books by subject
Computer Security

E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Malware Analyst′s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code

Security Metrics: Replacing Fear, Uncertainty, and Doubt

Solving Cyber Risk: Protecting Your Company and Society

High Integrity Software: The SPARK Approach to Safety and Security

Principles of Information Systems Security: Texts and Cases

Firewall Architecture For Enterprise

Desktop Witness: The Do's and Don'ts of Personal Computer Security: 1

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans

Virtual Private Networks

JAVA SECURITY SOLUTIONS

Data Security for Health Care: Management Guidelines v. 31 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

Security and Control in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks)

Mastering SQL Server 2000 Security (Gearhead Press)

Quality for All: 4th COST 263 International Workshop on Quality of Future Internet Services, QoFIS 2003, Stockholm, Sweden, October 1-2, 2003, ... (Lecture Notes in Computer Science, 2811)

Data Security for Health Care: User Guidelines v. 33 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

Biometrics (TB): Identify Verification in a Networked World: Identity Verification in a Networked World: 13 (Technology Briefs Series)

ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache and Privacy Regulations (Networking Council)

Towards Security in Medical Telematics: Legal and Technical Aspects (Studies in Health Technology & Informatics): Vol 27 (Studies in Health Technology and Informatics)

Computer Forensics: Incident Response Essentials

Black Code: Surveillance, Privacy, and the Dark Side of the Internet

Kingdom of Lies: Adventures in cybercrime

Global Challenges for Identity Policies (Technology, Work and Globalization)

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

The .NET Developer's Guide to Windows Security

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

Metasploit: The Penetration Tester's Guide
