Computer Security in 2014
Guide to Biometrics for Large-Scale Systems: Technological, Operational, and User-Related Factors
by
Ashbourn, Julian
Security Architect: Careers in Information Security
by
Collins, Jon
Code Breaking in the Pacific
by
Donovan, Peter, Mack, John
The Secret World of WikiLeaks: A History of the Organization, Its Leaders, and How It Gets Its Information
by
Lance, Dan
Slandered and Helpless: In Defense of Your Reputation Online & Offline
by
Preston, Treat
The Audacity to Spy: How Government, Business, and Hackers Rob Us of Privacy
by
Wilson, Ashley, Nolan, Catherine
The Infosec Handbook: An Introduction to Information Security
by
Nayak, Umesha, Rao, Umesh Hodeghatta
The Partnership Between the NIST and the Private Sector: Improving Cybersecurity
by
Committee on Commerce, Science And Tran
Control Systems Cyber Security: Defense in Depth Strategies
by
Department of Homeland Security
Writing Common Criteria Documentation
by
Higaki, Wesley Hisao
Privacy vs. Security
by
Ryan, Mark D., Stalla-Bourdillon, Sophie, Phillips, Joshua
Iron-Clad Java: Building Secure Web Applications
by
Manico, Jim, Detlefsen, August
An Introduction to Mathematical Cryptography
by
Hoffstein, Jeffrey, Pipher, Jill, Silverman, Joseph H.
Technocreep: The Surrender of Privacy and the Capitalization of Intimacy
by
Keenan, Thomas P.
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
by
Schou, Corey, Hernandez, Steven
Trusted Computing Platforms: Design and Applications
by
Smith, Sean W.
Oracle Privacy Security Auditing: Includes HIPAA Regulatory Compliance
by
Burleson, Donald K., Nanda, Arup
Your Privacy & Security
by
Minges, John
Your Privacy & Security
by
Minges, John
Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies
by
U. S. Department of Homeland Security
Beaglebone for Secret Agents
by
Datko, Josh
Information Governance and Security: Protecting and Managing Your Company's Proprietary Information
by
O'Shaughnessy, Michael, Iannarelli, John G.
Usable Security: History, Themes, and Challenges
by
Richter Lipford, Heather, Garfinkel, Simson
Touchless Palmprint Recognition Systems
by
Scotti, Fabio, Genovese, Angelo, Piuri, Vincenzo
Principles of Memory Dump Analysis: The Collected Seminars
by
Software Diagnostics Institute, Vostokov Dmitry
NISTIR 7628 Revision 1 Vol 2 Guidelines for Smart Grid Cybersecurity: Volume 2
by
National Institute of Standards and Tech
Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying
by
Moore, Alexis, Edwards, Laurie
Identity-Based Encryption
by
Chatterjee, Sanjit, Sarkar, Palash
The Savvy Cyber Kids at Home: The Family Gets a Computer
by
Halpert, Ben
The Book of PF, 3rd Edition: A No-Nonsense Guide to the OpenBSD Firewall
by
Hansteen, Peter N. M.
Cybercrime and Cyberwarfare
by
Bernik, Igor
Mommy! There's a Monster in our Computer: The book every parent should read to their child before they go on the Internet
by
McCarthy, N. K.
Mommy! There's a Monster in our Computer: The book every parent should read to their child before they go on the Internet
by
McCarthy, N. K.
Die digitale Signatur. Das Äquivalent zur eigenhändigen Unterschrift
by
Bernotti, Michelle
Automated Firewall Analytics: Design, Configuration and Optimization
by
Al-Shaer, Ehab
Schwachstellenanalyse & Reverse Engineering von Android Apps
by
Szameitat, Daniel
Transnational Security
by
Maras, Marie-Helen
Deep Witchcraft In The 419 Fraud: The Mystery Behind
by
Jules Fonba
Detecting and Combating Malicious Email
by
Ryan, Julie Jch, Kamachi, Cade
Handbook of FPGA Design Security
by
Irvine, Cynthia, Nguyen, Thuy D., Huffmire, Ted
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
by
Bachrach, Daniel, Rzeszut, Eric
Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements
by
McWilliams, Brian
Code of Practice for Cyber Security in the Built Environment
by
The Institution of Engineering and Technology
Der Cyber-Versicherungsmarkt in Deutschland: Eine Einführung
by
Choudhry, Umar
Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action
by
Executive Office of the President
Comptia Security+: Get Certified Get Ahead
by
Gibson, Darril
Hardware Security: Design, Threats, and Safeguards
by
Chakraborty, Rajat Subhra, Mukhopadhyay, Debdeep
Integer Algorithms in Cryptology and Information Assurance
by
Verkhovsky, Boris S.
Wireshark Essentials
by
H. Baxter, James
An Easy Introduction to Cryptography
by
Zia, M.
Cybersecurity: Authoritative Reports and Resources, by Topic
by
Tehan, Rita
The Next Generation of Video Surveillance And Video Analytics: The Unified Intelligent Video Analytics Suite
by
Ye, Liping, Yang, Ye, Xue, Jingyu
Principles of Computer Security Lab Manual, Fourth Edition
by
Nestler, Vincent J., Hirsch, Matthew P., Harrison, Keith
Untangle Network Security
by
El-Bawab, Abd El-Monem a.
Hands-on: OpenVPN: Installing and configuring an OpenVPN server and gateway, and setting up OpenVPN clients on Linux and Android
by
Offerman, Adrian
Informants, Cooperating Witnesses, and Undercover Investigations: A Practical Guide to Law, Policy, and Procedure, Second Edition
by
Fitzgerald, Dennis G.
Designing and Building Security Operations Center
by
Nathans, David
Understanding Cryptography: A Textbook for Students and Practitioners
by
Paar, Christof, Pelzl, Jan
Kryptographische Systeme
by
Pfitzmann, Andreas, Baumann, Ulrike, Franz, Elke
Model-Driven Risk Analysis: The Coras Approach
by
Stølen, Ketil, Lund, Mass Soldal, Solhaug, Bjørnar
Impacts and Risk Assessment of Technology for Internet Security: Enabled Information Small-Medium Enterprises (Teismes)
by
Shoniregun, Charles A.
Formal Models and Techniques for Analyzing Security Protocols: A Tutorial
by
Kremer, Steve, Cortier, Véronique
Managing Information Systems Security and Privacy
by
Trcek, Denis
Securing Voip: Keeping Your Voip Network Safe
by
(Bud) Bates, Regis J. Jr.
Network Security
by
Pérez, André
Cyber Law in Sweden
by
Kirchberger, Christine
Optimizing IEEE 802.11i Resource and Security Essentials: For Mobile and Stationary Devices
by
Naraei, Parisa, Amiri, Iraj Sadegh, Saberi, Iman
Homomorphic Encryption and Applications
by
Yi, Xun, Paulet, Russell, Bertino, Elisa
Electronic Postage Systems: Technology, Security, Economics
by
Bleumer, Gerrit
The Social Engineer's Playbook: A Practical Guide to Pretexting
by
Talamantes, Jeremiah
No-Body Homicide Cases: A Practical Guide to Investigating, Prosecuting, and Winning Cases When the Victim Is Missing
by
Dibiase, Thomas A. (Tad)
Trust Management for Service-Oriented Environments
by
Bouguettaya, Athman, Malik, Zaki
Security for Web Services and Service-Oriented Architectures
by
Bertino, Elisa, Martino, Lorenzo, Paci, Federica
vSphere Security Cookbook
by
Greer, Michael
Burp Suite Essentials
by
Mahajan, Akash
Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition
by
Adcock, James M., Stein, Sarah L.
Surviving The Zombie Apocalypse: Safer Computing Tips for Small Business Managers and Everyday People
by
Nomad, Max
Building an Intelligence-Led Security Program
by
Liska, Allan
Primer on Client-Side Web Security
by
De Ryck, Philippe, Desmet, Lieven, Piessens, Frank
Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace
by
Mazanec, Brian M., Thayer, B.
Practical Hadoop Security
by
Lakhe, Bhushan
A Machine-Learning Approach to Phishing Detection and Defense
by
Akanbi, O. a., Fazeldehkordi, E., Amiri, Iraj Sadegh
The Terrorists of Iraq: Inside the Strategy and Tactics of the Iraq Insurgency 2003-2014, Second Edition
by
Nance, Malcolm W.
Iris Biometrics: From Segmentation to Template Security
by
Wild, Peter, Rathgeb, Christian, Uhl, Andreas
Structured Peer-To-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
by
Gurtov, Andrei, Korzun, Dmitry
The Complete Guide to Personal Computer Password Security
by
Felteau, Doug, Hosein, Khalid J.
Cybersecurity for Everyone: Securing your home or small business network
by
Sadler, Terence L.
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
by
Wrightson, Tyler
Cyber Insurance Roundtable Readout Report: Enhanced with Text Analytics by PageKicker Robot Grotius
by
Pagekicker Robot Grotius, Department of Homeland Security
The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web
by
Lepofsky, Ron
Modernes It-Management: Methodische Kombination Von It-Strategie Und It-Reifegradmodell
by
Mangiapane, Markus, Büchler, Roman P.
Beginning SQL Server for Developers
by
Dewson, Robin
Hyper-V Security
by
Syrewicze, Andy, Siron, Eric
Juniper Qfx5100 Series: A Comprehensive Guide to Building Next-Generation Networks
by
Hanks, Douglas
Computer Security: Quickstudy Laminated Reference Guide
by
Cyborski, Shannon