Limit Search Results
Author
Language
Subject
Switch to list view
Switch to thumbnail view
2615 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
1201. 
Cover image for Secure programming with static analysis
1203. 
Cover image for Malware detection
1205. 
Cover image for Network security essentials : applications and standards
1206. 
Cover image for Implementing the ISO/IEC 27001 information security management system standard
1207. 
Cover image for Security+ fastpass
1208. 
Cover image for Information security management handbook
1209. 
Cover image for Cryptography for developers
1210. 
Cover image for Internet security : hacking, counterhacking, and society
1212. 
Cover image for Intelligent multimedia data hiding : new directions
1213. 
Cover image for Security monitoring with Cisco security MARS
1215. 
Cover image for Hacking web services
1216. 
Cover image for Principles of incident response and disaster recovery
1217. 
Cover image for CWSP guide to wireless security
1221. 
Cover image for Security administrator street smarts : a real world guide to CompTIA Security+ skills
1222. 
Cover image for Role-based access control
1223. 
Cover image for Synchronizing internet protocol security (SIPSec)
1224. 
Cover image for Preserving privacy for on-line analytical processing
1225. 
Cover image for Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006, revised selected papers
1226. 
Cover image for Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedings
1227. 
Cover image for Introduction to cryptography and network security
1229. 
Cover image for Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI
1230. 
Cover image for IT security governance guidebook with security program metrics on CD-ROM
1233. 
Cover image for Practical internet security
1237. 
Cover image for Disaster recovery : principles and practices
1238. 
Cover image for Applied cryptanalysis : breaking ciphers in the real world
1239. 
Cover image for Stealing the network :  how to own a shadow
1240. 
Cover image for Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors
1242. 
Cover image for Secure data management in decentralized systems
1243. 
Cover image for Formal correctness of security protocols
1244. 
Cover image for Network security policies and procedures
1246. 
Cover image for WarDriving and wireless penetration testing
1247. 
Cover image for Integrated security systems design : concepts, specifications, and implementation
1248. 
Cover image for Data warehousing and data mining techniques for cyber security
1249. 
Cover image for Introduction to cryptography : principles and applications
1252. 
Cover image for Electronic postage systems : technology, security, economics
1253. 
Cover image for Hacking for dummies
1254. 
Cover image for Phishing and countermeasures : understanding the increasing problem of electronic identity theft
1256. 
Cover image for Computer forensics : principles and practices
1257. 
Cover image for SELinux by example : using security enhanced Linux
1259. 
Cover image for Embedded java security : security for mobile devices
1260. 
Cover image for Wireless crime and forensic investigation
1265. 
Cover image for Residential integrators basics
1267. 
Cover image for CompTIA security + study guide
1270. 
Cover image for IT security interviews exposed : secrets to landing your next information security job
1271. 
Cover image for Networks, security and soft computing : trends and future directions
1272. 
Cover image for The best damn IT security management book period
1274. 
Cover image for PCI compliance : understand and implement effective PCI data security standard compliance
1275. 
Cover image for Information security research : new methods for protecting against cyber threats
1276. 
Cover image for Information hiding : 8th international workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006 : revised selected papers
1277. 
Cover image for Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
1278. 
Cover image for Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007: Proceedings
1279. 
Cover image for Trust, Privacy and Security in Digital Business 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007: Proceedings
1280. 
Cover image for Theory of Cryptography 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007. Proceedings
1290. 
Cover image for Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007: Proceedings
1291. 
Cover image for Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings
1292. 
Cover image for Inter-domain management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007 : proceedings
1293. 
Cover image for Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
1294. 
Cover image for Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 : proceedings
1295. 
Cover image for Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings
1296. 
Cover image for Stabilization, safety, and security of distributed systems 9th international symposium, SSS 2007, Paris, France, November 14-16, 2007 : proceedings
1297. 
Cover image for New approaches for security, privacy and trust in complex environments proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa
1298. 
Cover image for Beginning information cards and CardSpace from novice to professional
1299. 
Cover image for Intelligence and security informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings
1300. 
Cover image for Information security and cryptology - ICISC 2007 10th international conference, Seoul, Korea, November 29-30, 2007 : proceedings
1301. 
Cover image for Cryptology and network security 6th international conference, CANS 2007, Singapore, December 8-10, 2007 : proceedings
1302. 
Cover image for Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings
1303. 
Cover image for Fifth World Conference on Information Security Education proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA
1304. 
Cover image for Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings
1305. 
Cover image for Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings
1310. 
Cover image for IT security governance guidebook with security program metrics on CD-ROM
1315. 
Cover image for Snort : IDS and IPS toolkit
1317. 
Cover image for Secure programming with static analysis
1318. 
Cover image for CompTIA security + study guide
1319. 
Cover image for Security+ fastpass
1321. 
Cover image for Hacking web services
1330. 
Cover image for Cisco Network Admission Control
1331. 
Cover image for Public Key Infrastructure 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007: Proceedings
1332. 
Cover image for Pairing-Based Cryptography : Pairing 2007: First International Conference, Tokyo, Japan, July 2-4, 2007: Proceedings
1333. 
Cover image for Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007: Proceedings
1334. 
Cover image for Selected Areas in Cryptography 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers
1335. 
Cover image for Foundations of Security Analysis and Design. IV, FOSAD 2006/2007 Tutorial Lectures
1337. 
Cover image for Intelligence and security informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007 : proceedings
1338. 
Cover image for Electronic postage systems technology, security, economics
1339. 
Cover image for Group policy : management, troubleshooting, and security for windows vista, windows 2003, windows XP, and windows 2000
1340. 
Cover image for Trustworthy computing : analytical and quantitative engineering evaluation
1342. 
Cover image for Information security : contemporary cases
1344. 
Cover image for Web application vunerabilities :  detect, exploit, prevent
1345. 
Cover image for Security awareness : applying practical security in your world
1346. 
Cover image for Mechanics of user identification and authentication : fundamentals of identity management
1347. 
Cover image for Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting
1348. 
Cover image for Selected areas in cryptography : 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, revised selected papers
1350. 
Cover image for Patriotic information systems
1351. 
Cover image for Cryptography and security services : mechanisms and applications
1352. 
Cover image for Blackjacking : security threats to blackberry devices, PDAs, and cell phones in the enterprise
1353. 
Cover image for Fuzzing : brute force vulnerability discovery
1354. 
Cover image for Professional rootkits
1355. 
Cover image for Advances in enterprise information technology security
1357. 
Cover image for What every librarian should know about electronic privacy
1358. 
Cover image for Linux firewalls : attack detection and response with iptables, psad, and fwsnort
1360. 
Cover image for Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers
1363. 
Cover image for Privacy-respecting intrusion detection
1364. 
Cover image for Guide to network defense and countermeasures
1366. 
Cover image for Home network security simplified
1368. 
Cover image for Information security : design, implementation, measurement and compliance
1370. 
Cover image for Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings
1371. 
Cover image for Advances in cryptology-- ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings
1372. 
Cover image for New technologies, mobility and security
1373. 
Cover image for Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedings
1376. 
Cover image for Cybersecurity for SCADA systems
1377. 
Cover image for The law and economics of cybersecurity / edited by Mark F. Grady, Francesco Parisi
1378. 
Cover image for Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings
1380. 
Cover image for Protecting information : from classical error correction to quantum cryptography
1382. 
Cover image for Hackers challenge 3 : 20 brand-new forensic scenarios & solutions
1383. 
Cover image for Websters new world hacker dictionary
1384. 
Cover image for How personal and internet security works
1385. 
Cover image for Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence
1386. 
Cover image for Critical infrastructure protection in homeland security : defending a networked nation
1389. 
Cover image for Enterprise information systems assurance and system security : managerial and technical issues
1390. 
Cover image for MCSE/MCSA guide to installing and managing Microsoft Windows XP Professional and Windows Server 2003
1391. 
Cover image for CISA - Certified Information Systems Auditor : study guide
1392. 
Cover image for Network defense and countermeasures : principles and practices
1393. 
Cover image for Privacy protection for e-services
1394. 
Cover image for Cryptography and network security : principles and practices
1399. 
Cover image for Securing converged IP networks
1403. 
Cover image for Understanding Voice over IP security
1404. 
Cover image for Microsoft internet security and acceleration (ISA) server 2004 administrators pocket consultant
1405. 
Cover image for Building and implementing a security certification and accreditation program : official (ISC) guide to the CAP CBK
1407. 
Cover image for Securing HP NonStop servers in an open systems world : TCP/IP, OSS & SQL
1408. 
Cover image for Dictionary of information security
1409. 
Cover image for Computer viruses and malware
1410. 
Cover image for Verification of infinite-state systems with applications to security
1411. 
Cover image for Information security : a strategic approach
1412. 
Cover image for E-business and telecommunication networks
1414. 
Cover image for The Ciso handbook : a practical guide to securing your company
1415. 
Cover image for Multivariate public key cryptosystems
1416. 
Cover image for Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
1417. 
Cover image for Syngress force emerging threat analysis : from mischief to malicious
1418. 
Cover image for Combating spyware in the enterprise
1419. 
Cover image for Firewall policies and VPN configurations
1421. 
Cover image for Cyberwar-Netwar : security in the information age
1422. 
Cover image for Designing and building enterprise DMZs
1423. 
Cover image for Invisible threats : financial and information technology crimes and national security
1424. 
Cover image for Access control systems : security, identity management and trust models
1425. 
Cover image for Security and embedded systems
1427. 
Cover image for The CISSP prep guide : mastering CISSP and CAP
1429. 
Cover image for Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings
1431. 
Cover image for Public key infrastructure : building trusted applications and Web services
1432. 
Cover image for Firewalls and VPNs : principles and practices
1434. 
Cover image for Securing SCADA systems
1442. 
Cover image for Understanding intrusion detection through visualization
1445. 
Cover image for Enterprise web services security
1446. 
Cover image for Guide to computer forensics and investigations
1448. 
Cover image for Handbook of information security
1454. 
Cover image for How to break Web software functional and security testing of Web applications and Web services
1455. 
Cover image for Critical infrastructure protection in homeland security defending a networked nation
1457. 
Cover image for CCSP IPS exam certification guide
1459. 
Cover image for CISA - Certified Information Systems Auditor study guide
1460. 
Cover image for The CISSP prep guide mastering CISSP and CAP
1461. 
Cover image for (SCTS) Symantec Certified Technical Specialist small business security study guide
1463. 
Cover image for Test prep resources : 70-270 installing, configuring and administering Microsoft Windows XP Professional & 70-290 managing and maintaining a Microsoft Windows Server 2003 environment : CoursePrep ExamGuide
1465. 
Cover image for Hands-on ethical hacking and network defense
1466. 
Cover image for The security risk assessment handbook : a complete guide for performing security risk assessments
1471. 
1472. 
Cover image for The unofficial guide to ethical hacking
1473. 
Cover image for Hands-on ethical hacking and network defense
1476. 
Cover image for Hacking exposed cisco networks : cisco security secrets and solutions
1479. 
Cover image for Professional ASP.NET 2.0 security, membership, and role management
1480. 
Cover image for Hacking mobile phones
1482. 
Cover image for Information technology security & risk management
1483. 
Cover image for Extrusion detection : security monitoring for internal intrusions
1489. 
Cover image for Windows forensics : the field guide for corporate computer investigations
1490. 
Cover image for Security modeling and analysis of mobile agent systems
1495. 
Cover image for Professional pen testing for Web applications
1498. 
Cover image for Penetration testing and network defense
1499. 
Cover image for (SCTS) Symantec Certified Technical Specialist : small business security study guide
Go to:Search Results
|
Top of Page
|
Search Facets