Limit Search Results
Author
Language
Subject
Switch to list view
Switch to thumbnail view
2615 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
1201. 
Cover image for Secure programming with static analysis
1203. 
Cover image for Malware detection
1205. 
Cover image for Network security essentials : applications and standards
1206. 
Cover image for Implementing the ISO/IEC 27001 information security management system standard
1208. 
Cover image for Information security management handbook
1210. 
Cover image for Internet security : hacking, counterhacking, and society
1212. 
Cover image for Intelligent multimedia data hiding : new directions
1215. 
Cover image for Hacking web services
1221. 
Cover image for Security administrator street smarts : a real world guide to CompTIA Security+ skills
1222. 
Cover image for Role-based access control
1225. 
Cover image for Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006, revised selected papers
1226. 
Cover image for Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedings
1227. 
Cover image for Introduction to cryptography and network security
1229. 
Cover image for Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI
1230. 
Cover image for IT security governance guidebook with security program metrics on CD-ROM
1233. 
Cover image for Practical internet security
1237. 
Cover image for Disaster recovery : principles and practices
1238. 
Cover image for Applied cryptanalysis : breaking ciphers in the real world
1239. 
Cover image for Stealing the network :  how to own a shadow
1240. 
Cover image for Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors
1242. 
Cover image for Secure data management in decentralized systems
1244. 
Cover image for Network security policies and procedures
1247. 
Cover image for Integrated security systems design : concepts, specifications, and implementation
1248. 
Cover image for Data warehousing and data mining techniques for cyber security
1252. 
Cover image for Electronic postage systems : technology, security, economics
1253. 
Cover image for Hacking for dummies
1257. 
Cover image for SELinux by example : using security enhanced Linux
1259. 
Cover image for Embedded java security : security for mobile devices
1260. 
Cover image for Wireless crime and forensic investigation
1266. 
Cover image for Information security cost management
1267. 
Cover image for CompTIA security + study guide
1270. 
Cover image for IT security interviews exposed : secrets to landing your next information security job
1271. 
Cover image for Networks, security and soft computing : trends and future directions
1276. 
Cover image for Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers
1277. 
Cover image for Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
1278. 
Cover image for Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007: Proceedings
1279. 
Cover image for Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007: Proceedings
1280. 
Cover image for Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings
1290. 
Cover image for Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007: Proceedings
1291. 
Cover image for Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings
1292. 
Cover image for Inter-domain management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007 : proceedings
1293. 
Cover image for Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
1294. 
Cover image for Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings
1295. 
Cover image for Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings
1296. 
Cover image for Stabilization, safety, and security of distributed systems 9th international symposium, SSS 2007, Paris, France, November 14-16, 2007 : proceedings
1297. 
Cover image for New approaches for security, privacy and trust in complex environments proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
1299. 
Cover image for Intelligence and security informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings
1300. 
Cover image for Information security and cryptology - ICISC 2007 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings
1301. 
Cover image for Cryptology and network security 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings
1302. 
Cover image for Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
1303. 
Cover image for Fifth World Conference on Information Security Education proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
1304. 
Cover image for Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
1305. 
Cover image for Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
1306. 
Cover image for Foundations of Security What Every Programmer Needs to Know
1316. 
Cover image for Intelligent multimedia data hiding new directions
1318. 
Cover image for CompTIA security + study guide
1321. 
Cover image for Hacking web services
1330. 
Cover image for Cisco Network Admission Control
1331. 
Cover image for Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007: Proceedings
1332. 
Cover image for Pairing-Based Cryptography : Pairing 2007: First International Conference, Tokyo, Japan, July 2-4, 2007: Proceedings
1333. 
Cover image for Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007: Proceedings
1334. 
Cover image for Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
1337. 
Cover image for Intelligence and security informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings
1346. 
Cover image for Mechanics of user identification and authentication : fundamentals of identity management
1347. 
Cover image for Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
1348. 
Cover image for Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers
1350. 
Cover image for Patriotic information systems
1351. 
Cover image for Cryptography and security services : mechanisms and applications
1352. 
Cover image for Blackjacking : security threats to blackberry devices, PDAs, and cell phones in the enterprise
1353. 
Cover image for Fuzzing : brute force vulnerability discovery
1355. 
Cover image for Advances in enterprise information technology security
1357. 
Cover image for What every librarian should know about electronic privacy
1363. 
Cover image for Privacy-respecting intrusion detection
1364. 
Cover image for Guide to network defense and countermeasures
1368. 
Cover image for Information security : design, implementation, measurement and compliance
1370. 
Cover image for Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
1371. 
Cover image for Advances in cryptology-- ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings
1372. 
Cover image for New technologies, mobility and security
1373. 
Cover image for Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedings
1376. 
Cover image for Cybersecurity for SCADA systems
1377. 
Cover image for The law and economics of cybersecurity / edited by Mark F. Grady, Francesco Parisi
1378. 
Cover image for Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings
1380. 
Cover image for Protecting information : from classical error correction to quantum cryptography
1382. 
Cover image for Hackers challenge 3 : 20 brand-new forensic scenarios & solutions
1383. 
Cover image for Websters new world hacker dictionary
1386. 
Cover image for Critical infrastructure protection in homeland security : defending a networked nation
1388. 
Cover image for Security for mobile networks and platforms
1389. 
Cover image for Enterprise information systems assurance and system security : managerial and technical issues
1390. 
Cover image for MCSE/MCSA guide to installing and managing Microsoft Windows XP Professional and Windows Server 2003
1391. 
Cover image for CISA - Certified Information Systems Auditor : study guide
1404. 
Cover image for Microsoft internet security and acceleration (ISA) server 2004 administrators pocket consultant
1405. 
Cover image for Building and implementing a security certification and accreditation program : official (ISC) guide to the CAP CBK
1407. 
Cover image for Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQL
1408. 
Cover image for Dictionary of information security
1410. 
Cover image for Verification of infinite-state systems with applications to security
1411. 
Cover image for Information security : a strategic approach
1412. 
Cover image for E-business and telecommunication networks
1414. 
Cover image for The Ciso handbook : a practical guide to securing your company
1415. 
Cover image for Multivariate public key cryptosystems
1417. 
Cover image for Syngress force emerging threat analysis : from mischief to malicious
1421. 
Cover image for Cyberwar-Netwar : security in the information age
1422. 
Cover image for Designing and building enterprise DMZs
1423. 
Cover image for Invisible threats : financial and information technology crimes and national security
1424. 
Cover image for Access control systems : security, identity management and trust models
1425. 
Cover image for Security and embedded systems
1427. 
Cover image for The CISSP prep guide : mastering CISSP and CAP
1428. 
Cover image for Nortel guide to VPN routing for security and VoIP
1429. 
Cover image for Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings
1431. 
Cover image for Public key infrastructure : building trusted applications and Web services
1432. 
Cover image for Firewalls and VPNs : principles and practices
1434. 
Cover image for Securing SCADA systems
1442. 
Cover image for Understanding intrusion detection through visualization
1445. 
Cover image for Enterprise web services security
1454. 
Cover image for How to break Web software functional and security testing of Web applications and Web services
1455. 
Cover image for Critical infrastructure protection in homeland security defending a networked nation
1457. 
Cover image for CCSP IPS exam certification guide
1459. 
Cover image for CISA - Certified Information Systems Auditor study guide
1460. 
Cover image for The CISSP prep guide mastering CISSP and CAP
1461. 
Cover image for (SCTS) Symantec Certified Technical Specialist small business security study guide
1463. 
Cover image for Test prep resources : 70-270 installing, configuring and administering Microsoft Windows XP Professional & 70-290 managing and maintaining a Microsoft Windows Server 2003 environment : CoursePrep ExamGuide
1465. 
Cover image for Hands-on ethical hacking and network defense
1466. 
Cover image for The security risk assessment handbook : a complete guide for performing security risk assessments
1471. 
1472. 
Cover image for The unofficial guide to ethical hacking
1473. 
Cover image for Hands-on ethical hacking and network defense
1476. 
Cover image for Hacking exposed cisco networks : cisco security secrets and solutions
1479. 
Cover image for Professional ASP.NET 2.0 security, membership, and role management
1480. 
Cover image for Hacking mobile phones
1482. 
Cover image for Information technology security & risk management
1487. 
Cover image for Enterprise web services security
1489. 
Cover image for Windows forensics : the field guide for corporate computer investigations
1490. 
Cover image for Security modeling and analysis of mobile agent systems
1495. 
Cover image for Professional pen testing for Web applications
1498. 
Cover image for Penetration testing and network defense
1499. 
Cover image for (SCTS) Symantec Certified Technical Specialist : small business security study guide
Go to:Search Results
|
Top of Page
|
Search Facets