Computer Security in 2005
Aspectj Cookbook
by
Miles, Russ
Intrusion Prevention and Active Response: Deploying Network and Host IPS
by
Rash, Michael, Orebaugh, Angela D., Pinkard, Becky
Microsoft Log Parser Toolkit
by
Giuseppini, Gabriele, Burnett, Mark
Network Security: A Practical Approach
by
Harrington, Jan L.
Hardening Linux
by
Turnbull, James
Honeypots for Windows
by
Grimes, Roger A.
Brute Force: Cracking the Data Encryption Standard
by
Curtin, Matt
Buffer Overflow Attacks
by
Deckard, Jason
Linux Server Security
by
Bauer, Michael
Datenschutz Durch Technik: Rechtliche Förderungsmöglichkeiten Von Privacy Enhancing Technologies Am Beispiel Der Videoüberwachung
by
Stechow, Constantin
Risk Management for Computer Security: Protecting Your Network & Information Assets
by
Jones, Andy, Ashenden, Debi
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
by
Simon, William L., Mitnick, Kevin D.
Windows XP in a Nutshell
by
O'Reilly, Tim, Karp, David, Mott, Troy
Protecting Critical Infrastructures Against Cyber-Attack
by
Lukasik, Stephen
Preventing Identity Theft in Your Business: How to Protect Your Business, Customers, and Employees
by
Collins, Judith M.
The German Enigma Cipher Machine
by
Kruh, Louis, Winkel, Brian J., Deavours, Cipher a.
Aggressive Network Self-Defense
by
Fogie, Seth, Archibald, Neil, Wyler, Neil R.
Coding for Data and Computer Communications
by
Salomon, David
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
by
Foster, James C.
Principles and Practices for a Federal Statistical Agency: Third Edition
by
National Research Council, Division of Behavioral and Social Sciences and Education, Committee on National Statistics
Unix, Solaris and Linux: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications
by
Loza, Boris
802.11 Wlans and IP Networking
by
Prasad, Anand, Prasad, Neeli
Cisco PIX Firewalls
by
Khan
Deploying Citrix Metaframe Presentation Server 3.0 with Windows Server 2003 Terminal Services
by
Craft, Melissa
Mastering FreeBSD and OpenBSD Security
by
Potter, Bruce, Korff, Yanek, Hope, Paco
Snort Cookbook
by
Babbin, Jacob, Orebaugh, Angela, Biles, Simon
Network Security Tools
by
Dhanjani, Nitesh, Clarke, Justin
The Lottery Industry: : Cases, Problems & Preventable Incidents
by
Delehanty, Herb
Codes: The Guide to Secrecy from Ancient to Modern Times
by
Mollin, Richard A.
Cryptography in C and C++
by
Welschenbach, Michael
Steganography
by
Curran, Kevin, Bailey, Karen
Ssh, the Secure Shell: The Definitive Guide
by
Byrnes, Robert, Barrett, Daniel, Silverman, Richard
Infosec Career Hacking: Sell Your Skillz, Not Your Soul
by
Hurley, Chris, Bayles, Aaron W., Long, Johnny
Im Instant Messaging Security
by
Rittinghouse, John, Ransome, James F.
Implementing Database Security and Auditing
by
Ben-Natan, Ron
Database Hacker's Handbook w/WS
by
Heasman, John, Litchfield, David, Anley, Chris
Swing Hacks: Tips and Tools for Killer GUIs
by
Adamson, Chris, Marinacci, Joshua
Security in E-Learning
by
Weippl, Edgar R.
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar
by
Golomb, Solomon W., Gong, Guang
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
by
Friedrichs, Oliver, Watson, Brett, Oppleman, Victor
Contemporary Cryptology
by
Catalano, Dario, Cramer, Ronald, Damgard, Ivan
Mapping Hacks: Tips & Tools for Electronic Cartography
by
Walsh, Jo, Erle, Schuyler, Gibson, Rich
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes)
by
Shoniregun, Charles A.
Codici Cifrati: Arne Beurling E La Crittografia Nella II Guerra Mondiale
by
Beckman, Bengt
Network Security Evaluation Using the Nsa Iem
by
Fuller, Ed, Miles, Greg, Rogers, Russ
Configuring Vmware Esx Server 2.5
by
Wilson, Seburn, Muller, Al
Software Piracy Exposed
by
Honick, Ron
Stealing the Network: How to Own an Identity
by
Russell, Ryan, Beale, Jay, Riley, Peter A.
Beginning Cryptography with Java
by
Hook, David
The CISO Handbook: A Practical Guide to Securing Your Company
by
Gentile, Michael, Collette, Ron, August, Thomas D.
Security in Wireless LANs and Mans
by
Hardjono, Thomas
Digital Identity: Unmasking Identity Management Architecture (Ima)
by
Windley, Phillip
Pro PHP Security
by
Snyder, Chris, Southwell, Michael
Computer Security: 20 Things Every Employee Should Know
by
Rothke, Ben
Multimedia-Assistenten Im Betrieb: Datenschutzrechtliche Anforderungen, Rechtliche Regelungs- Und Technische Gestaltungsvorschläge Für Mobile Agentens
by
Steidle, Roland
Proceedings of Defining the State of the Art in Software Security Tools Workshop
by
Black, Paul E., U. S. Department of Commerce, Fong, Elizabeth
Phishing Exposed
by
James, Lance
AAA and Network Security for Mobile Access: Radius, Diameter, Eap, Pki and IP Mobility
by
Nakhjiri, Mahsa, Nakhjiri, Madjid
Security and Usability: Designing Secure Systems That People Can Use
by
Garfinkel, Simson, Cranor, Lorrie
Computer Insecurity: Risking the System
by
Furnell, Steven M.
Configuring Check Point Ngx Vpn-1/Firewall-1
by
Stiefel, Barry J., Desmeules, Simon
Sicherheit Und Datenschutz ALS Notwendige Eigenschaften Von Computergestützten Informationssystemen: Ein Integrierender Gestaltungsansatz Für Vertraue
by
Lange, Jörg Andreas
Essential SNMP: Help for System and Network Administrators
by
Mauro, Douglas, Schmidt, Kevin
Web and Information Security
by
Ferrari, Elena
Hardening Windows
by
Hassell, Jonathan
Internet Forensics: Using Digital Evidence to Solve Computer Crime
by
Jones, Robert
Enterprise Security Architecture: A Business-Driven Approach
by
Sherwood, Nicholas
Computer Security and Telerobotics for Everyone
by
Doherty Ph. D., Eamon P.
Multimedia Encryption and Watermarking
by
Socek, Daniel, Furht, Borko, Muharemagic, Edin
Essential PHP Security
by
Shiflett, Chris
Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and Technology
by
Kent, Karen, U. S. Department of Commerce, Nusbaum, Joseph
Creating a Patch and Vulnerability Management Program: Recommendations of the National Institute of Standards and Technology (NIST)
by
Henning, David, U. S. Department of Commerce, Bergeron, Tiffany
Securing Im and P2P Applications for the Enterprise
by
Sachs, Marcus, Piccard, Paul, Baskin, Brian
Perfect Password: Selection, Protection, Authentication
by
Burnett, Mark
Access Control Systems: Security, Identity Management and Trust Models
by
Benantar, Messaoud
Foundations of Computer Security
by
Salomon, David
Guide to IPsec VPNs: NiST SP 800-77
by
National Institute of Standards and Tech
SAP Security: SAP Security Essentials
by
Stewart, Jim
Guide to IPsec VPNs: Recommendations of the National Institute of Standards and Technology
by
Orebaugh, Angela D., Kent, Karen, Lewkowski, Ryan