Category Computer security

Information Security Applications
information-security-applications-cover
This book constitutes the thoroughly refereed post-workshop ...
Cyberphobia
cyberphobia-cover
"Lucas [examines the cybercrime] confronting our security--b...
Information security
information-security-cover
"This book will be useful for IT professionals, students of ...
Advances in Information and Computer Security
advances-in-information-and-computer-security-cover
This book constitutes the refereed proceedings of the 7th In...
Advanced Communications and Multimedia Security
advanced-communications-and-multimedia-security-cover
Advanced Communications and Multimedia Security presents a s...
Information security and ethics
information-security-and-ethics-cover
"This compilation serves as the ultimate source on all theor...
Theory of Cryptography
theory-of-cryptography-cover
This book constitutes the thoroughly refereed proceedings of...
The web application hacker's handbook
the-web-application-hackers-handbook-cover
This book is a practical guide to discovering and exploiting...
PC magazine Windows XP security solutions
pc-magazine-windows-xp-security-solutions-cover
Aimed at the end user rather than the security professional,...
Chained exploits
chained-exploits-cover
Nowadays, it's rare for malicious hackers to rely on just on...
Data and Goliath
data-and-goliath-cover
From the Introduction... The bargain you make, again and ...
Information security fundamentals
information-security-fundamentals-cover
Effective security rules and procedures do not exist for the...
Security of Data and Transaction Processing
security-of-data-and-transaction-processing-cover
Security of Data and Transaction Processing brings together ...
Critical infrastructure protection in homeland security
critical-infrastructure-protection-in-homeland-security-cover
A scientific approach to the new field of critical infrastru...
Testing code security
testing-code-security-cover
The huge proliferation of security vulnerability exploits, w...
Security+ exam cram 2 lab manual
security-exam-cram-2-lab-manual-cover
Put your Security+ knowledge to the test. The Security+ Cert...
Open Source E-mail Security
open-source-e-mail-security-cover
In this book you'll learn the technology underlying secure e...
CISSP
cissp-cover
Building on the popular Sybex Study Guide approach, CISSP: C...