Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: Writing Security Tools and Exploits, Author: James C Foster
Title: Wirtschaftsspionage: Ph�nomenologie - Erkl�rungsans�tze - Handlungsoptionen, Author: Dirk Fleischer
Title: Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework / Edition 1, Author: Jessey Bullock
Title: Wireless Security and Cryptography: Specifications and Implementations / Edition 1, Author: Nicolas Sklavos
Title: Wireless Multimedia Communication Systems: Design, Analysis, and Implementation / Edition 1, Author: K.R. Rao
Title: Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry / Edition 2, Author: Harlan Carvey
Title: Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8 / Edition 4, Author: Harlan Carvey
Title: Web Services Research for Emerging Applications: Discoveries and Trends, Author: Liang-Jie Zhang
Title: Web Security: A WhiteHat Perspective / Edition 1, Author: Hanqing Wu
Title: Web Application Vulnerabilities: Detect, Exploit, Prevent, Author: Steven Palmer
Title: Walling Out the Insiders: Controlling Access to Improve Organizational Security / Edition 1, Author: Michael Erbschloe
Title: Vulnerability Analysis and Defense for the Internet / Edition 1, Author: Abhishek Singh
Title: Violence in Nigeria: Patterns and Trends, Author: Patricia Taft
Title: Violence in Nigeria: Patterns and Trends, Author: Patricia Taft
Title: Versatile Cybersecurity, Author: Mauro Conti
Title: Verification of Infinite-State Systems with Applications to Security: Volume 1 NATO Security through Science Series: Information and Communication Security, Author: M. Minea
Title: Verifiable Privacy Protection for Vehicular Communication Systems, Author: David Fïrster
Title: Vehicular Ad Hoc Network Security and Privacy / Edition 1, Author: Xiaodong Lin
Title: VCP6-NV Official Cert Guide (Exam #2V0-641) / Edition 1, Author: Elver Sena Sosa

Pagination Links