Title: Modern Cryptology: A Tutorial, Author: Gilles Brassard
Title: Computers Under Attack: Intruders, Worms and Viruses, Author: Peter Denning
Title: Number Theory and Cryptography, Author: J. H. Loxton
Title: Public-Key Cryptography: State of the Art and Future Directions: E.I.S.S. Workshop, Oberwolfach, Germany, July 3-6, 1991. Final Report, Author: Thomas Beth
Title: The DES : An Extensive Documentation and Evaluation of the Data Encryption Standard, Author: Mikael J. Simovits
Title: Cyberpunk: Outlaws and Hackers on the Computer Frontier, Author: Katie Hafner
Title: Java Cryptography, Author: Jonathan Knudsen
Title: Malicious Mobile Code: Virus Protection for Windows, Author: Roger Grimes
Title: Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios, Author: Mike Schiffman
Title: Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth, Author: Marcia S. Smith
Title: Symmetrische Verschlüsselungsverfahren: Design, Entwicklung und Kryptoanalyse klassischer und moderner Chiffren, Author: Michael Miller
Title: Secrets of Computer Espionage: Tactics and Countermeasures, Author: Joel McNamara
Title: PDA Security, Author: David Melnick
Title: Codierungstheorie: Eine Einführung, Author: Ralph-Hardo Schulz
Title: Cryptography For Dummies, Author: Chey Cobb
Title: Secrets and Lies: Digital Security in a Networked World, Author: Bruce Schneier
Title: Hardening Windows Systems, Author: Roberta Bragg
Title: Managing Security with Snort & IDS Tools: Intrusion Detection with Open Source Tools, Author: Kerry J. Cox
Title: Computer Forensics JumpStart, Author: Michael G. Solomon
Title: Honeypots for Windows, Author: Roger A. Grimes

Pagination Links