Tomeki

Explore Books on
005.8

1-24 of 31 Books

View Introduction to modern cryptography By Jonathan Katz,Yehuda Lindell
Cover of Introduction to modern cryptography by jonathan katz,yehuda lindell

Introduction to modern cryptography

By Jonathan Katz,Yehuda Lindell

View Information Security By Mark Stamp
Cover of Information Security by mark stamp

Information Security

By Mark Stamp

View CISA Certified Information Systems Auditor Study Guide By David L. Cannon
Cover of CISA Certified Information Systems Auditor Study Guide by david l. cannon

CISA Certified Information Systems Auditor Study Guide

By David L. Cannon

View The web application hacker's handbook By Dafydd Stuttard,Dafydd Stuttard
Cover of The web application hacker's handbook by dafydd stuttard,dafydd stuttard

The web application hacker's handbook

By Dafydd Stuttard,Dafydd Stuttard

View Network security By Charlie Kaufman
Cover of Network security by charlie kaufman

Network security

By Charlie Kaufman

View Web Security & Commerce By Simson Garfinkel,Gene Spafford
Cover of Web Security & Commerce by simson garfinkel,gene spafford

Web Security & Commerce

By Simson Garfinkel,Gene Spafford

View SSH, the Secure Shell By Daniel J. Barret,Richard E. Silverman,Daniel J. Barrett
Cover of SSH, the Secure Shell by daniel j. barret,richard e. silverman,daniel j. barrett

SSH, the Secure Shell

By Daniel J. Barret,Richard E. Silverman,Daniel J. Barrett

View Linux Server Security By Chris Binnie
Cover of Linux Server Security by chris binnie

Linux Server Security

By Chris Binnie

View Network intrusion detection By Stephen Northcutt
Cover of Network intrusion detection by stephen northcutt

Network intrusion detection

By Stephen Northcutt

View The art of software security assessment By Mark Dowd,John McDonald,Justin Schuh
Cover of The art of software security assessment by mark dowd,john mcdonald,justin schuh

The art of software security assessment

By Mark Dowd,John McDonald,Justin Schuh

View Understanding PKI By Carlisle Adams,Carlisle Adams,Steve Lloyd
Cover of Understanding PKI by carlisle adams,carlisle adams,steve lloyd

Understanding PKI

By Carlisle Adams,Carlisle Adams,Steve Lloyd

View Internet denial of service By Jelena Mirkovic,Sven Dietrich,David Dittrich,Peter Reiher
Cover of Internet denial of service by jelena mirkovic,sven dietrich,david dittrich,peter reiher

Internet denial of service

By Jelena Mirkovic,Sven Dietrich,David Dittrich,Peter Reiher

View Secure coding in C and C++ By Robert C. Seacord
Cover of Secure coding in C and C++ by robert c. seacord

Secure coding in C and C++

By Robert C. Seacord

View Cryptanalysis of number theoretic ciphers By Samuel S. Wagstaff
Cover of Cryptanalysis of number theoretic ciphers by samuel s. wagstaff

Cryptanalysis of number theoretic ciphers

By Samuel S. Wagstaff

View Malware By Ed Skoudis,Lenny Zeltser
Cover of Malware by ed skoudis,lenny zeltser

Malware

By Ed Skoudis,Lenny Zeltser

View Open Source Security Tools By Tony Howlett
Cover of Open Source Security Tools by tony howlett

Open Source Security Tools

By Tony Howlett

View Security in Computing By Charles P. Pfleeger
Cover of Security in Computing by charles p. pfleeger

Security in Computing

By Charles P. Pfleeger

View Secure Coding By Mark G. Graff,Kenneth R. van Wyk
Cover of Secure Coding by mark g. graff,kenneth r. van wyk

Secure Coding

By Mark G. Graff,Kenneth R. van Wyk

View SSL and TLS By Eric Rescorla
Cover of SSL and TLS by eric rescorla

SSL and TLS

By Eric Rescorla

View ISA Server 2004 unleashed By Michael Noel
Cover of ISA Server 2004 unleashed by michael noel

ISA Server 2004 unleashed

By Michael Noel

View IT-security and privacy By Simone Fischer-Hübner

IT-security and privacy

IT-security and privacy

By Simone Fischer-Hübner

View Software security By Gary McGraw
Cover of Software security by gary mcgraw

Software security

By Gary McGraw

View Securing Web Services with WS-Security By Jothy Rosenberg,David Remy
Cover of Securing Web Services with WS-Security by jothy rosenberg,david remy

Securing Web Services with WS-Security

By Jothy Rosenberg,David Remy

View Inside Network Perimeter Security By Stephen Northcutt,Lenny Zeltser,Scott Winters,Karen Kent,Ronald W. Ritchey
Cover of Inside Network Perimeter Security by stephen northcutt,lenny zeltser,scott winters,karen kent,ronald w. ritchey

Inside Network Perimeter Security

By Stephen Northcutt,Lenny Zeltser,Scott Winters,Karen Kent,Ronald W. Ritchey