Title: Anti-Virus Tools and Techniques for Computer, Author: W. Timothy Polk
Title: Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios, Author: Mike Schiffman
Title: The Art of Deception: Controlling the Human Element of Security / Edition 1, Author: Kevin D. Mitnick
Title: Secrets of Computer Espionage: Tactics and Countermeasures / Edition 1, Author: Joel McNamara
Title: PDA Security, Author: David Melnick
Title: Java Cryptography Extensions, Author: Jason R. Weiss
Title: Citizen Cyborg: Why Democratic Societies Must Respond To The Redesigned Human Of The Future, Author: James Hughes
Title: Forensic Discovery (Addison-Wesley Professional Computing Series) / Edition 1, Author: Dan Farmer
Title: Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives, Author: Eric Cole
Title: Brute Force: Cracking the Data Encryption Standard / Edition 1, Author: Matt Curtin
Title: The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers / Edition 1, Author: Kevin D. Mitnick
Title: Host Integrity Monitoring Using Osiris and Samhain, Author: Brian Wotring
Title: Managing Cyberecurity Resources: A Financial Perspective / Edition 1, Author: Martin P. Loeb
Title: Skype Me! From Single User to Small Enterprise and Beyond, Author: Markus Daehne
Title: Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures / Edition 1, Author: Alessandro Aldini
Title: Perfect Password: Selection, Protection, Authentication, Author: Mark Burnett
Title: Zen and the Art of Information Security, Author: Ira Winkler
Title: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing, Author: Johnny Long
Title: Codes: An Introduction to Information Communication and Cryptography / Edition 1, Author: Norman L. Biggs
Title: Beautiful Security: Leading Security Experts Explain How They Think / Edition 1, Author: Andy Oram

Pagination Links