Title: Mathematical Recreations & Essays: Twelfth Edition, Author: W. W. Rouse Ball
Title: Effective Use of Teams for IT Audits, Author: Martin Krist
Title: Securing E-Business Applications and Communications, Author: Jonathan S. Held
Title: Building Secure Software: How to Avoid Security Problems the Right Way, Author: John Viega
Title: A Practical Guide to Security Engineering and Information Assurance, Author: Debra S. Herrmann
Title: Handbook of Computer Crime Investigation: Forensic Tools and Technology, Author: MA Casey BS
Title: Building an Information Security Awareness Program, Author: Mark B. Desman
Title: Cryptography Demystified, Author: John Hershey
Explore Series
Title: Security Technologies for the World Wide Web, Second Edition, Author: Rolf Oppliger
Title: Using the Common Criteria for IT Security Evaluation, Author: Debra S. Herrmann
Title: Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More, Author: John Viega
Title: Investigator's Guide to Steganography, Author: Gregory Kipper
Title: Cisco Security Professional's Guide to Secure Intrusion Detection Systems, Author: Syngress
Title: The ABCs of LDAP: How to Install, Run, and Administer LDAP Services, Author: Reinhard E. Voglmaier
Title: Surviving Security: How to Integrate People, Process, and Technology, Author: Amanda Andress
Title: Software Security Engineering: A Guide for Project Managers, Author: Nancy Mead
Title: Hacking the Code: Auditor's Guide to Writing Secure Code for the Web, Author: Mark Burnett
Title: Public Key Infrastructure: Building Trusted Applications and Web Services, Author: John R. Vacca
Title: Information Security Policies and Procedures: A Practitioner's Reference, Second Edition, Author: Thomas R. Peltier
Title: Effective Oracle Database 10g Security by Design, Author: David Knox

Pagination Links