Limit Search Results
Author
Language
Subject
Switch to list view
Switch to thumbnail view
2615 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
609. 
Cover image for Visual cryptography and secret image sharing
610. 
Cover image for Secure and resilient software : requirements, test cases, and testing methods
635. 
Cover image for Asset protection through security awareness
636. 
Cover image for Cyber security standards, practices and industrial applications : systems and methodologies
637. 
Cover image for Cyber crime : concepts, methodologies, tools and applications
643. 
Cover image for Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS
670. 
Cover image for Software agents, agent systems and their applications
673. 
Cover image for A multidisciplinary introduction to information security
707. 
Cover image for Applied cryptography for cyber security and defense : information encryption and cyphering
708. 
Cover image for Chaos synchronization and cryptography for secure communications : applications for encryption
711. 
Cover image for Security risk management : building an information security risk management program from the ground up
713. 
Cover image for Android forensics :  investigation, analysis and mobile security for google android
714. 
Cover image for Security strategies in Linux platforms and applications
716. 
Cover image for Cybercrime : investigating high-technology computer crime
717. 
Cover image for The basics of hacking and penetration testing : ethical hacking and penetration testing made easy
720. 
Cover image for Identity management : concepts, technologies, and systems
723. 
Cover image for Information assurance and security ethics in complex systems : interdisciplinary perspectives
724. 
Cover image for Hacking exposed : web applications : web application security secrets and solutions
725. 
Cover image for Gray hat hacking : the ethical hacker's handbook
727. 
Cover image for Secure Java : for web application development
728. 
Cover image for Metasploit :  the penetration tester’s guide
731. 
Cover image for The disaster recovery handbook a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
734. 
Cover image for Malware forensic field guide for windows systems : digital forensics field guides
741. 
Cover image for Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code
744. 
Cover image for Managed code rootkits : hooking into runtime environments
746. 
Cover image for IT auditing : using controls to protect information assets
752. 
Cover image for New technologies for digital crime and forensics : devices, applications, and software
753. 
Cover image for Auditing cloud computing : a security and privacy guide
756. 
Cover image for Cryptography and network security : principles and practice
757. 
Cover image for Computer forensics jumpstart
761. 
Cover image for Web application obfuscation : -/WAFs..Evasion..Filters//alert (/Obfuscation/)-
762. 
Cover image for Securing SQL server : protecting your database from attackers
763. 
Cover image for Eleventh hour CISSP : study guide
764. 
Cover image for Ethics for the information age
765. 
Cover image for Access control, security, and trust : a logical approach
766. 
Cover image for Information security : principles and practice
770. 
Cover image for Databases and information systems VI : selected papers from the Ninth International Baltic Conference, DB&IS 2010
771. 
Cover image for Cyber security, cyber crime and cyber forensics : applications and perspectives
774. 
Cover image for The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
776. 
Cover image for Intrusion detection : a machine learning approach
787. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
789. 
Cover image for Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
790. 
Cover image for Handbook of electronic security and digital forensics
796. 
Cover image for Web services security development and architecture : theoretical and practical issues
797. 
Cover image for Information communication technology law, protection, and access rights : global approaches and issues
798. 
Cover image for Frameworks for ICT policy : government, social and legal issues
799. 
Cover image for Hashing in computer science : fifty years of slicing and dicing
801. 
Cover image for Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data
803. 
Cover image for IT security metrics : a practical framework for measuring security & protecting data
807. 
Cover image for Guide to computer forensics and investigations[electronic resource]
809. 
Cover image for CCNA security study guide
810. 
Cover image for Professional penetration testing : creating and operating a formal hacking lab
811. 
Cover image for Managing an information security and privacy awareness and training program
813. 
Cover image for Security policies and implementation issues
814. 
Cover image for Information security risk analysis
815. 
Cover image for Human systems integration to enhance maritime domain awareness for port/parbour security
816. 
Cover image for Guide to computer forensics and investigations
817. 
Cover image for Risk analysis and security countermeasure selection
821. 
Cover image for CCNA security study guide
822. 
Cover image for The executive MBA in information security
826. 
Cover image for Designing an IAM framework with Oracle identity and access management suite
827. 
Cover image for CompTIA security+ SY0-201 video mentor
829. 
Cover image for Quantum cryptography and computing :  theory and implementation
830. 
Cover image for Management of information security
832. 
Cover image for Advances in artificial intelligence for privacy protection and security
834. 
Cover image for Seven deadliest web application attacks
835. 
Cover image for Seven deadliest social network attacks
838. 
Cover image for CompTIA security+ SY0-201 video mentor
852. 
Cover image for Computer forensics jumpstart
855. 
Cover image for Broadband quantum cryptography
863. 
Cover image for Network security auditing : the complete guide to auditing network security, measuring risk, and promoting compliance
864. 
Cover image for Dear Hacker : letters to the editor of 2600
865. 
Cover image for CISSP practice exams
868. 
Cover image for Seven deadliest network attacks
870. 
Cover image for Internet fraud casebook : the World Wide Web of deceit
876. 
Cover image for The art of enterprise information architecture : a systems-based approach for unlocking business insight
877. 
Cover image for The Cambridge handbook of information and computer ethics
882. 
Cover image for IT audit, control, and security
883. 
Cover image for Biometric technology for human identification VII : 5-6 April 2010, Orlando, Florida, United States
Go to:Search Results
|
Top of Page
|
Search Facets