Limit Search Results
Author
Language
Subject
Switch to list view
Switch to thumbnail view
2615 Results Found Subscribe to search results
000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000MAIN
Print
304. 
Cover image for Security management : a critical thinking approach
305. 
Cover image for Cryptography for security and privacy in cloud computing
306. 
Cover image for Information security management handbook Volume 7
307. 
Cover image for Cryptography and network security : principles and practice
308. 
Cover image for Network security essentials applications and standards
309. 
Cover image for Security without obscurity : a guide to confidentiality, authentication, and integrity
310. 
Cover image for Principles of incident response and disaster recovery
335. 
Cover image for Applied network security monitoring : collection, detection, and analysis
338. 
Cover image for Security for multihop wireless networks
339. 
Cover image for Access control, authentication, and public key infrastructure
341. 
Cover image for Security for service oriented architectures
342. 
Cover image for Core software security : security at the source
343. 
Cover image for The science and technology of counterterrorism : measuring physical and electronic security risk
344. 
Cover image for The basics of information security : understanding the fundamentals of InfoSec in theory and practice
345. 
Cover image for Advances in secure computing, internet services, and applications
346. 
Cover image for Analyzing security, trust, and crime in the digital world
347. 
Cover image for Architectures and protocols for secure information technology infrastructures
348. 
Cover image for Network security technologies : design and applications
349. 
Cover image for Organizational, legal, and technological dimensions of information system administration
350. 
Cover image for Security, privacy, trust, and resource management in mobile and wireless communications
356. 
Cover image for Cloud management and security
357. 
Cover image for A cryptography primer : secrets and promises
358. 
Cover image for What every engineer should know about cyber security and digital forensics
359. 
Cover image for The Intrusion detection networks : a key to collaborative security
360. 
Cover image for Responsive security  : be ready to be secure
361. 
Cover image for The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory
362. 
Cover image for CompTIA security+ review guide : exam sy0-401
363. 
Cover image for Collaboration with cloud computing : security, social media, and unified communications
364. 
Cover image for Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
365. 
Cover image for Targeted cyber attacks : multi-staged attacks driven by exploits and malware
366. 
Cover image for Engineering safe and secure software systems
367. 
Cover image for Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
368. 
Cover image for Digital forensics for handheld devices
384. 
Cover image for UTM security with Fortinet : Mastering FortiOS
389. 
Cover image for Security patterns in practice : designing secure architectures using software patterns
392. 
Cover image for Risk propagation assessment for network security : application to airport communication network design
393. 
Cover image for Information security
397. 
Cover image for Network attacks and defenses : a hands-on approach
398. 
Cover image for Network and information security : issues, challenges and research trends
399. 
Cover image for Intelligent systems for security informatics
401. 
Cover image for Computer forensics : infoSec Pro guide
402. 
Cover image for Malware, rootkits & botnets : a beginner's guide
403. 
Cover image for Network security : a beginner's guide
409. 
Cover image for Information security for managers
431. 
Cover image for Security risks in social media technologies : safe practices in public service applications
434. 
Cover image for Introduction to computer networks and cybersecurity
435. 
Cover image for Safety management for software-based equipment
437. 
Cover image for Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedings
438. 
Cover image for Data management and security : applications in medicine, science and engineering
439. 
Cover image for Digital forensics explained
440. 
Cover image for Computational number theory and modern cryptography
441. 
Cover image for Hacking for dummies
442. 
Cover image for Cryptography in C and C++
444. 
Cover image for The basics of web hacking : tools and techniques to attack the Web
445. 
Cover image for Cyber warfare : techniques, tactics and tools for security practitioners
446. 
Cover image for Eleventh hour CISSP : study guide
447. 
Cover image for Cyber crime, security and digital intelligence
449. 
Cover image for Arguments that count : physics, computing, and missile defense, 1949-2012
450. 
Cover image for Web penetration testing with kali linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocol with kali linux
461. 
Cover image for Android security : attacks and defenses
467. 
Cover image for Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0
468. 
Cover image for Cyberspace and cybersecurity
469. 
Cover image for Network anomaly detection : a machine learning perspective
471. 
Cover image for Business data communications : infrastructure, networking and security
472. 
Cover image for Web application defender's cookbook : battling hackers and protecting users
493. 
Cover image for Distributed networks : intelligence, security, and applications
501. 
Cover image for Secure multi-party computation
502. 
Cover image for The practice of network security monitoring : understanding incident detection and response
504. 
Cover image for Iris biometric model for secured network access
506. 
Cover image for FISMA and the risk management framework : the new practice of federal cyber security
507. 
Cover image for Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocols
509. 
Cover image for Multimedia information hiding technologies and methodologies for controlling data
510. 
Cover image for Pragmatic security metrics : applying metametrics to information security
511. 
Cover image for Management of information security
512. 
Cover image for Information security risk assessment toolkit :   practical assessments through data collection and data analysis
513. 
Cover image for The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice
514. 
Cover image for The hacker's guide to OS X : exploiting OS X from the root-up
517. 
Cover image for Discrete dynamical systems and chaotic machines : theory and applications
518. 
Cover image for Elementary information security
519. 
Cover image for Cyber security for educational leaders : a guide to understanding and implementing technology policies
529. 
Cover image for Applied cyber security and the smart grid : implementing Security Controls into the Modern Power Infrastructure
545. 
Cover image for New directions of modern cryptography
546. 
Cover image for Linux Malware Incident Response : a practitioner's guide to forensic collection and examination of volatile data  : an excerpt from Malware Forensic Field Guide for Linux Systems
547. 
Cover image for Professional penetration testing
551. 
Cover image for Engineering dependable software systems
566. 
Cover image for Software safety and security : tools for analysis and verification
571. 
Cover image for Client-side attacks and defense
572. 
Cover image for Hacking web apps : detecting and preventing web application security problems
573. 
Cover image for Advances in intelligence and security informatics
574. 
Cover image for Hacking exposed 7 : network security secrets & solutions
575. 
Cover image for The computer incident response planning handbook : executable plans for protecting information at risk
576. 
Cover image for Information security management handbook. Volume 5
579. 
Cover image for Operating systems : internals and design principles
580. 
Cover image for Information security management handbook
581. 
Cover image for Network and application security fundamentals and practices
582. 
Cover image for Embedded systems security : practical methods for safe and secure software and systems development
583. 
Cover image for The death of the Internet
584. 
Cover image for IT governance : an international guide to data security and ISO27001/ISO27002
585. 
Cover image for CCNA security course booklet.
586. 
Cover image for Staying safe online in simple steps
587. 
Cover image for Cybersecurity : public sector threats and responses
588. 
Cover image for Database security
589. 
Cover image for Cyber security policy guidebook
590. 
Cover image for Advanced persistent threat : understanding the danger and how to protect your organization
591. 
Cover image for Computing and communication
592. 
Cover image for CCNA security lab manual version 1.1
593. 
Cover image for iOS hacker's handbook
594. 
Cover image for Role mining in business : taming role-based access control administration
595. 
Cover image for A survey of data leakage detection and prevention solutions
596. 
Cover image for Threats, countermeasures, and advances in applied information security
597. 
Cover image for PCI compliance :  understand and implement effective PCI data security standard compliance
598. 
Cover image for Reliability and availability of cloud computing
599. 
Cover image for Information security management handbook Volume 6
Go to:Search Results
|
Top of Page
|
Search Facets