Title: The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen, Author: Jonathan Littman
Title: Secret Messages: Concealment Codes And Other Types Of Ingenious Communication, Author: William S. Butler
Title: The Art of Deception: Controlling the Human Element of Security, Author: Kevin D. Mitnick
Title: Citizen Cyborg: Why Democratic Societies Must Respond To The Redesigned Human Of The Future, Author: James Hughes
Title: Defending the Digital Frontier: Practical Security for Management, Author: Ernst & Young LLP
Title: Brute Force: Cracking the Data Encryption Standard, Author: Matt Curtin
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers, Author: Kevin D. Mitnick
Title: A Classical Introduction to Cryptography Exercise Book, Author: Thomas Baigneres
Title: Internet-Security aus Software-Sicht: Grundlagen der Software-Erstellung f�r sicherheitskritische Bereiche, Author: Walter Kriha
Title: Applied Information Security: A Hands-on Approach, Author: David Basin
Title: Federal Cybersecurity Planning : Human Capital and Research and Development, Author: Kurk C. Moore
Title: How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life, Author: J. J. Luna
Title: Diskrete algebraische Methoden: Arithmetik, Kryptographie, Automaten und Gruppen, Author: Volker Diekert
Title: Secrets and Lies: Digital Security in a Networked World, Author: Bruce Schneier
Title: Safe Computing is Like Safe Sex: You have to practice it to avoid infection, Author: Richard G Lowe Jr
Title: Privacy's Blueprint: The Battle to Control the Design of New Technologies, Author: Woodrow Hartzog
Title: Click Here to Kill Everybody: Security and Survival in a Hyper-connected World, Author: Bruce Schneier
Title: Democracy Hacked: Political Turmoil and Information Warfare in the Digital Age, Author: Martin Moore
Title: Sudo Mastery, Author: Michael W Lucas
Title: A Hacker, I Am, Author: Craig Ford

Pagination Links