Computer Security in 2008
Microsoft Forefront Security Administration Guide
by
Varsalone, Jesse
Internet-Security Aus Software-Sicht: Grundlagen Der Software-Erstellung Für Sicherheitskritische Bereiche
by
Kriha, Walter, Schmitz, Roland
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
by
Lackey, Zane, Cannings, Rich, Dwivedi, Himanshu
Cybercrime: Secure It or Lose It
by
Chatam, Denise M.
Cryptography and Security Services: Mechanisms and Applications
by
Mogollon, Manuel
OS X Exploits and Defense
by
Long, Johnny, Harley, David, Hurley, Chris
Secrets Stolen, Fortunes Lost
by
Power, Richard, Burgess, Christopher
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
by
Long, Johnny
Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities
by
Thomas, Stephen
The Real McTs/McItp Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions [With Dvdrom]
by
Piltzecker, Anthony
Information Security: A Manager's Guide to Thwarting Data Thieves and Hackers
by
Alexander, Philip
The Real McTs/McItp Exam 70-643 Prep Kit: Independent and Complete Self-Paced Solutions
by
Martin, Jeffery A., Bowern, Colin, Posey, Brien
Screenos Cookbook: Time-Saving Techniques for Screenos Administrators
by
Brunner, Stefan, Davar, Vik, Delcourt, David
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
by
Tiensivu, Aaron
RFID Security and Privacy: Concepts, Protocols, and Architectures
by
Henrici, Dirk
Malware Forensics: Investigating and Analyzing Malicious Code
by
Malin, Cameron H., Aquilina, James M., Casey, Eoghan
The Best Damn Windows Server 2008 Book Period
by
Piltzecker, Anthony
Trusted Computing Systeme: Konzepte Und Anforderungen
by
Müller, Thomas
Internet Security For Parents: Discover The Hidden Dangers That You And Your Children Face Online
by
Ivancic, Dan
Information Assurance Architecture
by
Willett, Keith D.
Human Ear Recognition by Computer
by
Chen, Hui, Bhanu, Bir
Security for Telecommunications Networks
by
La Porta, Thomas, Traynor, Patrick, McDaniel, Patrick
Information Security: Policy, Processes, and Practices
by
Goodman, Seymour, Straub, Detmar W., Baskerville, Richard
Exposing Internet Address Use to EnhanceNetwork Security
by
Cooke, Evan M.
NIST SP 800-123 Guide to General Server Security: NiST SP 800-123
by
National Institute of Standards and Tech
Guide to Securing Legacy IEEE 802.11 Wireless Networks
by
Tibbs, Cyrus, Dicoi, Derrick, Sexton, Matthew
Guide to General Server Security
by
Jansen, Wayne, Tracy, Miles, U. S. Department of Commerce-
Fuzzing for Software Security
by
Demott, Jared D., Miller, Charles, Takanen, Ari
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
by
Melnick, Jim, Dunham, Ken
Building an Effective Information Security Policy Architecture
by
Bacik, Sandy
Quantum Computing for Computer Scientists
by
Mannucci, Mirco A., Yanofsky, Noson S.
Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
by
Dube, Roger R.
NIST SP 800-60 Guide for Mapping Types of Information and Information Systems to: Nist SP 800-60
by
National Institute of Standards and Tech
Forensic Filtering of Cell Phone Protocols
by
Jansen, Wayne, Delaitre, Aurelien
Computer Forensics for Dummies
by
Anzaldua, Reynaldo, Pollard, Carol
Operating System Security
by
Jaeger, Trent
Hacking Wall Street: Attacks And Countermeasures
by
Krinklebine, Karlos
Gfi Network Security and PCI Compliance Power Tools
by
Posey, Brien
Using the BACnet Communications DLL v1.0
by
Galler, Michael a.
INFORMATION SECURITY OBJECTIVES AND PRACTICES - An Exploratory Study
by
Ma, Qingxiong, Pearson, John
NIST SP 800-115 Technical Guide to Information Security Testing and Assessment: NiST SP 800-115
by
National Institute of Standards and Tech
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection
by
Wang, Yun
Green IT: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line: Reduce Your Information System'
by
Velte, Toby, Velte, Anthony, Elsenpeter, Robert
Wireless Internet Security
by
Kempf, James
Spam 2 Scam How 2 B E-Safe
by
Manikantan, K. P.
Security Engineering for Service-Oriented Architectures
by
Hafner, Michael, Breu, Ruth
Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
by
Scarfone, Karen, Johnson, Paul M., Souppaya, Murugiah
CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives
by
Gentile, Michael, Gentile, Skye, Collette, Ron
Constraint-based Analysis of Security Properties
by
Sarna-Starosta, Beata
Codes and Ciphers - A History of Cryptography
by
D'Agapeyeff, Alexander
Security in Computing Systems: Challenges, Approaches and Solutions
by
Biskup, Joachim
Introduction to Network Security
by
Jacobson, Douglas
How to Complete a Risk Assessment in 5 Days or Less
by
Peltier, Thomas R.
Open Source Systems Security Certification
by
Damiani, Ernesto, Ardagna, Claudio Agostino, El Ioini, Nabil
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
by
Walther, Ben, Hope, Paco
Securing Emerging Wireless Systems: Lower-Layer Approaches
by
Chen, Yingying, Xu, Wenyuan, Trappe, Wade
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
by
Mehta, Ketan, Cooper, David, Scarfone, Karen
Secure Multi-Party Non-Repudiation Protocols and Applications
by
Onieva, José a., Zhou, Jianying
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
by
Yager, Neil, Dunstone, Ted
Secure Key Establishment
by
Choo, Kim-Kwang Raymond
Privatsphäre Durch Die Delegation Von Rechten
by
Wohlgemuth, Sven
Finite Automata and Application to Cryptography
by
Tao, Renji