Computer Security in 2015
The Mind of the Black Hat: Understanding Today's Cyber Criminal
by
Sanchez, Dennis Paul Nino S.
Physically Unclonable Functions (Pufs): Applications, Models, and Future Directions
by
Wachsmann, Christian, Sadeghi, Ahmad-Reza
Don't Fall Victim to Identity Theft: How to Protect Your Name from Being Used Without Your Consent
by
Lewis, Brian
Healthcare Information Security and Privacy
by
Murphy, Sean P.
Oracle Database 12c Security
by
Gaetjen, Scott, Knox, David, Maroulis, William
The Hash Function Blake
by
Aumasson, Jean-Philippe, Meier, Willi, Phan, Raphael C. -W
Complete Guide to Internet Privacy, Anonymity & Security
by
Bailey, Matthew
Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day: Simple Steps to Help You Create Better Security Habits to Reduce the Risk of Bec
by
Fischer, Boaz
Managing Information Security Breaches
by
Krausz, Michael
Detecting Peripheral-Based Attacks on the Host Memory
by
Stewin, Patrick
Assessing Information Security
by
Gavrilenko, Konstantin, Michajlowski, Andrei, Vladimirov, Andrew
Trusted Computing Platforms: Tpm2.0 in Context
by
Chen, Liqun, Proudler, Graeme, Dalton, Chris
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security
by
Arthur, Will, Challener, David
Construction and Analysis of Cryptographic Functions
by
Budaghyan, Lilya
From Police to Security Professional: A Guide to a Successful Career Transition
by
D'Angelo, Michael S.
Assessing Security and Privacy Controls in Federal Information Systems and Organ: NIST SP 800-53A Revision 4 - Building Effective Assessment Plans
by
Standards, National Instituteof
NIST SP 800-163 Vetting the Security of Mobile Applications: NiST SP 800-163
by
National Institute of Standards and Tech
Spam: A Shadow History of the Internet
by
Brunton, Finn
Fundamentals of Sketch-Based Passwords: A General Framework
by
Snyder, Wesley E., Wang, Cliff, Riggan, Benjamin S.
Once More Unto the Breach, second edition
by
Simmpns, Andrea C.
Data Protection and the Cloud: Are the risks too great?
by
Ticher, Paul
Boys Password Journal
by
Speedy Publishing LLC
The Business Immunity System: The Pitfalls & Side Effects of Data Handling, Privacy Issues, & Background Checks
by
Zahidi, Rachid
Dad's & Mom's Internet Safety Do's & Don'ts: Second Edition
by
Russell, Kevin
Web Application Security is a Stack (Large Print Edition)
by
Mac Vittie, Lori
Remember!: Your Simple Solution to Keeping & Organizing Passwords
by
Schultz, V. J.
Mastering the Nmap Scripting Engine
by
Calderón Pale, Paulino
The Mobile Application Hacker's Handbook
by
Erasmus, Tyrone, Colley, Shaun, Chell, Dominic
A Novel Approach To Enhance The Performance Of Cloud Computing File System Using Load Balancing Algorithm: A Model To Enhance The Performance Of Cloud
by
Manisekaran, Pradheep
The CISO Handbook: A Practical Guide to Securing Your Company
by
Gentile, Michael, Collette, Ron, August, Thomas D.
Getting Started with Windows Server Security
by
Sivarajan, Santhosh
Learning iOS Security
by
Banks, Allister, Edge, Charles S.
Online Advertising and Hidden Hazards to Consumer Security and Data Privacy
by
Permanent Subcommittee on Investigations
Cyber Warfare: A Reference Handbook
by
Springer, Paul
Candidate Multilinear Maps
by
Garg, Sanjam
Web Security: A WhiteHat Perspective
by
Wu, Hanqing, Zhao, Liz
Requirements for The Control of Electromagnetic Interference Characteristics of Subsystems and Equipment: MiL-STD-461G
by
Department of Defense
Information Security Risk Management: Risikomanagement Mit Iso/Iec 27001, 27005 Und 31010
by
Klipper, Sebastian
Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide
by
Crawley, Don R.
Hacking Wireless Networks - The ultimate hands-on guide
by
Kolokithas, Andreas
Remember!: Your Simple Solution to Keeping & Organizing Passwords (medium size edition)
by
Schultz, V. J.
Konfliktmanagement Für Sicherheitsprofis: Auswege Aus Der "buhmann-Falle" Für It-Sicherheitsbeauftragte, Datenschützer Und Co.
by
Klipper, Sebastian
Blockchain: Blueprint for a New Economy
by
Swan, Melanie
Build a Security Culture
by
Roer, Kai
Introduction to Social Media Investigation: A Hands-On Approach
by
Golbeck, Jennifer
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
by
Wright, Joshua, Cache, Johnny
Scfm: Secure Coding Field Manual: A Programmer's Guide to OWASP Top 10 and CWE/SANS Top 25
by
Wear, Sunny
Cyber Law in the Czech Republic
by
Polčák, Radim, Čermák, Jiří, Loebl, Zbyněk
Security Issues in Mobile Nfc Devices
by
Roland, Michael
Zabbix Cookbook
by
Uytterhoeven, Patrik
Secrets and Lies: Digital Security in a Networked World
by
Schneier, Bruce
Providing Assurance to Cloud Computing through ISO 27001 Certification: How Much Cloud is Secured After Implementing Information Security Standards
by
Tariq, Muhammad Imran
Violence in Nigeria: Patterns and Trends
by
Haken, Nate, Taft, Patricia
How Data Mining Threatens Student Privacy
by
Committee on Homeland Security House of
Kali Linux Wireless Penetration Testing Beginner's Guide: Master wireless testing techniques to survey and attack wireless networks with Kali Linux
by
Ramachandran, Vivek, Buchanan, Cameron
Learning AirWatch
by
Dunkerley, Mark
Learning Puppet Security
by
Slagle, Jason
Elastix Unified Communications Server Cookbook
by
Barajas Puente, Gerardo
NISTIR 7823 Advanced Metering Infrastructure Smart Meter Upgradeability Test Fra: nistir 7823
by
National Institute of Standards and Tech
Security Technology Convergence Insights
by
Bernard, Ray
Measuring and Communicating Security's Value: A Compendium of Metrics for Enterprise Protection
by
Campbell, George
Python Hacking Essentials
by
Wish, Earnest
Seguridad en Bases de Datos y Aplicaciones Web
by
Gallardo Aviles, Gabriel
Group Theoretic Cryptography
by
Steinwandt, Rainer, González Vasco, Maria Isabel
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
by
Fincher, Michele, Hadnagy, Christopher
The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and our Democratic Process
by
Burnham, David
Proactive Botnet Detection: Through Characterization of Distributed Denial of Service Attacks
by
Hyslip, Thomas S.
One Creepy Street: The Spider on the Web
by
Jordan, Lee
Advances in Audio Watermarking Based on Singular Value Decomposition
by
Dhar, Pranab Kumar, Shimamura, Tetsuya
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family
by
Payton, Theresa, Claypoole, Ted
Agile Information Security: Using Scrum to Survive in and Secure a Rapidly Changing Environment
by
Fitzer, James R.
Hacking: Hacking Essentials, What You Must Know About Hacking
by
Boy, Hacking
What Happens on Campus Stays on YouTube: The NEW rules for your reputation on campus, online, and beyond.
by
O'Connell, Courtney, Brown, Paul Gordon, Meriwether, Jason L.
Investigation into the Cryptographic Properties of Elliptic Curves Defined over a Prime Field
by
O'Gara, Adrian
Aspect-Oriented Security Hardening of UML Design Models
by
Mouheb, Djedjiga, Pourzandi, Makan, Debbabi, Mourad
Securing SQL Server: Protecting Your Database from Attackers
by
Cherry, Denny
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
by
Chauhan, Sudhanshu, Panda, Nutan Kumar
The Tao of Open Source Intelligence
by
Bertram, Stewart
My Password Vault: All Your Passwords In One Place
by
Sargent, Sans
Password Keeper
by
Speedy Publishing LLC
Password Journal
by
Speedy Publishing LLC
My Password Journal
by
Speedy Publishing LLC
Cybersecurity Information Sharing Act of 2015
by
Select Committee on Intelligence
Beyond Cybersecurity: Protecting Your Digital Business
by
Bailey, Tucker, O'Halloran, Derek, Kaplan, James M.
Secret Password Journal
by
Speedy Publishing LLC
Pattern and Security Requirements: Engineering-Based Establishment of Security Standards
by
Beckers, Kristian
Learning Android Forensics
by
Tindall, Donnie, Tamma, Rohit
Remember!: Your Simple Solution to Keeping & Organizing Passwords (small size edition)
by
Schultz, V. J.
Spam Nation: The Inside Story of Organized Cybercrime--From Global Epidemic to Your Front Door
by
Krebs, Brian
Password Journal and Website Keeper
by
Speedy Publishing LLC
Website Address Book
by
Speedy Publishing LLC
JIRA Essentials - Third Edition
by
Li, Patrick
Two-Factor Authentication
by
Stanislav, Mark
A Guide to Enterprise Networking Technology: Volume 1
by
Devaraj, Manju
Debugging with Fiddler: The complete reference from the creator of the Fiddler Web Debugger
by
Lawrence, Eric
Smart Grid Security
by
Goel, Sanjay, Hong, Yuan, Papakonstantinou, Vagelis
Leakage Resilient Password Systems
by
Li, Yingjiu, Yan, Qiang, Deng, Robert H.
Official (Isc)2 Guide to the Cissp-Issmp Cbk
by
Steinberg, Joseph
Self- And Co-Regulation in Cybercrime, Cybersecurity and National Security
by
Tropina, Tatiana, Callanan, Cormac
Data Security: Examining Efforts to Protect Americans' Financial Information
by
Subcommittee on Financial Institutions a.
Digital and Software Piracy: A Selective Annotated Bibliography of Dissertations and Theses
by
Angelini, Zander
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
by
Siegel, Stanley, Williams, Chris K., Donaldson, Scott
Securing Systems: Applied Security Architecture and Threat Models
by
Schoenfield, Brook S. E.
Advanced Dpa Theory and Practice: Towards the Security Limits of Secure Embedded Circuits
by
Peeters, Eric
Quantum Attacks on Public-Key Cryptosystems
by
Yan, Song Y.
Hacking: Basic Security, Penetration Testing and How to Hack
by
Sharpe, Isaac
Hacking: Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide
by
Spivak, Walter
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis
by
Ucedavelez, Tony, Morana, Marco M.
Hacking: Ultimate Hacking for Beginners, How to Hack
by
McKinnon, Andrew
Nmap Essentials
by
Shaw, David
VMware vSphere Essentials
by
Kumar, Kunal
Datensicherheit und Datenschutz im Cloud Computing. Fallstudie und kritische Analyse: Dropbox und JiffyBox
by
Michl, Johannes
Protecting Privacy in Data Release
by
Livraga, Giovanni
The Theory and Reality of Wireless LAN Security: Final Year project
by
Halapacz, Tomasz
Cyber-Physical Attacks: A Growing Invisible Threat
by
Loukas, George
Hacking Into Thinking Machines
by
Sawarkar, Yash Mahesh
The Book on Healthcare IT Volume 2: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology
by
Scott, James
Forensische Analyse von Flash-Speichern: Bachelorarbeit
by
Scherer, Daniel
Learning Python Network Programming: Utilize Python 3 to get network applications up and running quickly and easily
by
Sarker, M. Omar Faruque, Washington, Sam
The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues
by
Choo, Raymond, Ko, Ryan
Python Web Penetration Testing Cookbook
by
Mound, Dave, May, Benjamin, Buchanan, Cameron
Microsoft Dynamics AX 2012 R3 Security
by
Moustafa, Ahmed Mohamed Rafik
Crafting the Infosec Playbook: Security Monitoring and Incident Response Master Plan
by
Bollinger, Jeff, Valites, Matthew, Enright, Brandon
Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution
by
Teti, Antonio
Safe Computing is Like Safe Sex: You have to practice it to avoid infection
by
Lowe, Richard, Jr.
Troubleshooting CentOS
by
Hobson, Jonathan
Managing Online Accounts: Creating, managing, and tracking Internet online accounts
by
Forlanda, Juancho