Limit Search Results
Author
Language
Subject
Switch to list view
Switch to thumbnail view
2615 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
609. 
Cover image for Visual cryptography and secret image sharing
610. 
Cover image for Secure and resilient software : requirements, test cases, and testing methods
634. 
Cover image for SQL injection attacks and defense
635. 
Cover image for Asset protection through security awareness
636. 
Cover image for Cyber security standards, practices and industrial applications : systems and methodologies
637. 
Cover image for Cyber crime : concepts, methodologies, tools and applications
643. 
Cover image for Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
670. 
Cover image for Software agents, agent systems and their applications
673. 
Cover image for A multidisciplinary introduction to information security
686. 
Cover image for Principles of information security
707. 
Cover image for Applied cryptography for cyber security and defense : information encryption and cyphering
708. 
Cover image for Chaos synchronization and cryptography for secure communications : applications for encryption
709. 
Cover image for Security information and event management (SIEM) implementation
710. 
Cover image for Cybercrime and espionage : an analysis of subversive multivector threats
711. 
Cover image for Security risk management : building an information security risk management program from the ground up
712. 
Cover image for Data mining and machine learning in cybersecurity
713. 
Cover image for Android forensics :  investigation, analysis and mobile security for google android
714. 
Cover image for Security strategies in Linux platforms and applications
716. 
Cover image for Cybercrime : investigating high-technology computer crime
717. 
Cover image for The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
718. 
Cover image for Software engineering for secure systems : industrial and research perspectives
719. 
Cover image for Security strategy : from requirements to reality
720. 
Cover image for Identity management : concepts, technologies, and systems
721. 
Cover image for Windows registry forensics advanced digital forensic analysis of the Windows registry
723. 
Cover image for Information assurance and security ethics in complex systems : interdisciplinary perspectives
724. 
Cover image for Hacking exposed : web applications : web application security secrets and solutions
725. 
Cover image for Gray hat hacking : the ethical hacker's handbook
726. 
Cover image for Adaptive security management architecture
727. 
Cover image for Secure Java : for web application development
729. 
Cover image for Physical-layer security : from information theory to security engineering
730. 
Cover image for Network security : a decision and game-theoretic approach
731. 
Cover image for The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
733. 
Cover image for Cyber warfare : techniques, tactics and tools for security practitioners
734. 
Cover image for Malware forensic field guide for windows systems : digital forensics field guides
735. 
Cover image for Cyber attacks : protecting national infrastructure
741. 
Cover image for Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code
742. 
Cover image for Security for Microsoft Windows system administrators : introduction to key information security concepts
743. 
Cover image for A guide to kernel exploitation : attacking the core
744. 
Cover image for Managed code rootkits : hooking into runtime environments
745. 
Cover image for Cognitive radio networking and security : a game-theoretic view
746. 
Cover image for IT auditing : using controls to protect information assets
750. 
Cover image for Information security, coding theory and related combinatorics : information coding and combinatorics
752. 
Cover image for New technologies for digital crime and forensics : devices, applications, and software
753. 
Cover image for Auditing cloud computing : a security and privacy guide
754. 
Cover image for Mobile device security for dummies
755. 
Cover image for Security of self-organizing networks : MANET, WSN, WMN, VANET
756. 
Cover image for Cryptography and network security : principles and practice
757. 
Cover image for Computer forensics jumpstart
760. 
Cover image for Windows registry forensics : advanced digital forensic analysis of the Windows registry
761. 
Cover image for Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)-
762. 
Cover image for Securing SQL server : protecting your database from attackers
763. 
Cover image for Eleventh hour CISSP : study guide
764. 
Cover image for Ethics for the information age
765. 
Cover image for Access control, security, and trust : a logical approach
766. 
Cover image for Information security : principles and practice
767. 
Cover image for Roadmap to information security : for IT and InfoSec managers
769. 
Cover image for Introduction to security and network forensics
770. 
Cover image for Databases and information systems VI : selected papers from the Ninth International Baltic Conference, DB&IS 2010
771. 
Cover image for Cyber security, cyber crime and cyber forensics : applications and perspectives
774. 
Cover image for The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
776. 
Cover image for Intrusion detection : a machine learning approach
777. 
Cover image for Information security evaluation : a holistic approach
780. 
Cover image for Introduction to cryptography with open-source software
781. 
Cover image for Machine learning forensics for law enforcement, security, and intelligence
782. 
Cover image for Network security essentials : applications and standards
787. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
789. 
Cover image for Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
790. 
Cover image for Handbook of electronic security and digital forensics
796. 
Cover image for Web services security development and architecture : theoretical and practical issues
797. 
Cover image for Information communication technology law, protection, and access rights : global approaches and issues
798. 
Cover image for Frameworks for ICT policy : government, social and legal issues
799. 
Cover image for Hashing in computer science : fifty years of slicing and dicing
800. 
Cover image for Safety of computer architectures
801. 
Cover image for Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data
802. 
Cover image for Peer-to-peer storage : security and protocols
803. 
Cover image for IT security metrics : a practical framework for measuring security & protecting data
806. 
Cover image for Secure and resilient software development
807. 
Cover image for Guide to computer forensics and investigations[electronic resource]
808. 
Cover image for Information security management : concepts and practice
809. 
Cover image for CCNA security study guide
810. 
Cover image for Professional penetration testing : creating and operating a formal hacking lab
811. 
Cover image for Managing an information security and privacy awareness and training program
813. 
Cover image for Security policies and implementation issues
814. 
Cover image for Information security risk analysis
815. 
Cover image for Human systems integration to enhance maritime domain awareness for port/parbour security
816. 
Cover image for Guide to computer forensics and investigations
817. 
Cover image for Risk analysis and security countermeasure selection
821. 
Cover image for CCNA security study guide
823. 
Cover image for Mobile device security : a comprehensive guide to securing your information in a moving world
826. 
Cover image for Designing an IAM framework with Oracle identity and access management suite
827. 
Cover image for CompTIA security+ SY0-201 video mentor
828. 
Cover image for Logics and languages for reliability and security
829. 
Cover image for Quantum cryptography and computing :  theory and implementation
830. 
Cover image for Management of information security
832. 
Cover image for Advances in artificial intelligence for privacy protection and security
834. 
Cover image for Seven deadliest web application attacks
835. 
Cover image for Seven deadliest social network attacks
838. 
Cover image for CompTIA security+ SY0-201 video mentor
852. 
Cover image for Computer forensics jumpstart
855. 
Cover image for Broadband quantum cryptography
861. 
Cover image for Cloud security : a comprehensive guide to secure cloud computing
862. 
Cover image for Virtualization and forensics : a digital forensic investigator's guide to virtual environments
863. 
Cover image for Network security auditing : the complete guide to auditing network security, measuring risk, and promoting compliance
864. 
Cover image for Dear Hacker : letters to the editor of 2600
865. 
Cover image for CISSP practice exams
866. 
Cover image for Seven deadliest wireless technologies attacks
867. 
Cover image for CCNA discovery course booklet. Networking for home and small businesses, version 4.0
868. 
Cover image for Seven deadliest network attacks
869. 
Cover image for Seven deadliest Microsoft attacks
870. 
Cover image for Internet fraud casebook : the World Wide Web of deceit
876. 
Cover image for The art of enterprise information architecture : a systems-based approach for unlocking business insight
877. 
Cover image for The Cambridge handbook of information and computer ethics
882. 
Cover image for IT audit, control, and security
883. 
Cover image for Biometric technology for human identification VII : 5-6 April 2010, Orlando, Florida, United States
Go to:Search Results
|
Top of Page
|
Search Facets