Computer Security in 2009
Securing Library Technology
by
Wright, Adam, Earp, Paul W.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
by
Lyon, Gordon, Fyodor
HOWTO Secure and Audit Oracle 10g and 11g
by
Ben-Natan, Ron
Post-Quantum Cryptography Using Complexity
by
de Mare, Michael James
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement
by
Brotby, Cism W. Krag
TCP/IP - The Ultimate Protocol Guide: Volume 2 - Applications, Access and Data Security
by
Miller, Philip M.
TCP/IP - The Ultimate Protocol Guide: Volume 1 - Data Delivery and Routing
by
Miller, Philip M.
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
by
Fry, Chris, Nystrom, Martin
Information Security
by
Brotby, Krag
Data Governance Imperative (The)
by
Sarsfield, Steve
Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy
by
Alexander, Philip
Emerging Challenges for Security, Privacy and Trust: 24th Ifip Tc 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20
by
Gritzalis, Dimitris, Lopez, Javier
Scrappy Information Security: A plain-English tour through the world of Intranets, the Internet, Packets, Headers, Ports, ACs, Routers, Bridges, Fir
by
Seese, Michael
Applied Combinatorics
by
Roberts, Fred, Tesman, Barry
Algorithmic Cryptanalysis
by
Joux, Antoine
Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities
by
Volkamer, Melanie
Beautiful Security: Leading Security Experts Explain How They Think
by
Oram, Andy, Viega, John
Information Theoretic Security
by
Poor, H. Vincent, Shamai (Shitz), Shlomo, Liang, Yingbin
Comptia Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2e [With DVD ROM]
by
Fritz, Dustin, Krishnamurthy, Mohan, Cross, Michael
Cryptanalysis of RSA and Its Variants
by
Hinek, M. Jason
Performance Analysis of Mobile Ad Hoc Networks Security
by
Al-Ibrahim, Thair
Security of Mobile Communications
by
Boudriga, Noureddine
Security Risk Management Body of Knowledge
by
Talbot, Julian, Jakeman, Miles
Il Futuro Dell'information & Communication Technology: Tecnologie, Timori E Scenari Futuri Della Global Network Revolution
by
Teti, Antonio
Elementary Cryptanalysis
by
Sinkov, Abraham
Data Protection: Governance, Risk Management, and Compliance
by
Hill, David G.
Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks
by
Algebraic Cryptanalysis
by
Bard, Gregory
Information Warfare
by
Ventre, Daniel
Network Security Bible
by
Cole, Eric
Pearls of Discrete Mathematics
by
Erickson, Martin
Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age
by
Dunn Cavelty, Myriam
Conduite et Maîtrise de la Sécurité Informatique: La méthode CMSI
by
Hallepee, Didier
Foundations of Cryptography: Volume 2, Basic Applications
by
Goldreich, Oded, Oded, Goldreich
Innovations in Digital Watermarking Techniques
by
Wang, Feng-Hsing
Protecting SQL Server Data
by
Magnabosco, John
Security in Ad Hoc and Sensor Networks
by
Corbett, Cherita L., McNair, Janise, Beyah, Raheem A.
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
by
LeBlanc, David, Viega, John, Howard, Michael
I Contenuti Digitali: Tecnologie, Diritti E Libertà
by
Lucchi, Nicola
Hacking Exposed Computer Forensics
by
Philipp, Aaron
NIST SP 800-41 Guidelines on Firewalls and Firewall Policy: NiST SP 800-41
by
National Institute of Standards and Tech
Guidelines on Firewalls and Firewall Policy
by
Scarfone, Karen, Hoffman, Paul, National Institute of Standards and Tech
Eleventh Hour Security+: Exam Sy0-201 Study Guide
by
Dubrawsky, Ido
Network+: Exam N10-004 Study Guide
by
Alpern, Naomi
Cybercrime, Cyberterrorism, and Cyberwarfare
by
Uda, Robert T. Mba
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
by
Philipp, Aaron, Davis, Chris, Cowen, David
Entity Authentication and Personal Privacy in Future Cellular Systems
by
Koien, Geir M., Kien, Geir M.
Algebraic Geometry in Coding Theory and Cryptography
by
Xing, Chaoping, Niederreiter, Harald
Trust Management for Service-Oriented Environments
by
Malik, Zaki, Bouguettaya, Athman
Hacking: The Next Generation
by
Rios, Billy, Hardin, Brett, Dhanjani, Nitesh
Kryptologie: Algebraische Methoden Und Algorithmen
by
Karpfinger, Christian, Kiechle, Hubert
Network Intrusion Detection and Prevention: Concepts and Techniques
by
Tavallaee, Mahbod, Ghorbani, Ali A., Lu, Wei
Cyberdeterrence and Cyberwar
by
Libicki, Martin C.
Enterprise Security for the Executive: Setting the Tone from the Top
by
Bayuk, Jennifer
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
by
Latif, Shahed, Mather, Tim, Kumaraswamy, Subra
Handbook of Data Compression
by
Motta, Giovanni, Salomon, David
Security for Web Services and Service-Oriented Architectures
by
Bertino, Elisa, Martino, Lorenzo, Paci, Federica
Modsecurity 2.5
by
Mischel, Magnus
Cyber Law
by
Kumar, Anupa P.
Security in Embedded Devices
by
Gebotys, Catherine H.
Understanding Cryptography: A Textbook for Students and Practitioners
by
Paar, Christof, Pelzl, Jan
Kryptografie in Theorie Und PRAXIS: Mathematische Grundlagen Für Internetsicherheit, Mobilfunk Und Elektronisches Geld
by
Neumann, Heike B., Schwarzpaul, Thomas, Beutelspacher, Albrecht