Computer Security in 2000
Trusted Computing Platforms: Design and Applications
by
Smith, Sean W.
The International Handbook of Computer Security
by
Siegel, Joel G., Qureshi, Anique A., Shim, Jae
Computer Networks and Open Systems: An Application Development Perspective: An Application Development Perspective
by
Cassel, L. N., Austing, R. H.
Cisco Access Lists Field Guide
by
Held, Gilbert, Hundley, Kent
The Limits of Privacy
by
Etzioni, Amitai
Automated Biometrics: Technologies and Systems
by
Zhang, David D.
Building Internet Firewalls
by
Chapman, D., Zwicky, Elizabeth, Cooper, Simon
Biometrics: Advanced Identity Verification: The Complete Guide [With CDROM]
by
Ashbourn, Julian
Netspionage: The Global Threat to Information
by
Boni, William C.
Business Continuity Planning
by
Doughty, Ken
Improving Access to and Confidentiality of Research Data: Report of a Workshop
by
Committee on National Statistics, National Research Council, Commission on Behavioral and Social Sciences and Education
Financial Privacy & Electronic Commerce: Who's in My Business
by
Robinson, Benjamin E., III
Java and Internet Security
by
Shrader, Theodore
Security Fundamentals for E-Commerce
by
Hassler, Vesna
E-mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
by
Syngress
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures
by
Duric, Zoran, Jajodia, Sushil, Johnson, Neil F.
FAA Computer Security: Recommenations to Address Continuing Weaknesses
by
U S General Accounting Office