Title: E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks, Author: Syngress
Title: Malicious Mobile Code: Virus Protection for Windows, Author: Roger A. Grimes
Title: Hack Proofing Your Network, Author: Syngress
Title: Network Security with OpenSSL: Cryptography for Secure Communications, Author: John Viega
Title: RADIUS: Securing Public Access to Private Resources, Author: Jonathan Hassell
Title: Programming .NET Security: Writing Secure Applications Using C# or Visual Basic .NET, Author: Adam Freeman
Title: Kerberos: The Definitive Guide: The Definitive Guide, Author: Jason Garman
Title: Security Warrior: Know Your Enemy, Author: Cyrus Peikari
Title: Network Security Assessment: Know Your Network, Author: Chris McNab
Title: Managing Security with Snort & IDS Tools: Intrusion Detection with Open Source Tools, Author: Kerry J. Cox
Title: SpamAssassin: A practical guide to integration and configuration, Author: Alistair McDonald
Title: Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool, Author: Gabriele Giuseppini
Title: Snort Cookbook: Solutions and Examples for Snort Administrators, Author: Angela Orebaugh
Title: Network Security Tools: Writing, Hacking, and Modifying Security Tools, Author: Nitesh Dhanjani
Title: SSH, the Secure Shell: The Definitive Guide, Author: Daniel J. Barrett
Title: Host Integrity Monitoring Using Osiris and Samhain, Author: Brian Wotring
Title: Stealing the Network: How to Own an Identity, Author: Ryan Russell
Title: Security and Usability: Designing Secure Systems that People Can Use, Author: Lorrie Faith Cranor
Title: The Case for ISO27001, Author: Alan Calder
Title: Nine Steps to Success: An ISO27001 Implementation Overview, Author: Alan Calder

Pagination Links