Limit Search Results
Author
Language
Subject
Switch to list view
Switch to thumbnail view
2615 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
909. 
Cover image for 24 deadly sins of software security : programming flaws and how to fix them
910. 
Cover image for Hacking exposed computer forensics : secrets & solutions
911. 
Cover image for Hacking exposed malware & rootkits : malware & rootkits security secrets & solutions
929. 
Cover image for Network intrusion detection and prevention : concepts and techniques
945. 
Cover image for SSL and TLS : theory and practice
946. 
Cover image for Breakthrough perspectives in network and data communications security, design, and applications
947. 
Cover image for Socioeconomic and legal implications of electronic intrusion
948. 
Cover image for SQL injection attacks and defense
949. 
Cover image for Cryptography research perspectives
950. 
Cover image for CCNA Cisco certified network associate security study guide (Exam 640-553)
951. 
Cover image for CISSP guide to security essentials
952. 
Cover image for Data protection : governance, risk management, and compliance
953. 
Cover image for CCNA Cisco certified network associate security study guide (Exam 640-553)
955. 
Cover image for Cisco ASA Configuration
957. 
Cover image for CompTIA security + study guide
958. 
Cover image for Security administrator street smarts : a real world guide to CompTIA Security+ skills
959. 
Cover image for Handbook of research on social and organizational liabilities in information security
960. 
Cover image for Governance of picture archiving and communications systems : data security and quality management of filmless radiology
961. 
Cover image for Creating a national framework for cybersecurity : an analysis of issues and options
962. 
Cover image for Enhancing cryptographic primitives with techniques from error correcting codes
963. 
Cover image for Applied algebra : codes, ciphers, and discrete algorithms
970. 
Cover image for CompTIA security+ review guide
971. 
Cover image for Stealing the network : the complete series collector's edition
973. 
Cover image for Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
974. 
Cover image for Mike meyers' certification passport compTIA security+
975. 
Cover image for The best of 2600 a hacker odyssey, collector's edition
990. 
Cover image for Profiling hackers : the science of criminal profiling as applied to the world of hacking
991. 
Cover image for Cyber fraud : tactics, techniques and procedures
996. 
Cover image for Nokia firewell, VPN, and IPSO configuration guide
997. 
Cover image for SAP security configuration and deployment : the IT administrator's guide to best practices
998. 
Cover image for Mike meyers' certification passport compTIA security+
999. 
Cover image for Next generation SSH2 implementation : securing data in motion
1000. 
Cover image for Security of information and communication networks
1001. 
Cover image for The mac hacker's handbook
1002. 
Cover image for Distributed systems security : issues, processes and solutions
1003. 
Cover image for Multimedia forensics and security
1004. 
Cover image for Hacking exposed 6 : network security secrets and solutions
1005. 
Cover image for Proceedings of the 3rd European conference on computer network defense
1006. 
Cover image for Handbook of research on information security and assurance
1007. 
Cover image for Managing the human factor in information security : how to win over staff and influence business managers
1008. 
Cover image for Security in wireless mesh networks
1009. 
Cover image for Enterprise information security and privacy
1010. 
Cover image for SIP security
1011. 
Cover image for Social and human elements of information security : emerging trends and countermeasures
1019. 
Cover image for Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
1020. 
Cover image for The best of 2600 : a hacker odyssey, collector's edition
1021. 
Cover image for Security in wireless ad hoc and sensor networks
1022. 
Cover image for Information security management metrics : a definitive guide to effective security monitoring and measurement
1023. 
Cover image for CompTIA security + study guide
1024. 
Cover image for CompTIA security+ : review guide
1025. 
Cover image for Professional ASP.NET 3.5 security, membership, and role management with C# and VB
1026. 
Cover image for Global perspectives in information security : legal, social, and international issues
1028. 
Cover image for Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues
1029. 
Cover image for Cyber security and global information assurance : threat analysis and response solutions
1030. 
Cover image for Primality testing and integer factorization in public-key cryptography
1031. 
Cover image for SIP handbook : services, technologies, and security of session inintation protocol
1042. 
Cover image for Guide to strategic infrastructure security : becoming a security network professional
1043. 
Cover image for CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives
1044. 
Cover image for Computer forensics and cyber crime : an introduction
1045. 
Cover image for Multimedia content encryption : techniques and applications
1046. 
Cover image for Architecting secure software systems
1047. 
Cover image for Security software development : assessing and managing security risks
1053. 
Cover image for Algorithms, architectures and information systems security
1054. 
1055. 
Cover image for Cisco secure firewall services module (FWSM)
1056. 
Cover image for Security+ guide to network security fundamentals
1057. 
Cover image for Disappearing cryptography : information hiding : steganography and watermarking
1059. 
Cover image for Network security bible
1060. 
Cover image for Introduction to network security
1061. 
Cover image for Statistical techniques for network security : modern statistically-based intrusion detection and protection
1062. 
Cover image for Security in an IPv6 environment
1063. 
Cover image for Principles of information security
1064. 
Cover image for Geekonomics : the real cost of insecure software
1065. 
Cover image for Your neighbor's secret life online : protecting families from Internet conmen, scammers and predators
1066. 
Cover image for Security and quality of service in ad hoc wireless networks
1067. 
Cover image for Implementing NAP and NAC security technologies : the complete guide to network access control
1068. 
Cover image for IPTV security : protecting high value digital contents
1070. 
Cover image for Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
1071. 
Cover image for LAN switch security : what hackers know about your switches
1072. 
Cover image for CISSP : exam guide
1073. 
Cover image for Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing
1074. 
Cover image for Network-aware security for group communications
1075. 
Cover image for Introduction to identity-based encryption
1076. 
Cover image for Cisco ASA, PIX and FWSM firewall handbook
1077. 
Cover image for Web 2.0 security : defending AJAX, RIA and SOA
1078. 
Cover image for Computer forensics for dummies
1081. 
Cover image for Securing the information infrastructure
1082. 
Cover image for Information security and ethics : concepts, methodologies, tools and applications
1088. 
Cover image for CISSP exam guide
1089. 
Cover image for EnCase computer forensics the official EnCE : EnCase certified examiner study guide
1091. 
Cover image for Build your own security lab : a field guide for network testing
1096. 
1104. 
Cover image for SUSE linux enterprise server security (cource 3075) : SLES to VMWere server student manual (PDF) self-study wookbook (PDF) self study files
1105. 
Cover image for SUSE linux enterprise server security (cource 3075) : Suse Linux Enterprise Server 10
1106. 
Cover image for OSSEC host-based intrusion detection guide
1108. 
Cover image for CCNA security official exam certification guide
1110. 
Cover image for Security engineering : a guide to building dependable distributed systems
1111. 
Cover image for Information assurance architecture
1112. 
Cover image for Introduction to modern cryptography
1113. 
Cover image for The best of 2600 : a hacker odyssey
1114. 
Cover image for CISSP : certified information systems security professional study guide
1115. 
Cover image for Mastering system center data protection manager 2007
1116. 
Cover image for Schneier on security
1117. 
Cover image for ICT futures : delivering pervasive, real-time and secure services
1118. 
Cover image for Gray hat hacking : the ethical hacker's handbook
1119. 
Cover image for Hacking exposed web 2.0 : web 2.0 security secrets and solutions
1121. 
Cover image for Principles, systems and applications of IP telecommunications : services and security for next generation networks : Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008 : revised selected papers
1124. 
Cover image for Privacy-preserving data mining : models and algorithms
1125. 
Cover image for Intelligence and security informatics : first European Conference, EuroISI 2008 Esbjerg, Denmark, December 2008 proceedings
1126. 
Cover image for Implementing NAP and NAC security technologies : the complete  guide to network access control
1128. 
Cover image for Introduction to communication electronic warfare systems
1131. 
Cover image for Information security : a practical approach
1134. 
Cover image for Data-driven block ciphers for fast telecommunication systems
1135. 
Cover image for Digital privacy : theory, technologies and practices
1136. 
Cover image for Information assurance : dependability and security in networked systems
1137. 
Cover image for Software security engineering : a guide for project managers
1139. 
Cover image for Router security strategies : securing IP network traffic planes
1140. 
Cover image for The craft of system security
1143. 
Cover image for Creating the secure managed desktop : using group policy, softGrid, microsoft deployment toolkit, and other management tools
1144. 
Cover image for Encyclopedia of information ethics and security
1145. 
Cover image for Secure computer and network systems : modeling, analysis and design
1146. 
Cover image for The web application hacker's handbook : discovering and exploiting security flaws
1147. 
Cover image for Implementing email and security tokens : current standards, tools, and practices
1148. 
Cover image for Group policy : fundamentals, security, and troubleshooting
1149. 
Cover image for Role engineering for enterprise security management
1151. 
Cover image for SUSE linux enterprise server security
1153. 
Cover image for Implementing 802.1X security solutions for wired and wireless networks
1156. 
Cover image for Terrorism informatics : knowledge management and data mining for homeland security
1159. 
Cover image for Privacy in statistical databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008, Proceedings
1160. 
Cover image for Intrusion detection systems
1161. 
Cover image for Guide to firewalls and network security
1164. 
Cover image for Web 2.0 security : defending AJAX, RIA and SOA
1167. 
Cover image for Crimeware : understanding new attacks and defenses
1169. 
Cover image for Trust and new technologies : marketing and management on the Internet and mobile media
1170. 
Cover image for Guide to computer forensics and investigations
1171. 
Cover image for Biometrics for dummies
1172. 
Cover image for CCNA security official exam certification guide
1173. 
Cover image for Information hiding : 10th international workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, revised selected papers
1175. 
Cover image for Scene of the cybercrime
1176. 
Cover image for Malware forensics : investigating and analyzing malicious code
1178. 
Cover image for Building an effective information security policy architecture
1183. 
Cover image for Network security : know it all
1184. 
Cover image for Building an effective information security policy architecture
1186. 
Cover image for Oracle identity management : governance, risk, and compliance architecture
1187. 
Cover image for Protecting games : a security handbook for game developers and publishers
1189. 
Cover image for Exploiting online games : cheating massively distributed systems
1190. 
Cover image for CISA : certified information systems auditor : study guide
1191. 
Cover image for Netcat power tools
1192. 
Cover image for IT compliance and controls : best practices for implementation
1193. 
Cover image for Foundations of communications electronic warfare
1194. 
Cover image for Fuzzing for software security testing and quality assurance
1196. 
Cover image for MANAGEMENT OF INFORMATION SECURITY
1198. 
Cover image for Computational intelligence in information assurance and security
1199. 
Cover image for Wireless network security
1200. 
Cover image for Risk, complexity and ICT
Go to:Search Results
|
Top of Page
|
Search Facets