books by subject
Computer Security

Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management): 69

Trading on the Edge: Neural, Genetic, and Fuzzy Systems for Chaotic Financial Markets: 39 (Wiley Finance)

Mac OS X Hacks: 100 Industrial-Strength Tips & Tricks

Wireless Hacks: 100 Industrial-Strength Tips & Tools: 100 Industrial Strength Tips and Tools

Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers: 3357 (Lecture Notes in Computer Science, 3357)

Handbook of Fingerprint Recognition (Springer Professional Computing)

Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation (Information Science and Statistics)

The Digital Person: Technology and Privacy in the Information Age: 1 (Ex Machina: Law, Technology, and Society)

Open Source Intelligence Investigation: From Strategy to Implementation (Advanced Sciences and Technologies for Security Applications)

Cyberspace: Risks and Benefits for Society, Security and Development (Advanced Sciences and Technologies for Security Applications)

Cyber Security: Power and Technology: 93 (Intelligent Systems, Control and Automation: Science and Engineering, 93)

Exploring the Security Landscape: Non-Traditional Security Challenges (Advanced Sciences and Technologies for Security Applications)

Cyber Security: Analytics, Technology and Automation: 78 (Intelligent Systems, Control and Automation: Science and Engineering, 78)

Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities (Advanced Sciences and Technologies for Security Applications)

Cyber Weaponry: Issues and Implications of Digital Arms (Advanced Sciences and Technologies for Security Applications)

Technology and the Intelligence Community: Challenges and Advances for the 21st Century (Advanced Sciences and Technologies for Security Applications)

Medical Imaging and its Security in Telemedicine Applications (SpringerBriefs in Applied Sciences and Technology)

Firewalls and Internet Security: Repelling the Wily Hacker: Repelling the Wily Hacker (2nd Edition) (Addison-Wesley Professional Computing Series)

CCNA Security Exam Cram (Exam IINS 640-553)

Intrusion Detection with Snort

Principles of Information Security

The System: Who Owns the Internet, and How It Owns Us

Security Engineering: A Guide to Building Dependable Distributed Systems

The Complete Idiot's Guide to Online Investing

SSH, the Secure Shell : The Definitive Guide

The Passage

Java I/O (Java S.)

CISSP: Certified Information Systems Security Professional Study Guide

Managing Computer Viruses
