Limit Search Results
Author
Language
Subject
754 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
1. 
Cover image for Computer Network Security
11. 
Cover image for Trust and security in collaborative computing
12. 
Cover image for Computer Security Fundamentals
13. 
Cover image for Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
14. 
Cover image for Security in IoT-Enabled Space
15. 
Cover image for Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications
16. 
Cover image for CYBERSECURITY ESSENTIALS
17. 
Cover image for Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
27. 
Cover image for Applications of cryptography and network security
34. 
Cover image for Computational network science : an algorithmic approach
35. 
Cover image for Security policies and implementation issues
40. 
Cover image for Cybersecurity : managing systems, conducting testing, and investigating intrusions
42. 
Cover image for Security management of next generation telecommunications networks and services
47. 
Cover image for Hacker techniques, tools, and incident handling
48. 
Cover image for Conducting network penetration and espionage in a global environment
51. 
Cover image for Cryptography and network security : principles and practice
56. 
Cover image for Applied network security monitoring : collection, detection, and analysis
58. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
60. 
Cover image for Architectures and protocols for secure information technology infrastructures
62. 
Cover image for Security, privacy, trust, and resource management in mobile and wireless communications
64. 
Cover image for What every engineer should know about cyber security and digital forensics
65. 
Cover image for The Intrusion detection networks : a key to collaborative security
66. 
Cover image for The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
67. 
Cover image for Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
71. 
Cover image for UTM security with Fortinet : Mastering FortiOS
74. 
Cover image for Information security
78. 
Cover image for Intelligent systems for security informatics
84. 
Cover image for Security risks in social media technologies : safe practices in public service applications
86. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
87. 
Cover image for Network anomaly detection : a machine learning perspective
88. 
Cover image for Web application defender's cookbook : battling hackers and protecting users
95. 
Cover image for The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
96. 
Cover image for Computer and information security handbook
97. 
Cover image for Applied cyber security and the smart grid : implementing Security Controls into the Modern Power Infrastructure
100. 
Cover image for Professional penetration testing
110. 
Cover image for Client-side attacks and defense
111. 
Cover image for Hacking web apps : detecting and preventing web application security problems
117. 
Cover image for PCI compliance :  understand and implement effective PCI data security standard compliance
124. 
Cover image for SQL injection attacks and defense
125. 
Cover image for Asset protection through security awareness
126. 
Cover image for Cyber security standards, practices and industrial applications : systems and methodologies
140. 
Cover image for Security risk management : building an information security risk management program from the ground up
141. 
Cover image for Securing the cloud : cloud computer security techniques and tactics
143. 
Cover image for Windows registry forensics advanced digital forensic analysis of the Windows registry
144. 
Cover image for Hacking exposed : web applications : web application security secrets and solutions
149. 
Cover image for IT auditing : using controls to protect information assets
153. 
Cover image for Cryptography and network security : principles and practice
154. 
Cover image for Computer forensics jumpstart
156. 
Cover image for Windows registry forensics : advanced digital forensic analysis of the Windows registry
159. 
Cover image for Intrusion detection : a machine learning approach
160. 
Cover image for Network security essentials : applications and standards
162. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
166. 
Cover image for Web services security development and architecture : theoretical and practical issues
167. 
Cover image for Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data
170. 
Cover image for Professional penetration testing : creating and operating a formal hacking lab
171. 
Cover image for Security policies and implementation issues
172. 
Cover image for Information security risk analysis
175. 
Cover image for Collaborative computer security and trust management
179. 
Cover image for Seven deadliest web application attacks
191. 
Cover image for Computer forensics jumpstart
196. 
Cover image for Seven deadliest network attacks
225. 
Cover image for SSL and TLS : theory and practice
227. 
Cover image for Cisco ASA Configuration
234. 
Cover image for Security of information and communication networks
236. 
Cover image for Security in wireless mesh networks
237. 
240. 
Cover image for Architecting secure software systems
245. 
Cover image for Security+ guide to network security fundamentals
246. 
Cover image for Disappearing cryptography : information hiding : steganography and watermarking
247. 
Cover image for Network security bible
248. 
Cover image for Introduction to network security
249. 
Cover image for Statistical techniques for network security : modern statistically-based intrusion detection and protection
250. 
Cover image for Security in an IPv6 environment
253. 
Cover image for Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
254. 
Cover image for Network-aware security for group communications
257. 
Cover image for Web 2.0 security : defending AJAX, RIA and SOA
259. 
Cover image for Securing the information infrastructure
265. 
Cover image for SUSE linux enterprise server security (cource 3075) : SLES to VMWere server student manual (PDF) self-study wookbook (PDF) self study files
266. 
Cover image for SUSE linux enterprise server security (cource 3075) : Suse Linux Enterprise Server 10
272. 
Cover image for Hacking exposed web 2.0 : web 2.0 security secrets and solutions
274. 
Cover image for Implementing NAP and NAC security technologies : the complete  guide to network access control
275. 
Cover image for Introduction to communication electronic warfare systems
277. 
Cover image for Digital privacy : theory, technologies and practices
280. 
Cover image for Router security strategies : securing IP network traffic planes
284. 
Cover image for SUSE linux enterprise server security
288. 
Cover image for Guide to firewalls and network security
293. 
Cover image for Scene of the cybercrime
294. 
Cover image for Building an effective information security policy architecture
298. 
Cover image for Network security : know it all
299. 
Cover image for Building an effective information security policy architecture
300. 
Cover image for Protecting games : a security handbook for game developers and publishers