Tomeki

Explore Books on
security - general

1-24 of 165 Books

View CISSP for dummies By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory
Cover of CISSP for dummies by lawrence h. miller,peter h. gregory,lawrence miller,lawrence c. miller,peter h., cisa, cissp gregory,peter gregory

CISSP for dummies

By Lawrence H. Miller,Peter H. Gregory,Lawrence Miller,Lawrence C. Miller,Peter H., CISA, CISSP Gregory,Peter Gregory

View Introduction to modern cryptography By Jonathan Katz,Yehuda Lindell
Cover of Introduction to modern cryptography by jonathan katz,yehuda lindell

Introduction to modern cryptography

By Jonathan Katz,Yehuda Lindell

View Computer Security Basics By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen
Cover of Computer Security Basics by deborah russell,sr. g.t gangemi,rick lehtinen

Computer Security Basics

By Deborah Russell,Sr. G.T Gangemi,Rick Lehtinen

View Coding theory and cryptography By Darrel R. Hankerson,D.C. Hankerson,Gary Hoffman,D.A. Leonard,Charles C. Lindner,K.T. Phelps,C.A. Rodger,J.R. Wall
Cover of Coding theory and cryptography by darrel r. hankerson,d.c. hankerson,gary hoffman,d.a. leonard,charles c. lindner,k.t. phelps,c.a. rodger,j.r. wall

Coding theory and cryptography

By Darrel R. Hankerson,D.C. Hankerson,Gary Hoffman,D.A. Leonard,Charles C. Lindner,K.T. Phelps,C.A. Rodger,J.R. Wall

View Introduction to number theory By Martin J. Erickson,Martin Erickson,Anthony Vazzana
Cover of Introduction to number theory by martin j. erickson,martin erickson,anthony vazzana

Introduction to number theory

By Martin J. Erickson,Martin Erickson,Anthony Vazzana

View Data-driven block ciphers for fast telecommunication systems By Nick Moldovyan,Nikolai Moldovyan,Alexander A. Moldovyan
Cover of Data-driven block ciphers for fast telecommunication systems by nick moldovyan,nikolai moldovyan,alexander a. moldovyan

Data-driven block ciphers for fast telecommunication systems

By Nick Moldovyan,Nikolai Moldovyan,Alexander A. Moldovyan

View Information Technology Control and Audit By Frederick Gallegos,Daniel P. Manson,Sandra Senft,Carol Gonzales
Cover of Information Technology Control and Audit by frederick gallegos,daniel p. manson,sandra senft,carol gonzales

Information Technology Control and Audit

By Frederick Gallegos,Daniel P. Manson,Sandra Senft,Carol Gonzales

View The shellcoder's handbook By Jack Koziol,David Litchfield,Dave Aitel,Chris Anley,Sinan "noir" Eren,Neel Mehta,Riley Hassell
Cover of The shellcoder's handbook by jack koziol,david litchfield,dave aitel,chris anley,sinan "noir" eren,neel mehta,riley hassell

The shellcoder's handbook

By Jack Koziol,David Litchfield,Dave Aitel,Chris Anley,Sinan "noir" Eren,Neel Mehta,Riley Hassell

View Applied cryptanalysis By Mark Stamp,Richard M. Low
Cover of Applied cryptanalysis by mark stamp,richard m. low

Applied cryptanalysis

By Mark Stamp,Richard M. Low

View Management of information security By Michael E. Whitman,Herbert J. Mattord
Cover of Management of information security by michael e. whitman,herbert j. mattord

Management of information security

By Michael E. Whitman,Herbert J. Mattord

View Implementing AS/400 security By Wayne Madden,Carol Woodbury
Cover of Implementing AS/400 security by wayne madden,carol woodbury

Implementing AS/400 security

By Wayne Madden,Carol Woodbury

View Mastering network security By Chris Brenton,Cameron Hunt
Cover of Mastering network security by chris brenton,cameron hunt

Mastering network security

By Chris Brenton,Cameron Hunt

View Guide to computer forensics and investigations By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart
Cover of Guide to computer forensics and investigations by bill nelson,amelia phillips,frank enfinger,christopher steuart

Guide to computer forensics and investigations

By Bill Nelson,Amelia Phillips,Frank Enfinger,Christopher Steuart

View The Wires of War By Jacob Helberg
Cover of The Wires of War by jacob helberg

The Wires of War

By Jacob Helberg

View Cisco Asa By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim
Cover of Cisco Asa by frahim, jazib/ santos, omar,omar santos,jazib frahim

Cisco Asa

By Frahim, Jazib/ Santos, Omar,Omar Santos,Jazib Frahim

View Securing VoIP networks By Peter Thermos,Ari Takanen
Cover of Securing VoIP networks by peter thermos,ari takanen

Securing VoIP networks

By Peter Thermos,Ari Takanen

View Sex, laws, and cyberspace By Jonathan D. Wallace,Jonathan Wallace,Mark Mangan
Cover of Sex, laws, and cyberspace by jonathan d. wallace,jonathan wallace,mark mangan

Sex, laws, and cyberspace

By Jonathan D. Wallace,Jonathan Wallace,Mark Mangan

View Multilevel secure transaction processing By Vijay Atluri,Vijay Atluri,Sushil Jajodia,Binto George
Cover of Multilevel secure transaction processing by vijay atluri,vijay atluri,sushil jajodia,binto george

Multilevel secure transaction processing

By Vijay Atluri,Vijay Atluri,Sushil Jajodia,Binto George

View Mastering system center Data protection manager 2007 By Devin L. Ganger,Ryan Femling
Cover of Mastering system center Data protection manager 2007 by devin l. ganger,ryan femling

Mastering system center Data protection manager 2007

By Devin L. Ganger,Ryan Femling

View Understanding PKI By Carlisle Adams,Carlisle Adams,Steve Lloyd
Cover of Understanding PKI by carlisle adams,carlisle adams,steve lloyd

Understanding PKI

By Carlisle Adams,Carlisle Adams,Steve Lloyd

View Cisco NAC appliance By Jamey Heary,Chad Sullivan,Alok Agrawal,Jerry Lin
Cover of Cisco NAC appliance by jamey heary,chad sullivan,alok agrawal,jerry lin

Cisco NAC appliance

By Jamey Heary,Chad Sullivan,Alok Agrawal,Jerry Lin

View Hacking exposed Web 2.0 By Rich Cannings,Himanshu Dwivedi
Cover of Hacking exposed Web 2.0 by rich cannings,himanshu dwivedi

Hacking exposed Web 2.0

By Rich Cannings,Himanshu Dwivedi

View Virtual Private Networks By Charlie Scott,Mike Erwin,Paul Wolfe
Cover of Virtual Private Networks by charlie scott,mike erwin,paul wolfe

Virtual Private Networks

By Charlie Scott,Mike Erwin,Paul Wolfe

View Computer-graphic facial reconstruction By John G. Clement,Murray K. Marks
Cover of Computer-graphic facial reconstruction by john g. clement,murray k. marks

Computer-graphic facial reconstruction

By John G. Clement,Murray K. Marks