1-24 of 73 Books

CISSP for dummies
By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory

Computer Security Basics
By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen

The shellcoder's handbook
By Jack Koziol,David Litchfield,Dave Aitel,Chris Anley,Sinan "noir" Eren,Neel Mehta,Riley Hassell

Mastering network security
By Chris Brenton,Cameron Hunt

Guide to computer forensics and investigations
By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart

Cisco Asa
By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim

Mastering system center Data protection manager 2007
By Devin L. Ganger,Ryan Femling

Maximum wireless security
By Cyrus Peikari,Seth Fogie

Disseminating security updates at Internet scale
By Jun Li,Jun Li,Peter Reiher,Gerald J. Popek

TICSA TruSecure ICSA certified security associate
By Mike Chapple,Debra Littlejohn Shinder,Shawn Porter

Cisco Networking Academy Program
By Cisco Systems, Inc,Cisco Systems Inc.,Cisco Networking Academy Program

CCSP
By Wade Edwards,Tom Lancaster,Eric Quinn,Jason Rohm,Bryant Tow,Wade Edwards ,Tom Lancaster

Internet site security
By Erik S. Schetina,Erik Schetina,Ken Green,Jacob Carlson

Hunting Security Bugs
By Tom; Jeffries, Bryan; Landauer, Lawrence Gallagher,Tom Gallagher,Lawrence Landauer,Bryan Jeffries

Hacking exposed
By Stuart McClure,Joel Scambray,George Kurtz

Business object design and implementation
By OOPSLA (Conference) (1995 Austin, Tex.),J. Sutherland,D. Patel,C Casanave,G Hollowell,J Miller

Inside network perimeter security
By Stephen Northcutt,Mark T. Edmead,Lenny Zeltser,Scott Winters,Karen Fredrick,Ronald W. Ritchey

Intrusion signatures and analysis
By Stephen Northcutt,Mark Cooper,Matt Fearnow,Karen Frederick

12th IEEE Computer Security Foundations Workshop
By Computer Security Foundations Workshop (12th 1999 Mordano, Italy),IEEE Computer Society,Institute of Electrical and Electronics Engineers

Voice and data security
By David Dicenso,Dwayne Williams,Travis Good,Kevin Archer,Gregory White,Chuck Cothren,Roger Davis

Microsoft Windows XP networking and security inside out
By Ed Bott,Carl Siechert

The backup book
By Dorian J. Cougias,Dorian Cougias,E. L. Heiberger,Karsten Koop

Trusted recovery and defensive information warfare
By Peng Liu,Sushil Jajodia