Tomeki

Explore Books on
security

1-24 of 683 Books

View Hacking for Dummies By Kevin Beaver,Jutta Schmidt
Cover of Hacking for Dummies by kevin beaver,jutta schmidt

Hacking for Dummies

By Kevin Beaver,Jutta Schmidt

View SAS(R) 9.1.3 Intelligence Platform By SAS Publishing
Cover of SAS(R) 9.1.3 Intelligence Platform by sas publishing

SAS(R) 9.1.3 Intelligence Platform

By SAS Publishing

View Introduction to modern cryptography By Jonathan Katz,Yehuda Lindell
Cover of Introduction to modern cryptography by jonathan katz,yehuda lindell

Introduction to modern cryptography

By Jonathan Katz,Yehuda Lindell

View Security without Obscurity By Jeff Stapleton
Cover of Security without Obscurity by jeff stapleton

Security without Obscurity

By Jeff Stapleton

View CISSP By James Michael Stewart,Mike Chapple,Ed Tittel
Cover of CISSP by james michael stewart,mike chapple,ed tittel

CISSP

By James Michael Stewart,Mike Chapple,Ed Tittel

View Digital watermarking and steganography By Frank Y. Shih

Digital watermarking and steganography

Digital watermarking and steganography

By Frank Y. Shih

View Data Protection By Preston de Guise

Data Protection

Data Protection

By Preston de Guise

View Practical Introduction to Enterprise Network and Security Management By Bongsik Shin
Cover of Practical Introduction to Enterprise Network and Security Management by bongsik shin

Practical Introduction to Enterprise Network and Security Management

By Bongsik Shin

View Cloud Computing Security By John R. Vacca
Cover of Cloud Computing Security by john r. vacca

Cloud Computing Security

By John R. Vacca

View Behavioral Cybersecurity By Wayne Patterson,Cynthia E. Winston-Proctor

Behavioral Cybersecurity

Behavioral Cybersecurity

By Wayne Patterson,Cynthia E. Winston-Proctor

View Crime and Intelligence Analysis By Glenn Grana,James Windell

Crime and Intelligence Analysis

Crime and Intelligence Analysis

By Glenn Grana,James Windell

View Network Security By Owen Poole
Cover of Network Security by owen poole

Network Security

By Owen Poole

View Cold cases By James M. Adcock
Cover of Cold cases by james m. adcock

Cold cases

By James M. Adcock

View Computer Security Basics By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen
Cover of Computer Security Basics by deborah russell,sr. g.t gangemi,rick lehtinen

Computer Security Basics

By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen

View Handbook of SCADA/control systems security By Robert Radvanovsky,Jacob Brodsky
Cover of Handbook of SCADA/control systems security by robert radvanovsky,jacob brodsky

Handbook of SCADA/control systems security

By Robert Radvanovsky,Jacob Brodsky

View Communicating emergency preparedness By Damon P. Coppola,Damon Coppola,Erin K. Maloney
Cover of Communicating emergency preparedness by damon p. coppola,damon coppola,erin k. maloney

Communicating emergency preparedness

By Damon P. Coppola,Damon Coppola,Erin K. Maloney

View Cryptology By Richard E. Klima
Cover of Cryptology by richard e. klima

Cryptology

By Richard E. Klima

View Coal myths and environmental realities By Alvin L. Alm
Cover of Coal myths and environmental realities by alvin l. alm

Coal myths and environmental realities

By Alvin L. Alm

View The Ethical Hack By James S. Tiller
Cover of The Ethical Hack by james s. tiller

The Ethical Hack

By James S. Tiller

View Cyber-Security and Threat Politics By Myriam Dunn Cavelty
Cover of Cyber-Security and Threat Politics by myriam dunn cavelty

Cyber-Security and Threat Politics

By Myriam Dunn Cavelty

View (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide By Mike Chapple,James Michael Stewart,Darril Gibson

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

By Mike Chapple,James Michael Stewart,Darril Gibson

View Applied Cryptography By Bruce Schneier
Cover of Applied Cryptography by bruce schneier

Applied Cryptography

By Bruce Schneier

View Quantum communications and cryptography By Alexander V. Sergienko
Cover of Quantum communications and cryptography by alexander v. sergienko

Quantum communications and cryptography

By Alexander V. Sergienko

View Data Privacy for the Smart Grid By Rebecca Herold,Christine Hertzog

Data Privacy for the Smart Grid

Data Privacy for the Smart Grid

By Rebecca Herold,Christine Hertzog