books by subject

Computer Security

Filter by available

Firewall Architecture For Enterprise

By Crothers, Norbert

Desktop Witness: The Do's and Don'ts of Personal Computer Security: 1

By A. Caloyannides, Michael

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans

By Schweitzer, Douglas

Virtual Private Networks

By Mike Erwin, Charlie Scott, Paul Wolfe

JAVA SECURITY SOLUTIONS

By Helton, Rich

Data Security for Health Care: Management Guidelines v. 31 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

By SEISMED Consortium

Security and Control in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks)

By Hawker, Andrew

Mastering SQL Server 2000 Security (Gearhead Press)

By Young, Mike, Curtis W.

Quality for All: 4th COST 263 International Workshop on Quality of Future Internet Services, QoFIS 2003, Stockholm, Sweden, October 1-2, 2003, ... (Lecture Notes in Computer Science, 2811)

By Karlsson, Gunnar, Smirnov, Michael I.

Data Security for Health Care: User Guidelines v. 33 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

By SEISMED Consortium

Biometrics (TB): Identify Verification in a Networked World: Identity Verification in a Networked World: 13 (Technology Briefs Series)

By Nanavati, Samir, Thieme, Michael, Raj

ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache and Privacy Regulations (Networking Council)

By D. Casey, Timothy

Towards Security in Medical Telematics: Legal and Technical Aspects (Studies in Health Technology & Informatics): Vol 27 (Studies in Health Technology and Informatics)

By B. Barber, A. Treacher, K. Louwerse

Halting the Hacker: A Practical Guide to Computer Security (Hewlett-Packard Professional Books)

By Pipkin, Donald L., Hewlett-Packard Professional Books

Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share

By McCarthy, Mary Pat, Campbell, Stuart

.NET Framework Security

By Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, Kevin T. Price

Wireless Security Essentials: Defending Mobile Systems from Data Piracy

By Dean Vines, Russell

Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators & the Home Office (Electrical & Electronics Engr): A Practical ... LAN Administrators and the Home Office User

By Held, Gilbert

Local Area Network Management, Design and Security: A Practical Approach

By Mikalsen, Arne, Borgesen, Per

Protect Your Privacy on the Internet

By Pfaffenberger, Bryan

Privacy Rights (Issues S.)

By Donnellan, Craig

Apache Cookbook

By Ken Coar, Rich Bowen

Virtual Private Networks: Turning the Internet Into Your Private Network

By Mike Erwin, Charlie Scott, Paul Wolfe

Windows ServerĀ® 2008 PKI and Certificate Security (PRO-Other)

By Brian Komar

Cyber Bullying: Bullying in the Digital Age

By Kowalski, PhD Robin M.

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behaviour Changes Online

By Aiken, Mary

Windows 8 Step by Step

By Ciprian Adrian Rusen, Joli Ballew

Commonsense Computer Security: Your Practical Guide to Preventing Accidental and Deliberate Electronic Data Loss

By Smith, Martin R.

E-mail Rules - A Business Guide to Managing Policies, Security, and legal Issues for E-Mail and Digital Communication

By Flynn

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results (Tools of the Trade)

By Fletcher, Peter, Poon, Alex, Pearce, Ben