books by subject

Computer Security

Filter by available

Network Security: Data and Voice Communications (McGraw-Hill Series on Computer Communications)

By Simonds, Fred

PHP in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))

By Paul Hudson

Unix Security for the Organization

By R. Bringle Bryant

The Blue Nowhere

By Deaver, Jeffery

Doctor Ecco's Cyberpuzzles: 36 Puzzles for Hackers and Other Mathematical Detectives

By Shasha, Dennis E.

Computer Software: Legal Protection in the United Kingdom

By Carr, Henry, QC, Richard Arnold

Principles of Information Security

By Whitman, Michael

Smart Card Research and Advanced Applications: IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September ... Information and Communication Technology, 52...

By Domingo-Ferrer, Josep, Chan, David, Watson, Anthony

E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support

By Schuler, Karen A.

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

By Sikorski, Michael, Honig, Andrew

Malware Analyst′s Cookbook and DVD – Tools and Techniques for Fighting Malicious Code

By Ligh, Michael, Adair, Steven, Hartstein, Blake, Richard, Matthew

Security Metrics: Replacing Fear, Uncertainty, and Doubt

By Jaquith, Andrew

Solving Cyber Risk: Protecting Your Company and Society

By Coburn, Andrew, Leverett, Eireann, Woo, Gordon

High Integrity Software: The SPARK Approach to Safety and Security

By Barnes, John

Principles of Information Systems Security: Texts and Cases

By Dhillon, Gurpreet

Firewall Architecture For Enterprise

By Crothers, Norbert

Desktop Witness: The Do's and Don'ts of Personal Computer Security: 1

By A. Caloyannides, Michael

Securing the Network from Malicious Code: A Complete Guide to Defending Against Viruses, Worms, and Trojans

By Schweitzer, Douglas

Virtual Private Networks

By Mike Erwin, Charlie Scott, Paul Wolfe

JAVA SECURITY SOLUTIONS

By Helton, Rich

Data Security for Health Care: Management Guidelines v. 31 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

By SEISMED Consortium

Security and Control in Information Systems: A Guide for Business and Accounting (Routledge Information Systems Textbooks)

By Hawker, Andrew

Mastering SQL Server 2000 Security (Gearhead Press)

By Young, Mike, Curtis W.

Quality for All: 4th COST 263 International Workshop on Quality of Future Internet Services, QoFIS 2003, Stockholm, Sweden, October 1-2, 2003, ... (Lecture Notes in Computer Science, 2811)

By Karlsson, Gunnar, Smirnov, Michael I.

Data Security for Health Care: User Guidelines v. 33 (Studies in Health Technology & Informatics) (Studies in Health Technology and Informatics)

By SEISMED Consortium

Biometrics (TB): Identify Verification in a Networked World: Identity Verification in a Networked World: 13 (Technology Briefs Series)

By Nanavati, Samir, Thieme, Michael, Raj

ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache and Privacy Regulations (Networking Council)

By D. Casey, Timothy

Towards Security in Medical Telematics: Legal and Technical Aspects (Studies in Health Technology & Informatics): Vol 27 (Studies in Health Technology and Informatics)

By B. Barber, A. Treacher, K. Louwerse

Halting the Hacker: A Practical Guide to Computer Security (Hewlett-Packard Professional Books)

By Pipkin, Donald L., Hewlett-Packard Professional Books

Security Transformation: Digital Defense Strategies to Protect your Company's Reputation and Market Share

By McCarthy, Mary Pat, Campbell, Stuart