books by subject

Computer Security

Filter by available

E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

By Schuler, Karen A.

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

By Sikorski, Michael, Honig, Andrew

Malware Analyst′s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code

By Ligh, Michael, Adair, Steven, Hartstein, Blake, Richard, Matthew

Security Metrics: Replacing Fear, Uncertainty, and Doubt

By Jaquith, Andrew

Solving Cyber Risk: Protecting Your Company and Society

By Coburn, Andrew, Leverett, Eireann, Woo, Gordon

High Integrity Software: The SPARK Approach to Safety and Security

By Barnes, John

Principles of Information Systems Security: Texts and Cases

By Dhillon, Gurpreet

Firewall Architecture For Enterprise

By Crothers, Norbert

Desktop Witness: The Do's and Don'ts of Personal Computer Security: 1

By A. Caloyannides, Michael

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans

By Schweitzer, Douglas

Virtual Private Networks

By Mike Erwin, Charlie Scott, Paul Wolfe

JAVA SECURITY SOLUTIONS

By Helton, Rich

Data Security for Health Care: Management Guidelines v. 31 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

By SEISMED Consortium

Security and Control in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks)

By Hawker, Andrew

Mastering SQL Server 2000 Security (Gearhead Press)

By Young, Mike, Curtis W.

Quality for All: 4th COST 263 International Workshop on Quality of Future Internet Services, QoFIS 2003, Stockholm, Sweden, October 1-2, 2003, ... (Lecture Notes in Computer Science, 2811)

By Karlsson, Gunnar, Smirnov, Michael I.

Data Security for Health Care: User Guidelines v. 33 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

By SEISMED Consortium

Biometrics (TB): Identify Verification in a Networked World: Identity Verification in a Networked World: 13 (Technology Briefs Series)

By Nanavati, Samir, Thieme, Michael, Raj

ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache and Privacy Regulations (Networking Council)

By D. Casey, Timothy

Towards Security in Medical Telematics: Legal and Technical Aspects (Studies in Health Technology & Informatics): Vol 27 (Studies in Health Technology and Informatics)

By B. Barber, A. Treacher, K. Louwerse

Computer Forensics: Incident Response Essentials

By Kruse II, Warren G., Heiser, Jay G.

Black Code: Surveillance, Privacy, and the Dark Side of the Internet

By Deibert, Ronald J.

Kingdom of Lies: Adventures in cybercrime

By Fazzini, Kate

Global Challenges for Identity Policies (Technology, Work and Globalization)

By Edgar A. Whitley, Gus Hosein

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

By Harper, Allen, Harris, Shon, Ness, Jonathan, Eagle, Chris, Lenkey, Gideon, Williams, Terron

The .NET Developer's Guide to Windows Security

By Brown, Keith

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

By O'Connor, Tj

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

By Shimonski, Robert

Metasploit: The Penetration Tester's Guide

By Kennedy, David, O'Gorman, Jim, Kearns, Devon

BackTrack 5 Cookbook

By Willie Pritchett, David De Smet