Computer Security in 2013
Locally Decodable Codes and Private Information Retrieval Schemes
by
Yekhanin, Sergey
PRAGMATIC Security Metrics: Applying Metametrics to Information Security
by
Brotby, W. Krag, Hinson, Gary
Effective Monitoring and Alerting: For Web Operations
by
Ligus, Slawek
Comp Arch Security C
by
Wang, Shuangbao Paul, Ledley, Robert S.
Juniper Networks Warrior
by
Southwick, Peter
Wireless Network Securities
by
Weiser, Eugene
Arquitectura de Seguridad Informática: Un manual para gerentes, directores y consultores
by
Castro Reynoso, Sergio
Darknet: A Beginner's Guide to Staying Anonymous Online
by
Henderson, Lance
C(I)SO - And Now What?: How to Successfully Build Security by Design
by
Oberlaender, Michael S.
Microsoft Forefront Uag Mobile Configuration Starter
by
Volpe, Fabrizio
Comp Cryptography C
by
Yan, Song Y.
Cybersecurity
by
Office, Government Accountability
Cybresecurity: Selected Legal Issues
by
Ruane, Kathleen Ann, Dolan, Alissa M., Stevens, Gina
Securing Cloud and Mobility: A Practitioner's Guide
by
Coolidge, E. Coleen, Hourani, Paul, Lim, Ian
WordPress Security: Protection from Hackers
by
Klein, Lambert
Cloud Computing Protected: Security Assessment Handbook
by
Rhoton, John
The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online
by
Cherry, Denny
The Little Book of Cloud Computing SECURITY, 2013 Edition
by
Nielsen, Lars
Mobile Access Safety: Beyond Byod
by
Assing, Dominique, Calé, Stéphane
Governance and Internal Controls for Cutting Edge It
by
Worstell, Karen F.
The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud
by
Rocha, Francisco, Abreu, Salvador, Correia, Miguel
Instant Citrix Security How-to
by
Jacob, Carmel
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
by
Shavers, Brett
What's My Password?
by
Speciale, Corbett
Computational Number Theory
by
Das, Abhijit
Applied Cyber Security and the Smart Grid: Implementing Security Controls Into the Modern Power Infrastructure
by
Knapp, Eric D., Samani, Raj
Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
by
Williams, Barry L.
Instant Apple Configurator How-to
by
D. Houston, Timothy, Jr., Stephen Edge, Charles, Jr.
Security for Wireless Implantable Medical Devices
by
Du, Xiaojiang, Hei, Xiali
Secret History: The Story of Cryptology
by
Bauer, Craig P.
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Fiel
by
Casey, Eoghan, Aquilina, James M., Malin, Cameron H.
The Practical Guide to HIPAA Privacy and Security Compliance
by
Herold, Rebecca, Beaver, Kevin
Network Security Traceback Attack and React in the United States Department of Defense Network
by
Machie, Edmond K.
Network Security Traceback Attack and React in the United States Department of Defense Network
by
Machie, Edmond K.
Crisis Management at the Speed of the Internet: Trend Report
by
Hayes, Bob, Kotwica, Kathleen
From One Winning Career to the Next: Transitioning Public Sector Leadership and Security Expertise to the Business Bottom Line
by
Quilter, J. David
Nine Practices of the Successful Security Leader: Research Report
by
Hayes, Bob, Kotwica, Kathleen
Advanced Dpa Theory and Practice: Towards the Security Limits of Secure Embedded Circuits
by
Peeters, Eric
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
by
Van Tilborg, Henk C. a.
Advances in Cyber Security: Technology, Operations, and Experiences
by
Hsu, D. Frank, Marinucci, Dorothy
Business Continuity: Playbook
by
Hayes, Bob, Kotwica, Kathleen
Darknet Ecosystems: Surfacing Underground Economies
by
Pritchard, Michael J.
Android Security: Attacks and Defenses
by
Dubey, Abhishek, Misra, Anmol
Spam-Filter - Mechanismen und Algorithmen, Chancen und Gefahren: Einführung Spambekämpfung
by
Mösinger, Alexander
Computer Forensics InfoSec Pro Guide
by
Cowen, David
Critical Infrastructure System Security and Resiliency
by
Warren, Drake, Biringer, Betty, Vugrin, Eric
Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure
by
Rountree, Derrick
Instant Traffic Analysis with Tshark How-to
by
Merino, Borja
Dynamic Mixed Models for Familial Longitudinal Data
by
Sutradhar, Brajendra C.
Solarwinds Orion Network Performance Monitor
by
Dissmeyer, Joseph
Expert Oracle Application Express Security
by
Spendolini, Scott
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach
by
Wang, Xiaoyang Sean, Peng Ning, Jajodia, Sushil
America is Under Cyber Attack: Why Urgent Action is Needed
by
Subcommittee on Oversight, Investigation
Quantum Attacks on Public-Key Cryptosystems
by
Yan, Song Y.
Privacy for Location-Based Services
by
Ghinita, Gabriel
Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
by
Shinder, Thomas W., Diogenes, Yuri, Littlejohn Shinder, Debra
Oracle Weblogic Server 12c Advanced Administration Cookbook
by
Iwazaki, Dalton
Guide to the De-Identification of Personal Health Information
by
El Emam, Khaled
The Zealots Guide To Computer Security 2013
by
Taylor, Brian
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic
by
Shimonski, Robert
It-Sicherheitsmanagement Nach ISO 27001 Und Grundschutz: Der Weg Zur Zertifizierung
by
Reuter, Jürgen, Kersten, Heinrich
Backtrack - Testing Wireless Network Security
by
Cardwell, Kevin
NISTIR 7298 r2 Glossary of Key Information Security Terms: NISTIR 7298 r2
by
National Institute of Standards and Tech
Defending an Open, Global, Secure, and Resilient Internet
by
Negroponte, John D., Palmisano, Samuel J., Segal, Adam
You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets
by
Webb, William
Cyber Infrastructure Protection [Enlarged Edition]
by
Saadawi, Tarek, Jordan, Louis, Institute, Strategic Studies
Discrete Dynamical Systems and Chaotic Machines: Theory and Applications
by
Bahi, Jacques, Guyeux, Christophe
The Benefits and Security Risks of Web-Based Applications for Business: Trend Report
by
Kotwica, Kathleen
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend
by
Griffin, Dan
Potential for Data Loss from Security Protected Smartphones: Investigate how to use protective security measures from the PC world to secure Smartphon
by
Rajole, Vikas
Using Security Patterns in Web-Application
by
Alam, Shahnawaz
Cyber Crime Protection for Beginners: The Battle Against Cyber Crime in the 21st Century
by
Taiwo, Felix
Android Malware
by
Jiang, Xuxian, Zhou, Yajin
Linguistic Identity Matching
by
Meyer, Victoria, Lisbach, Bertrand
Network Anomaly Detection: A Machine Learning Perspective
by
Kalita, Jugal Kumar, Bhattacharyya, Dhruba Kumar
Android Application Security Essentials
by
Rai, Pragati
Cyber Crime & Warfare: All That Matters
by
Warren, Peter
The Beginner's Guide to the Internet Underground
by
Martin, Jeremy
Security for Cloud Storage Systems
by
Jia, Xiaohua, Yang, Kan
Stop Cyber Crime from Ruining Your Life!: Sixty Secrets to Keep You Safe
by
James, Cynthia
Handbook of Communications Security
by
Garzia, F.
Cryptography in C and C++
by
Welschenbach, Michael
Access Control, Authentication, and Public Key Infrastructure: Print Bundle
by
Ballad, Bill, Ballad, Tricia, Chapple, Mike
Sicherheit in SIP-basierten VoIP-Netzen
by
Sauer, Michael
Botnets
by
Gerhards-Padilla, Elmar, Tiirmaa-Klaar, Heli, Gassen, Jan
Automated Biometrics: Technologies and Systems
by
Zhang, David D.
Ten Successful Ways to Keep Windows Secure: The Windows Maintenance Guide
by
Maluth, John Monyjok
Vmware View Security Essentials
by
Langenhan, Daniel
Dissecting the Ethical Hacker: A guide for the Wine'n Cheese Crowd (a.k.a. Suits & Technology Executives)
by
Willburn, Michael
Speech Spectrum Analysis
by
Fulop, Sean A.
Active Directory Cookbook: Solutions for Administrators & Developers
by
Allen, Robbie, Svidergol, Brian
Sicherheit in Kommunikationsnetzen
by
Sorge, Christoph, Lo Iacono, Luigi, Gruschka, Nils
Hackers and Hacking: A Reference Handbook
by
Holt, Thomas J., Schell, Bernadette H.
Practical Paranoia: OS X Security Essentials for Home and Business: The easy step-by-step guide to hardening your OS X security
by
Mintz, Marc L.
Practical Anonymity: Hiding in Plain Sight Online
by
Loshin, Peter
Instant Ossec Host-Based Intrusion Detection System
by
Lhotsky, Brad
Android Security Cookbook
by
Makan, Keith
Hacking Exposed Mobile: Security Secrets & Solutions
by
Bergman, Neil, Stanfield, Mike, Rouse, Jason
NIST SP 800-40 R3 Guide to Enterprise Patch Management Technologies: NiST SP 800-40 R3
by
National Institute of Standards and Tech
Enterprise Cyber Security: principles and practice
by
Dhillon, Gurpreet S.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
by
Engebretson, Patrick