Title: Securing E-Business Applications and Communications, Author: Jonathan S. Held
Title: Building Secure Software: How to Avoid Security Problems the Right Way, Author: John Viega
Title: Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland, Author: Anthony H. Cordesman
Title: Internet and Wireless Security, Author: J. Regnault
Title: Checkpoint Next Generation Security Administration, Author: Syngress
Title: Securing and Controlling Cisco Routers, Author: Peter T. Davis
Title: Managing Cisco Network Security, Author: Syngress
Title: Security Technologies for the World Wide Web, Second Edition, Author: Rolf Oppliger
Title: Intelligent Networks: Principles and Applications, Author: J.R. Anderson
Explore Series
Title: Complete Book of Remote Access: Connectivity and Security, Author: Victor Kasacavage
Title: Snort Intrusion Detection 2.0, Author: Syngress
Title: Stealing The Network: How to Own the Box, Author: Syngress
Title: Internet Security: A Jumpstart for Systems Administrators and IT Managers, Author: Tim Speed
Title: Cisco Security Professional's Guide to Secure Intrusion Detection Systems, Author: Syngress
Title: The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks, Author: Susan Young
Title: Protocols for Secure Electronic Commerce, Author: Mostafa Hashem Sherif
Title: Strategic Information Security, Author: John Wylder
Title: Ethereal Packet Sniffing, Author: Syngress
Title: Network Security Architectures, Author: Sean Convery
Title: Software Security Engineering: A Guide for Project Managers, Author: Nancy Mead

Pagination Links