1-24 of 121 Books

CISSP for dummies
By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory

Introduction to modern cryptography
By Jonathan Katz,Yehuda Lindell

Privacy on the line
By Whitfield Diffie,Susan Landau,Whitfield Diffie,Susan Landau

Computer Security Basics
By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen

Coding theory and cryptography
By Darrel R. Hankerson,D.C. Hankerson,Gary Hoffman,D.A. Leonard,Charles C. Lindner,K.T. Phelps,C.A. Rodger,J.R. Wall

Intelligence and Security Informatics
By Hsinchun Chen

Data-driven block ciphers for fast telecommunication systems
By Nick Moldovyan,Nikolai Moldovyan,Alexander A. Moldovyan

Trust and security in collaborative computing
By Xukai Zou,Xukai Zou,Yuan-shun Dai

Computational algorithms for fingerprint recognition
By Bir Bhanu,Xuejun Tan

Data & computer security
By Dennis Longley,Michael Shain

Applied cryptanalysis
By Mark Stamp,Richard M. Low

Long-term preservation of digital documents
By Uwe M. Borghoff,Peter Rödig,Jan Scheffczyk,Lothar Schmitz

Mastering network security
By Chris Brenton,Cameron Hunt

Guide to computer forensics and investigations
By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart

Cisco Asa
By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim

Maximum wireless security
By Cyrus Peikari,Seth Fogie

Understanding PKI
By Carlisle Adams,Carlisle Adams,Steve Lloyd

Virtual Private Networks
By Charlie Scott,Mike Erwin,Paul Wolfe

The art of software security assessment
By Mark Dowd,John McDonald,Justin Schuh

Combating spyware in the enterprise
By Brian Baskin,Tony Piltzecker,Paul Piccard,Jeremy Faircloth

Disseminating security updates at Internet scale
By Jun Li,Jun Li,Peter Reiher,Gerald J. Popek

TICSA TruSecure ICSA certified security associate
By Mike Chapple,Debra Littlejohn Shinder,Shawn Porter

Incident response
By E. Eugene Schultz,Russell Shumway

Internet site security
By Erik S. Schetina,Erik Schetina,Ken Green,Jacob Carlson