books by subject

Computer Security

Filter by available

Security Risk Management Body of Knowledge (Wiley Series in Systems Engineering and Management): 69

By Talbot, Julian, Jakeman, Miles

Trading on the Edge: Neural, Genetic, and Fuzzy Systems for Chaotic Financial Markets: 39 (Wiley Finance)

By Deboeck, Guido J.

Mac OS X Hacks: 100 Industrial-Strength Tips & Tricks

By Rael Dornfest, Morbus Iff

Wireless Hacks: 100 Industrial-Strength Tips & Tools: 100 Industrial Strength Tips and Tools

By Rob Flickenger

Selected Areas in Cryptography: 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers: 3357 (Lecture Notes in Computer Science, 3357)

By Handschuh, Helena, Hasan, Anwar

Handbook of Fingerprint Recognition (Springer Professional Computing)

By Maltoni, Davide, Maio, Dario, Jain, Anil K., Prabhakar, Salil

Computational Methods in Biometric Authentication: Statistical Methods for Performance Evaluation (Information Science and Statistics)

By Schuckers, Michael E.

The Digital Person: Technology and Privacy in the Information Age: 1 (Ex Machina: Law, Technology, and Society)

By Daniel J Solove

Open Source Intelligence Investigation: From Strategy to Implementation (Advanced Sciences and Technologies for Security Applications)

By Akhgar, Babak, Bayerl, P. Saskia, Sampson, Fraser

Cyberspace: Risks and Benefits for Society, Security and Development (Advanced Sciences and Technologies for Security Applications)

By Ramirez, J. Martin, García-Segura, Luis A.

Cyber Security: Power and Technology: 93 (Intelligent Systems, Control and Automation: Science and Engineering, 93)

By Lehto, Martti, Neittaanmäki, Pekka

Exploring the Security Landscape: Non-Traditional Security Challenges (Advanced Sciences and Technologies for Security Applications)

By Masys, Anthony J.

Cyber Security: Analytics, Technology and Automation: 78 (Intelligent Systems, Control and Automation: Science and Engineering, 78)

By Lehto, Martti, Neittaanmäki, Pekka

Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities (Advanced Sciences and Technologies for Security Applications)

By Akhgar, Babak, Brewster, Ben

Cyber Weaponry: Issues and Implications of Digital Arms (Advanced Sciences and Technologies for Security Applications)

By Prunckun, Henry

Technology and the Intelligence Community: Challenges and Advances for the 21st Century (Advanced Sciences and Technologies for Security Applications)

By Kosal, Margaret E.

Medical Imaging and its Security in Telemedicine Applications (SpringerBriefs in Applied Sciences and Technology)

By Thanki, Rohit, Borra, Surekha

Firewalls and Internet Security: Repelling the Wily Hacker: Repelling the Wily Hacker (2nd Edition) (Addison-Wesley Professional Computing Series)

By Cheswick, William R.

CCNA Security Exam Cram (Exam IINS 640-553)

By Stewart, Eric

Intrusion Detection with Snort

By Koziol, Jack

Principles of Information Security

By Whitman, Michael, Mattord, Herbert

The System: Who Owns the Internet, and How It Owns Us

By Ball, James

Security Engineering: A Guide to Building Dependable Distributed Systems

By Anderson, Ross J.

The Complete Idiot's Guide to Online Investing

By Gerlach, Douglas

SSH, the Secure Shell : The Definitive Guide

By Richard E. Silverman, Barrett, Daniel J., Silverman, Richard, Loukides, Mike

The Passage

By Cronin, Justin

Java I/O (Java S.)

By Elliotte Rusty Harold

CISSP: Certified Information Systems Security Professional Study Guide

By Stewart, James M., Tittel, Ed, Chapple, Mike

Managing Computer Viruses

By Louw, Eric, Duffy, Neil

Computer Viruses and Anti-virus Warfare

By Hruska, Jan