books by subject

Computer Security

Filter by available

Principles of Information Security

By Whitman, Michael

Smart Card Research and Advanced Applications: IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September ... Information and Communication Technology, 52...

By Domingo-Ferrer, Josep, Chan, David, Watson, Anthony

E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

By Schuler, Karen A.

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

By Sikorski, Michael, Honig, Andrew

Malware Analyst′s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code

By Ligh, Michael, Adair, Steven, Hartstein, Blake, Richard, Matthew

Security Metrics: Replacing Fear, Uncertainty, and Doubt

By Jaquith, Andrew

Solving Cyber Risk: Protecting Your Company and Society

By Coburn, Andrew, Leverett, Eireann, Woo, Gordon

High Integrity Software: The SPARK Approach to Safety and Security

By Barnes, John

Principles of Information Systems Security: Texts and Cases

By Dhillon, Gurpreet

Firewall Architecture For Enterprise

By Crothers, Norbert

Desktop Witness: The Do's and Don'ts of Personal Computer Security: 1

By A. Caloyannides, Michael

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans

By Schweitzer, Douglas

Virtual Private Networks

By Mike Erwin, Charlie Scott, Paul Wolfe

JAVA SECURITY SOLUTIONS

By Helton, Rich

Data Security for Health Care: Management Guidelines v. 31 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

By SEISMED Consortium

Security and Control in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks)

By Hawker, Andrew

Mastering SQL Server 2000 Security (Gearhead Press)

By Young, Mike, Curtis W.

Quality for All: 4th COST 263 International Workshop on Quality of Future Internet Services, QoFIS 2003, Stockholm, Sweden, October 1-2, 2003, ... (Lecture Notes in Computer Science, 2811)

By Karlsson, Gunnar, Smirnov, Michael I.

Data Security for Health Care: User Guidelines v. 33 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

By SEISMED Consortium

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

By Harper, Allen, Harris, Shon, Ness, Jonathan, Eagle, Chris, Lenkey, Gideon, Williams, Terron

Beyond Fear: Thinking Sensibly About Security in an Uncertain World

By Bruce Schneier

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance: 13 (IEEE Press Series on Information and Communication Networks Security)

By Jacobs

Computer Security (Understanding Computers S.)

By the editors of Time-Life Books, Time-Life Books, of

Black Code: Surveillance, Privacy, and the Dark Side of the Internet

By Deibert, Ronald J.

Kingdom of Lies: Adventures in cybercrime

By Fazzini, Kate

Global Challenges for Identity Policies (Technology, Work and Globalization)

By Edgar A. Whitley, Gus Hosein

Computer Forensics: Incident Response Essentials

By Kruse II, Warren G., Heiser, Jay G.

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

By Engebretson, Patrick

Hackers: Heroes of the Computer Revolution

By Levy, Steven

Windows Server® 2008 PKI and Certificate Security (PRO-Other)

By Brian Komar