Title: Group-based Cryptography, Author: Alexei Myasnikov
Title: Network Security Hacks: Tips & Tools for Protecting Your Privacy, Author: Andrew Lockhart
Title: Formale Modellierung von Authentifizierungs- und Autorisierungsinfrastrukturen: Authentizität von deskriptiven Attributen und Privilegien auf der Basis digitaler Zertifikate, Author: Thomas Wölfl
Title: Professional Windows Desktop and Server Hardening, Author: Roger A. Grimes
Title: Hardening Windows, Author: Jonathan Hassell
Title: Internet Forensics: Using Digital Evidence to Solve Computer Crime, Author: Robert Jones
Title: Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures, Author: Alessandro Aldini
Title: Beginning Cryptography with Java, Author: David Hook
Title: The Database Hacker's Handbook: Defending Database Servers, Author: David Litchfield
Title: SSH, The Secure Shell: The Definitive Guide: The Definitive Guide, Author: Daniel Barrett
Title: Snort Cookbook: Solutions and Examples for Snort Administrators, Author: Angela Orebaugh
Title: Network Security Tools: Writing, Hacking, and Modifying Security Tools, Author: Nitesh Dhanjani
Title: Mastering FreeBSD and OpenBSD Security: Building, Securing, and Maintaining BSD Systems, Author: Yanek Korff
Title: Honeypots for Windows, Author: Roger A. Grimes
Title: Computer Forensics JumpStart, Author: Michael G. Solomon
Title: Managing Security with Snort & IDS Tools: Intrusion Detection with Open Source Tools, Author: Kerry J. Cox
Title: Hardening Windows Systems, Author: Roberta Bragg
Title: Cryptography For Dummies, Author: Chey Cobb
Title: Secrets and Lies: Digital Security in a Networked World, Author: Bruce Schneier
Title: Codierungstheorie: Eine Einführung, Author: Ralph-Hardo Schulz

Pagination Links