books by subject
Computer Security

Principles of Information Security

Smart Card Research and Advanced Applications: IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September ... Information and Communication Technology, 52...

E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Malware Analyst′s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code

Security Metrics: Replacing Fear, Uncertainty, and Doubt

Solving Cyber Risk: Protecting Your Company and Society

High Integrity Software: The SPARK Approach to Safety and Security

Principles of Information Systems Security: Texts and Cases

Firewall Architecture For Enterprise

Desktop Witness: The Do's and Don'ts of Personal Computer Security: 1

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans

Virtual Private Networks

JAVA SECURITY SOLUTIONS

Data Security for Health Care: Management Guidelines v. 31 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

Security and Control in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks)

Mastering SQL Server 2000 Security (Gearhead Press)

Quality for All: 4th COST 263 International Workshop on Quality of Future Internet Services, QoFIS 2003, Stockholm, Sweden, October 1-2, 2003, ... (Lecture Notes in Computer Science, 2811)

Data Security for Health Care: User Guidelines v. 33 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

Beyond Fear: Thinking Sensibly About Security in an Uncertain World

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance: 13 (IEEE Press Series on Information and Communication Networks Security)

Computer Security (Understanding Computers S.)

Black Code: Surveillance, Privacy, and the Dark Side of the Internet

Kingdom of Lies: Adventures in cybercrime

Global Challenges for Identity Policies (Technology, Work and Globalization)

Computer Forensics: Incident Response Essentials

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

Hackers: Heroes of the Computer Revolution
