1-24 of 165 Books

CISSP for dummies
By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory

Introduction to modern cryptography
By Jonathan Katz,Yehuda Lindell

Computer Security Basics
By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen

Coding theory and cryptography
By Darrel R. Hankerson,D.C. Hankerson,Gary Hoffman,D.A. Leonard,Charles C. Lindner,K.T. Phelps,C.A. Rodger,J.R. Wall

Introduction to number theory
By Martin J. Erickson,Martin Erickson,Anthony Vazzana

Data-driven block ciphers for fast telecommunication systems
By Nick Moldovyan,Nikolai Moldovyan,Alexander A. Moldovyan

Information Technology Control and Audit
By Frederick Gallegos,Daniel P. Manson,Sandra Senft,Carol Gonzales

The shellcoder's handbook
By Jack Koziol,David Litchfield,Dave Aitel,Chris Anley,Sinan "noir" Eren,Neel Mehta,Riley Hassell

Applied cryptanalysis
By Mark Stamp,Richard M. Low

Management of information security
By Michael E. Whitman,Herbert J. Mattord

Implementing AS/400 security
By Wayne Madden,Carol Woodbury

Mastering network security
By Chris Brenton,Cameron Hunt

Guide to computer forensics and investigations
By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart

Cisco Asa
By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim

Securing VoIP networks
By Peter Thermos,Ari Takanen

Sex, laws, and cyberspace
By Jonathan D. Wallace,Jonathan Wallace,Mark Mangan

Multilevel secure transaction processing
By Vijay Atluri,Vijay Atluri,Sushil Jajodia,Binto George

Mastering system center Data protection manager 2007
By Devin L. Ganger,Ryan Femling

Understanding PKI
By Carlisle Adams,Carlisle Adams,Steve Lloyd

Cisco NAC appliance
By Jamey Heary,Chad Sullivan,Alok Agrawal,Jerry Lin

Hacking exposed Web 2.0
By Rich Cannings,Himanshu Dwivedi

Virtual Private Networks
By Charlie Scott,Mike Erwin,Paul Wolfe

Computer-graphic facial reconstruction
By John G. Clement,Murray K. Marks