Title: Cryptography: A Very Short Introduction, Author: Fred Piper
Title: Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting, Author: Aviel Rubin Ph.D.
Title: Montefeltro Conspiracy: A Renaissance Mystery Decoded, Author: Marcello Simonetta
Title: The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company's E-mail, Blogs, Social Networking, and Other Electronic Communication Tools, Author: Nancy FLYNN
Title: Secret Language: Codes, Tricks, Spies, Thieves, and Symbols, Author: Barry J. Blake
Title: OWNED: Why hacking continues to be a problem, Author: Mister Reiner
Title: 2600: The Hacker Digest - Volume 26, Author: 2600 Magazine
Title: Security+, Author: Neil Smyth
Title: Operationalizing Information Security: Putting the Top 10 SIEM Best Practices to Work, Author: Scott Gordon
Title: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Author: Simon Singh
Title: How To Protect Your Personal Computer: Your Step By Step Guide To Protecting Your Personal Computer, Author: HowExpert
Title: The Unwanted Gaze: The Destruction of Privacy in America, Author: Jeffrey  Rosen
Title: Passive Regulation: General Systems Design Principles, Author: Gerald M. Weinberg
Title: Active Regulation: General Systems Design Principles, Author: Gerald Weinberg
Title: Adware and Spyware Protection:, Author: Jimmy Jacks
Title: An Online Guide For Basic PC Users, Author: Jeremy Schaefer
Title: How to speed up and protect Windows DIY, Author: Min Wang
Title: Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities, Author: Government Accountability Office
Title: Worm: The First Digital World War, Author: Mark Bowden
Title: Cybersecurity: Steps to Protect Our Critical Infrastructure, Author: United States Senate

Pagination Links