books by subject
Computer Security
Network Security: Data and Voice Communications (McGraw-Hill Series on Computer Communications)
PHP in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))
Unix Security for the Organization
The Blue Nowhere
Doctor Ecco's Cyberpuzzles: 36 Puzzles for Hackers and Other Mathematical Detectives
Computer Software: Legal Protection in the United Kingdom
Principles of Information Security
Smart Card Research and Advanced Applications: IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September ... Information and Communication Technology, 52...
E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware Analyst′s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Solving Cyber Risk: Protecting Your Company and Society
High Integrity Software: The SPARK Approach to Safety and Security
Principles of Information Systems Security: Texts and Cases
Firewall Architecture For Enterprise
Desktop Witness: The Do's and Don'ts of Personal Computer Security: 1
Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans
Virtual Private Networks
JAVA SECURITY SOLUTIONS
Data Security for Health Care: Management Guidelines v. 31 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)
Security and Control in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks)
Mastering SQL Server 2000 Security (Gearhead Press)
Quality for All: 4th COST 263 International Workshop on Quality of Future Internet Services, QoFIS 2003, Stockholm, Sweden, October 1-2, 2003, ... (Lecture Notes in Computer Science, 2811)
Data Security for Health Care: User Guidelines v. 33 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)
Biometrics (TB): Identify Verification in a Networked World: Identity Verification in a Networked World: 13 (Technology Briefs Series)
ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache and Privacy Regulations (Networking Council)
Towards Security in Medical Telematics: Legal and Technical Aspects (Studies in Health Technology & Informatics): Vol 27 (Studies in Health Technology and Informatics)
Halting the Hacker: A Practical Guide to Computer Security (Hewlett-Packard Professional Books)