Limit Search Results
Author
Language
Subject
386 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
12. 
Cover image for Trust and security in collaborative computing
13. 
Cover image for Computer Security Fundamentals
14. 
Cover image for Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
15. 
Cover image for CompTIA security+ guide to network security fundamentals
16. 
Cover image for CYBERSECURITY ESSENTIALS
17. 
Cover image for Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
18. 
Cover image for Industrial network security :  securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
20. 
Cover image for Introduction to modern cryptography
21. 
Cover image for Web security : a WhiteHat perspective
22. 
Cover image for Computational network science : an algorithmic approach
23. 
Cover image for Security policies and implementation issues
27. 
Cover image for Cryptography and network security : principles and practice
32. 
Cover image for Applied network security monitoring : collection, detection, and analysis
34. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
36. 
Cover image for Organizational, legal, and technological dimensions of information system administration
37. 
Cover image for What every engineer should know about cyber security and digital forensics
38. 
Cover image for The Intrusion detection networks : a key to collaborative security
39. 
Cover image for The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
40. 
Cover image for Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
42. 
Cover image for Information security
47. 
Cover image for Intelligent systems for security informatics
51. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
52. 
Cover image for Web application defender's cookbook : battling hackers and protecting users
56. 
Cover image for Pragmatic security metrics : applying metametrics to information security
63. 
Cover image for Hacking web apps : detecting and preventing web application security problems
65. 
Cover image for Computer security : principles and practice
70. 
Cover image for SQL injection attacks and defense
71. 
Cover image for Cyber security standards, practices and industrial applications : systems and methodologies
77. 
Cover image for Securing the cloud : cloud computer security techniques and tactics
78. 
Cover image for Windows registry forensics advanced digital forensic analysis of the Windows registry
79. 
Cover image for Hacking exposed : web applications : web application security secrets and solutions
81. 
Cover image for Computer security
82. 
Cover image for IT auditing : using controls to protect information assets
83. 
Cover image for Cryptography and network security : principles and practice
84. 
Cover image for Computer forensics jumpstart
85. 
Cover image for Windows registry forensics : advanced digital forensic analysis of the Windows registry
88. 
Cover image for Intrusion detection : a machine learning approach
90. 
Cover image for Network security essentials : applications and standards
91. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
92. 
Cover image for Computer security : protecting digital resources
93. 
Cover image for Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data
95. 
Cover image for Information security risk analysis
96. 
Cover image for Collaborative computer security and trust management
101. 
Cover image for Computer forensics jumpstart
104. 
Cover image for IT audit, control, and security
119. 
Cover image for Enterprise information security and privacy
123. 
Cover image for Architecting secure software systems
125. 
Cover image for Security+ guide to network security fundamentals
126. 
Cover image for Network security bible
127. 
Cover image for Introduction to network security
128. 
Cover image for Statistical techniques for network security : modern statistically-based intrusion detection and protection
130. 
Cover image for Web 2.0 security : defending AJAX, RIA and SOA
133. 
Cover image for SUSE linux enterprise server security (cource 3075) : SLES to VMWere server student manual (PDF) self-study wookbook (PDF) self study files
134. 
Cover image for SUSE linux enterprise server security (cource 3075) : Suse Linux Enterprise Server 10
137. 
Cover image for Introduction to modern cryptography
141. 
Cover image for Digital privacy : theory, technologies and practices
146. 
Cover image for SUSE linux enterprise server security
149. 
Cover image for Scene of the cybercrime
150. 
Cover image for Building an effective information security policy architecture
152. 
Cover image for Building an effective information security policy architecture
154. 
Cover image for Fuzzing for software security testing and quality assurance
155. 
Cover image for Malware detection
156. 
Cover image for Network security essentials : applications and standards
161. 
Cover image for Stealing the network :  how to own a shadow
162. 
Cover image for Secure data management in decentralized systems
163. 
Cover image for Network security policies and procedures
171. 
Cover image for Snort : IDS and IPS toolkit
173. 
Cover image for Mechanics of user identification and authentication : fundamentals of identity management
174. 
Cover image for Fuzzing : brute force vulnerability discovery
175. 
Cover image for Advances in enterprise information technology security
176. 
Cover image for Privacy-respecting intrusion detection
177. 
Cover image for Guide to network defense and countermeasures
180. 
Cover image for Enterprise information systems assurance and system security : managerial and technical issues
181. 
Cover image for Cryptography and network security : principles and practices
183. 
Cover image for Syngress force emerging threat analysis : from mischief to malicious
184. 
Cover image for Public key infrastructure : building trusted applications and Web services
185. 
Cover image for Firewalls and VPNs : principles and practices
186. 
Cover image for Understanding intrusion detection through visualization
188. 
Cover image for Hands-on ethical hacking and network defense
191. 
Cover image for Hands-on ethical hacking and network defense
194. 
Cover image for Windows forensics : the field guide for corporate computer investigations
195. 
Cover image for Professional pen testing for Web applications
197. 
Cover image for Information assurance : security in the information environment
198. 
Cover image for Advanced host intrusion prevention with CSA
199. 
Cover image for Intrusion prevention fundamentals
201. 
Cover image for A practical guide to security assessments
203. 
Cover image for Information security risk analysis
205. 
Cover image for Security+ guide to networking security fundamentals
206. 
Cover image for Computer forensics jumpstart
207. 
Cover image for Intrusion detection and correlation : challenges and solutions
211. 
Cover image for The business case for network security : advocacy, governance, and ROI
213. 
Cover image for Security+ guide to networking security fundamentals
217. 
Cover image for Information security illuminated
218. 
Cover image for Computer security assurance using the common criteria
221. 
Cover image for Snort for dummies
227. 
Cover image for Snort for dummies
228. 
Cover image for Principles and practice of information security : protecting computers from hackers and lawyers
230. 
Cover image for Hardening network infrastructure
239. 
Cover image for Security + guide to network security fundamentals
240. 
Cover image for Cryptography and public key infrastructure on the Internet
241. 
Cover image for Secure XML : the new syntax for signatures and encryption
255. 
Cover image for Role-based access control
258. 
Cover image for Network security : a beginner's guide
261. 
Cover image for Defending the digital frontier : a security agenda
268. 
Cover image for Safe and secure : secure your home network and protect your privacy online
270. 
Cover image for Hack attacks revealed
272. 
276. 
Cover image for Network security : private communication in a public world
279. 
Cover image for Hacking expose web applications
282. 
Cover image for Wireless security:  models, threats, and solutions
286. 
Cover image for Hack attacks revealed : a  complete reference for UNIX, windows and Linux with custom security toolkit
288. 
Cover image for Computer forensics : computer crime scene investigation
292. 
Cover image for Hacker proof : the ultimate guide to network security
297. 
Cover image for Secure electronic commerce : building the infrastructure for digital signatures and encryption