Books In Information Security

Books In Information Security
# Book Title
INTERNET, COMPUTER AND SYSTEM SECURITY
1 Access and Identity Management: Controlling Access to Online Information
2 Network Security Incident Response
3 Wi-foo II: The Secrets of Wireless Hacking
4 Web Services Security Development and Architecture: Theoretical and Practical Issues
5 Cryptography and Network Security: Principles and Practice
6 Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance
7 Inside Cyber Warfare
8 Beyond Hip: The End to Hacking As We Know It
9 Modelling Cyber Security: Approaches, Methodology, Strategies - Human and Societal Dynamics
10 Innovation in the Software Sector
11 It Security for Homeland Security Specialists
12 Using the Internet Safely for Seniors for Dummies
13 The Virtual Battlefield: Perspectives on Cyber Warfare
14 SSL and TLS: Theory and Practice
15 Computer and Network Technology: Proceedings of the International Conference on ICCMT 2009
16 Cloud Security and Privacy
17 Hacking Exposed Malware & Rootkits: Security Secrets & Solutions
18 Security Econometrics: The Dynamics of (In)security
19 Google Bomb
20 2009 Fourth International Conference on Internet Monitoring and Protection (Icimp)
21 Cyberspace and the National Security of the United Kingdom: Treats and Responses
22 Corporate Computer and Network Security
23 The Management of Network Security: Technology, Design, and Management Control
24 Applied Information Security: A Hands-on Guide to Information Security Software
25 The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
26 Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
27 Understanding Online Piracy: The Truth About Illegal File Sharing
28 2008 Third International Conference on Risks and Security of Internet and Systems (Crisis 2008)
29 Chained Exploits: Advanced Hacking Attacks
30 Security Monitoring
31 Network Security for Government and Corporate Executive
32 Information Security: Strategies for Understanding and Reducing Risks
33 Handbook of Research on Social and Organizational Liabilities in Information Security
34 Perceptual Differences of Urban Destination Websites: An Empirical Analysis Using the Example of the Capitals of the Nine Austrian Provinces
35 Cybercrime: Secure It or Lose It
36 Securing PHP Web Applications
37 Cyber Crime Fighters: Tales from the Trenches
38 Digital Rights Management for E-Commerce Systems
39 Governance of Picture Archiving and Communications Systems: Data Security and Quality Management of Filmless Radiology
40 Asterisk Essentials: A Practical Guide to Open Source Voice over Ip
41 Googling Security: How Much Does Google Know About You?
42 Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
43 Spam 2 Scam How 2 B E-safe
44 Voice Over IP Security
45 C++ Hacker's Guide
46 Online Predators
47 Cisco Secure Firewall Services Module (FWSM)
48 The Hackers' Handbook 3.0
49 Applied Security Visualization
50 Hacking Exposed Linux: Linux Security Secrets & Solutions
51 Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem
52 Email Spam Filtering: A Systematic Review
53 Seguridad y propiedad intelectual en internet/ Internet Security and intellectual property
54 Internet Security for Parents: Discover the Hidden Dangers That You and Your Children Face Online
55 SSL Remote Access VPNs
56 Is It Safe?: Protecting Your Computer, Your Business, and Yourself Online
57 Guide to Firewalls and Network Security: Intrusion Detection and Vpns
58 It Security Management 100 Success Secrets: 100 Most Asked Questions the Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide
59 Integrating ISA Server 2006 with Microsoft Exchange 2007
60 Wireless Sensor Network Security
61 Cisco Firewall Video Mentor
62 Foundations of MAC OS X Leopard Security
63 The Future of the Internet and How to Stop It
64 Crimeware: Understanding New Attacks and Defenses
65 PCI DSS: A Practical Guide to Implementation
66 Security and Software for Cybercafes
67 Network Security Technologies and Solutions
68 Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities
69 Internet Security Today
70 SOA Security
71 Identity Theft: A Comprehensive Guide
72 The DotCrime Manifesto: How To Stop Internet Crime
73 Ajax Security
74 Microsoft ISA Server 2006 Unleashed
75 Hacking Exposed Malware & Rootkits
76 The Book of PF: A No-nonsense Guide to the OpenBSD Firewall
77 Geekonomics: The Real Cost of Insecure Software
78 The Craft of System Security
79 Critical Infrastructure Protection
80 Tiger Guide: Information Security
81 Web of Terror: Exposing Jihad on the Internet
82 End-to-End Network Security Defense-in-Depth
83 Cisco ASA, PIX, and FWSM Firewall Handbook
84 Lock the Boogie Man Out of Your Computer: The Easy Way to Stay Safe on the Internet
85 Information Security and Ethics: Concepts, Methodologies, Tools and Applications
86 Spam And Internet Privacy
87 Virtual Honeypots: From Botnet Tracking to Intrusion Detection
88 Security Monitoring With Cisco Security Mars
89 Toda la verdad sobre los peligros de internet/ The Whole Truth About the Dangers of Internet
90 Fuzzing: Brute Force Vulnerability Discovery
91 Hacking Windows Vista
92 Designing BSD Rootkits: An Introduction to Kernel Hacking
93 Security Simplified: Computer Internet Protection for Beginners
94 Security Metrics: Replacing Fear, Uncertainty, and Doubt
95 Endpoint Security
96 To Catch a Predator: Protecting Your Kids from Online Enemies Already in Your Home
97 2006 1st IEEE Workshop Voip Management and Security
98 The Good, the Spam, and the Ugly: Shooting It Out with Internet Bad Guys
99 The Radiobsd Crier 2007/01: Managing Freebsd and Netbsd Firewalls
100 Simple Computer Security: Disinfect Your PC
101 Internet Thieves You Must Avoid
102 Developer's Guide To Web Application Security
103 Secure Your Network for Free: Using NMAP, Wireshark, Snort, Nessus, And MRTG
104 Botnets: The Killer Web APP
105 Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress
106 PC Magazine Windows Vista Security Solutions
107 Secure E-Government Web Services
108 Enemy at the Water Cooler: Real-life Stories of Insider Threats and Enterprise Security Management Countermeasures
109 Patrolling Cyberspace: Lessons Learned from a Lifetime in Data Security
110 Network Security Hacks: Tips & Tools for Protecting Your Privacy
111 Developing More-secure Microsoft Asp.net 2.0 Applications
112 Network Security Assessment: From Vulnerability to Patch
113 Look Both Ways: Help Protect Your Family on the Internet
114 How to Cheat at Managing Information Security
115 Network Security 1 And 2 Companion Guide: Cisco Networking Academy Program
116 Self-defending Networks: The Next Generation of Network Security
117 Firewall Fundamentals
118 Configuring Ipcop Firewalls: Closing Borders With Open Source
119 Creacion De Sitios Web/ Creation of Websites
120 Hunting Security Bugs
121 Security Threat Mitigation And Response: Understanding Cisco Security Mars
122 The Openbsd Pf Packet Filter Book
123 Ipv6 Essentials
124 Cyberterrorism And Computer Attacks
125 IPsec Virtual Private Network Fundamentals
126 Virtually Criminal: Crime, Deviance, And Regulation Online
127 Network Security Essentials: Applications and Standards
128 Scientific Networking And the Global Health Network Supercourse
129 Just Enough Security: Information Security for Business Managers
130 How Personal & Internet Security Works
131 Cybersecurity And Homeland Security
132 Hacking Exposed Web Applications
133 Scams & Swindles: Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds How to Recognize And Avoid Rip-Offs In The Internet Age
134 Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, And Con Artists
135 Protecting Your PC
136 Steal This Computer Book 4.0: What They Won't Tell You About the Internet
137 Comparing, Designing, And Deploying Vpns
138 Terror on the Internet: The New Arena, the New Challenges
139 Protect Your Child on the Internet: A Parent's Toolkit
140 Software Security Library
141 Privacy Protection for E-services
142 Cyber Terrorism: Political And Economic Implications
143 Information Security Awareness Basics
144 Umts Security
145 Microsoft Internet Security And Acceleration (Isa) Server 2004: Administrator's Consultant
146 Preventing Web Attacks With Apache
147 Software Security: Building Security in
148 PC Magazine Windows Xp Security Solutions
149 Nine Steps to Success: An Iso 27001 Implementation Overview
150 The Case for Iso 27001
151 Intrusion Prevention Fundamentals
152 Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks And Effective Defenses
153 Sap Security: Sap Security Essentials
154 Cryptographic Libraries For Developers
155 Security Warrior
156 Information Warfare: how to survive Cyber Attacks?
157 Hacking Linux Exposed
158 Incident Response
159 Incident Response:Investigating Computer Crime
160 Hacker's Challenge
161 Cert Guide to System and Network Security
162 Know Your Enemy
163 Authentication: From Passwords to Public Keys
164 Honeypot Tracking Hackers
165 Web Hacking: Attacks and Defense
166 Building linux and openBSD firewalls
167 Anti Hacker ToolKit
168 Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems
169 Network Intrusion Detection, 3rd edition
170 Incident Response
COMPUTER FORENSICS
171 Guide to Computer Forensics and Investigations
172 Windows Forensic Analysis Dvd Toolkit
173 Computer Forensics: Principles And Practices
174 Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet
175 Computer Forensics Jumpstart
176 Macintosh OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
177 Real Digital Forensics: Computer Security And Incident Response
178 Multimedia Forensics and Security
179 Computer Forensics and Cyber Crime: An Introduction
180 Internet Forensics
181 Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring
182 Computer Forensics: Incident Response Essentials
183 UNIX and Linux Forensic Analysis DVD Toolkit
184 The Official CHFI Study Guide Exam 312-49: For Computer Hacking Forensic Investigator
185 Techno Security's Guide to E-Discovery and Digital Forensics
186 Forensic Discovery
187 Software Forensics: Collecting Evidence from the Scene of a Digital Crime
188 Advances in Digital Forensics II
189 Handbook of Digital and Multimedia Forensic Evidence
190 The Best Damn Cybercrime and Digital Forensics Book Period
191 Challenges to Digital Forensic Evidence
192 Digital Forensics
193 Forensic Digital Imaging and Photography
194 Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators
195 Forensic Uses of Digital Imaging
196 Digital Forensic Evidence Examination
197 Handbook of Research on Computational Forensics, Digital Crime, and Investigation:: Methods and Solutions
198 Gospeltelling to a Digital Culture: The Forensic Reconstruction of a Good Story
199 Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
200 Handbook of Digital Forensics and Investigation
201 Open Source Software for Digital Forensics
202 Digital Forensics Ultimate Dvd
203 Handbook of Digital Evidence: Reliable Forensic Computing
204 Digital Crime and Forensic Science in Cyberspace
205 Natural Image Statistics in Digital Image Forensics
206 Elliptic Curves and Their Applications to Cryptography: An Introduction
CRYPTOGRAPHY
207 Primality Testing And Integer Factorization In Public-Key Cryptography
208 Cryptography
209 Broadband Quantum Cryptography
210 Cryptography And Network Security: Principles and Practices
211 Handbook of Financial Cryptography and Security
212 Cryptography: Theory And Practice
213 Introduction to Modern Cryptography: Principles And Protocols
214 Codes And Ciphers - a History of Cryptography
215 Progress On Cryptography: 25 Years Of Cryptography In China
216 Introduction to Cryptography and Network Security
217 Disappearing Cryptography: Information Hiding Steganography & Watermarking
218 Cryptography and Security Services: Mechanisms and Applications
219 Codes: An Introduction to Information Communication and Cryptography
220 Algebraic Geometry in Coding Theory and Cryptography
221 Codebreaker: The History of Codes and Ciphers, from the Ancient Pharaohs to Quantum Cryptography
222 Elementary Number Theory, Cryptography and Codes
223 Beginning Cryptography With Java
224 Foundations of Cryptography II: Basic Applications
225 Cryptography Research Perspectives
226 Cryptography Decrypted
227 Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
228 Understanding and Applying Cryptography and Data Security
229 Contributions of Contemporary Cryptography
230 Icsa Guide to Cryptography
231 Introduction To Cryptography: With Coding Theory
232 Foundations of Cryptography: Basic Tools
233 Number Theoretic Methods in Cryptography: Complexity Lower Bounds
234 Contemporary Cryptography
235 The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
236 Quantum Communications And Cryptography
237 Handbook of Applied Cryptography
238 Elliptic Curves: Theory and Cryptography
239 Cryptography & Privacy Sourcebook 1996
240 An Introduction to Cryptography
241 Algebraic Aspects of Cryptography
242 The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation
243 Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings
244 Post-Quantum Cryptography
245 Groebner Bases, Coding, and Cryptography
246 Cryptography and Computational Number Theory
247 Theory of Cryptography: Sixth Theory of Cryptography Conference, Tcc 2009, San Francisco, Ca, USA, March 15-17, 2009, Proceedings
248 Public Key Cryptography Nisi Publication
249 Cryptography: A Very Short Introduction
250 Codes and Cryptography
251 Cryptography and Coding, II
252 Introduction to Cryptography
253 Applied Cryptography: Protocols, Algorithms, and Source Code in C
254 Foundations of Cryptography
255 Protecting Information: From Classical Error Correction to Quantum Cryptography
256 Physics and Theoretical Computer Science: From Numbers and Languages to (Quantum) Cryptography
257 BFCA '05: Boolean Functions Cryptography and Applications
258 Theoretical Computer Science: Introduction to Automata, Compurability, Complexity, Algorithmics, Randomization, Communication, and Cryptography
259 Applied Cryptography And Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings
260 Financial Cryptography: 4th International Conference, Fc 2000, Anguilla, British West Indies, February 20-24, 2000, Proceedings
261 Modern Cryptography, Probabilistic Proofs and Pseudorandomness
262 Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings
263 Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity
264 Pairing-based Cryptography -- Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008. Proceedings
265 Understanding Cryptography: A Textbook for Students and Practitioners
266 Cryptography & Privacy Sourcebook (1996): Documents on Wiretapping, Cryptography, the Clipper Chip, Key Escrow & Export Controls
267 Towards a Quarter-Century of Public Key Cryptography: A Special Issue of Designs, Codes and Cryptography An International Journal Volume 19, Number 2/3 (2000)
268 Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings
269 Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24,2007, Proceedings
270 Public Key Cryptography - PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, Ca, USA, March 18-20, 2009 Proceedings
271 Rsa Security's Official Guide to Cryptography
272 The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
273 Public-Key Cryptography
274 Practical Cryptography
275 Complexity And Cryptography: An Introduction

Database Sections