronald E.
Configuration Management with Chef-Solo
by
Ur Rahman, Naveed
Building Virtual Pentesting Labs for Advanced Penetration Testing
by
Cardwell, Kevin
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
by
Robichau, Bernard Peter
Penetration Testing: A Hands-On Introduction to Hacking
by
Weidman, Georgia
The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law
by
Air Command and General Staff College
Electronic Identity
by
Chen-Wilson, Lisha, Argles, David, De Andrade, Norberto Nuno Gomes
Praxisleitfaden Zur Implementierung Eines Datenschutzmanagementsystems: Ein Risikobasierter Ansatz Für Alle Unternehmensgrößen
by
Matz, Manuela, Wiedemann, Michael, Loomans, Dirk
Internet Censorship: A Reference Handbook
by
Schell, Bernadette
Ensuring Survivable Information Services: Architecting, Diagnosing and Reconfiguring
by
Air Force Research Laboratory
When is a Hack an Attack? A Sovereign State's Options if Attacked in Cyberspace: A Case Study of Estonia
by
Air Command and Staff College
Information Security - Weaknesses Place Commerce Data and Operations at Serious Risk
by
United States General Accounting Office
The Zealots Guide To Linux Mint Special Edition
by
Taylor, Brian
CyberCrime - A Clear and Present Danger: The CEO's Guide to Cyber Security
by
Smith, Roger W.
Electronic Authentication Guideline
by
Dodson, Donna F., Newton, Elaine M., Perlen, Ray a.
Wireless Multimedia Communication Systems: Design, Analysis, and Implementation
by
Bakmaz, Bojan M., Rao, K. R., Bojkovic, Zoran S.
The Book on Healthcare IT: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology
by
Scott, James
SharePoint 2010 Security for the Site Owner: and for Administrators and Developers!
by
Smith, Michael T.
Cloud Computing im Mittelstand. Vertrauensbasis und IT-Sicherheit als zentrale Erfolgsfaktoren
by
Harnau, Yvonne
Pervasive Wireless Environments: Detecting and Localizing User Spoofing
by
Chen, Yingying, Trappe, Wade, Yang, Jie
Cybersecurity: Authoritative Reports and Resources, by Topic
by
Tehan, Rita
Network Intrusion Analysis
by
Fichera, Joe
Architecting User-Centric Privacy-As-A-Set-Of-Services: Digital Identity-Related Privacy Framework
by
Ben Ayed, Ghazi
Jqueryfordesigners: Beginner'sguide
by
Maclees, Natalie
Cybersecurity: Being Cyber Aware and Cyber Safe
by
Morimoto, Rand
Restfuljavawebservicessecurity
by
Salazar, Andres, Reneenriquez, Rene
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
by
Case, Andrew, Levy, Jamie, Hale Ligh, Michael
Hackers Underground Knowledge: Quick and easy way to learn secret hacker techniques
by
Kohler, Martin
Iso27001 in a Windows Environment
by
Honan, Brian
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
by
Murdoch Gse, Don
Incident Response & Computer Forensics
by
Pepe, Matthew, Luttgens, Jason T., Mandia, Kevin
Social Engineering in It Security: Tools, Tactics, and Techniques
by
Conheady, Sharon
Ethical Hacking and Penetration Testing Guide
by
Baloch, Rafay
United States Cybersecurity Strategy, Policy, and Organization: Poorly Postured to Cope with a Post-9/11 Security Environment
by
U. S. Army Command and General Staff Coll
Drugs on the Dark Net: How Cryptomarkets Are Transforming the Global Trade in Illicit Drugs
by
Martin, J.
Effective Child Abuse Investigation for the Multi-Disciplinary Team
by
Graham, Bradley Richard
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
by
Ruan, Xiaoyu
The Algorithmic Foundations of Differential Privacy
by
Dwork, Cynthia, Roth, Aaron
Soliton Coding for Secured Optical Communication Link
by
Alavi, Sayed Ehsan, Mahdaliza Idrus, Sevia, Sadegh Amiri, Iraj
Intrusion Detection System in mobile ad hoc network in MAC layer
by
Gondaliya, Tapan
Kali Linux Network Scanning Cookbook
by
Hutchens, Justin
Cyberspace and Cybersecurity: Chinese translation
by
Kostopoulos, George K.