Title: Mathematical Recreations & Essays: Twelfth Edition, Author: W. W. Rouse Ball
Title: Java Cryptography, Author: Jonathan Knudsen
Explore Series
Title: Effective Use of Teams for IT Audits, Author: Martin Krist
Title: E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks, Author: Syngress
Title: Legislating Privacy: Technology, Social Values, and Public Policy, Author: Priscilla M. Regan
Title: Database Nation: The Death of Privacy in the 21st Century, Author: Simson Garfinkel
Title: Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age, Author: Steven Levy
Title: Java Security: Writing and Deploying Secure Applications, Author: Scott Oaks
Title: Securing E-Business Applications and Communications, Author: Jonathan S. Held
Title: Malicious Mobile Code: Virus Protection for Windows, Author: Roger A. Grimes
Title: Building Secure Software: How to Avoid Security Problems the Right Way, Author: John Viega
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Handbook of Computer Crime Investigation: Forensic Tools and Technology, Author: MA Casey BS
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Cryptography: A Very Short Introduction, Author: Fred Piper
Title: Cryptography Demystified, Author: John Hershey
Explore Series
Title: Security Technologies for the World Wide Web, Second Edition, Author: Rolf Oppliger
Title: Writing Secure Code, Author: David LeBlanc
Title: Using the Common Criteria for IT Security Evaluation, Author: Debra S. Herrmann
Title: Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More, Author: John Viega

Pagination Links