Books In Information Security
#
|
Book Title
|
INTERNET, COMPUTER AND SYSTEM SECURITY
|
1
|
Access and Identity Management: Controlling Access to Online Information
|
2
|
Network Security Incident Response
|
3
|
Wi-foo II: The Secrets of Wireless Hacking
|
4
|
Web Services Security Development and Architecture: Theoretical and Practical Issues
|
5
|
Cryptography and Network Security: Principles and Practice
|
6
|
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance
|
7
|
Inside Cyber Warfare
|
8
|
Beyond Hip: The End to Hacking As We Know It
|
9
|
Modelling Cyber Security: Approaches, Methodology, Strategies - Human and Societal Dynamics
|
10
|
Innovation in the Software Sector
|
11
|
It Security for Homeland Security Specialists
|
12
|
Using the Internet Safely for Seniors for Dummies
|
13
|
The Virtual Battlefield: Perspectives on Cyber Warfare
|
14
|
SSL and TLS: Theory and Practice
|
15
|
Computer and Network Technology: Proceedings of the International Conference on ICCMT 2009
|
16
|
Cloud Security and Privacy
|
17
|
Hacking Exposed Malware & Rootkits: Security Secrets & Solutions
|
18
|
Security Econometrics: The Dynamics of (In)security
|
19
|
Google Bomb
|
20
|
2009 Fourth International Conference on Internet Monitoring and Protection (Icimp)
|
21
|
Cyberspace and the National Security of the United Kingdom: Treats and Responses
|
22
|
Corporate Computer and Network Security
|
23
|
The Management of Network Security: Technology, Design, and Management Control
|
24
|
Applied Information Security: A Hands-on Guide to Information Security Software
|
25
|
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
|
26
|
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
|
27
|
Understanding Online Piracy: The Truth About Illegal File Sharing
|
28
|
2008 Third International Conference on Risks and Security of Internet and Systems (Crisis 2008)
|
29
|
Chained Exploits: Advanced Hacking Attacks
|
30
|
Security Monitoring
|
31
|
Network Security for Government and Corporate Executive
|
32
|
Information Security: Strategies for Understanding and Reducing Risks
|
33
|
Handbook of Research on Social and Organizational Liabilities in Information Security
|
34
|
Perceptual Differences of Urban Destination Websites: An Empirical Analysis Using the Example of the Capitals of the Nine Austrian Provinces
|
35
|
Cybercrime: Secure It or Lose It
|
36
|
Securing PHP Web Applications
|
37
|
Cyber Crime Fighters: Tales from the Trenches
|
38
|
Digital Rights Management for E-Commerce Systems
|
39
|
Governance of Picture Archiving and Communications Systems: Data Security and Quality Management of Filmless Radiology
|
40
|
Asterisk Essentials: A Practical Guide to Open Source Voice over Ip
|
41
|
Googling Security: How Much Does Google Know About You?
|
42
|
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
|
43
|
Spam 2 Scam How 2 B E-safe
|
44
|
Voice Over IP Security
|
45
|
C++ Hacker's Guide
|
46
|
Online Predators
|
47
|
Cisco Secure Firewall Services Module (FWSM)
|
48
|
The Hackers' Handbook 3.0
|
49
|
Applied Security Visualization
|
50
|
Hacking Exposed Linux: Linux Security Secrets & Solutions
|
51
|
Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem
|
52
|
Email Spam Filtering: A Systematic Review
|
53
|
Seguridad y propiedad intelectual en internet/ Internet Security and intellectual property
|
54
|
Internet Security for Parents: Discover the Hidden Dangers That You and Your Children Face Online
|
55
|
SSL Remote Access VPNs
|
56
|
Is It Safe?: Protecting Your Computer, Your Business, and Yourself Online
|
57
|
Guide to Firewalls and Network Security: Intrusion Detection and Vpns
|
58
|
It Security Management 100 Success Secrets: 100 Most Asked Questions the Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide
|
59
|
Integrating ISA Server 2006 with Microsoft Exchange 2007
|
60
|
Wireless Sensor Network Security
|
61
|
Cisco Firewall Video Mentor
|
62
|
Foundations of MAC OS X Leopard Security
|
63
|
The Future of the Internet and How to Stop It
|
64
|
Crimeware: Understanding New Attacks and Defenses
|
65
|
PCI DSS: A Practical Guide to Implementation
|
66
|
Security and Software for Cybercafes
|
67
|
Network Security Technologies and Solutions
|
68
|
Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities
|
69
|
Internet Security Today
|
70
|
SOA Security
|
71
|
Identity Theft: A Comprehensive Guide
|
72
|
The DotCrime Manifesto: How To Stop Internet Crime
|
73
|
Ajax Security
|
74
|
Microsoft ISA Server 2006 Unleashed
|
75
|
Hacking Exposed Malware & Rootkits
|
76
|
The Book of PF: A No-nonsense Guide to the OpenBSD Firewall
|
77
|
Geekonomics: The Real Cost of Insecure Software
|
78
|
The Craft of System Security
|
79
|
Critical Infrastructure Protection
|
80
|
Tiger Guide: Information Security
|
81
|
Web of Terror: Exposing Jihad on the Internet
|
82
|
End-to-End Network Security Defense-in-Depth
|
83
|
Cisco ASA, PIX, and FWSM Firewall Handbook
|
84
|
Lock the Boogie Man Out of Your Computer: The Easy Way to Stay Safe on the Internet
|
85
|
Information Security and Ethics: Concepts, Methodologies, Tools and Applications
|
86
|
Spam And Internet Privacy
|
87
|
Virtual Honeypots: From Botnet Tracking to Intrusion Detection
|
88
|
Security Monitoring With Cisco Security Mars
|
89
|
Toda la verdad sobre los peligros de internet/ The Whole Truth About the Dangers of Internet
|
90
|
Fuzzing: Brute Force Vulnerability Discovery
|
91
|
Hacking Windows Vista
|
92
|
Designing BSD Rootkits: An Introduction to Kernel Hacking
|
93
|
Security Simplified: Computer Internet Protection for Beginners
|
94
|
Security Metrics: Replacing Fear, Uncertainty, and Doubt
|
95
|
Endpoint Security
|
96
|
To Catch a Predator: Protecting Your Kids from Online Enemies Already in Your Home
|
97
|
2006 1st IEEE Workshop Voip Management and Security
|
98
|
The Good, the Spam, and the Ugly: Shooting It Out with Internet Bad Guys
|
99
|
The Radiobsd Crier 2007/01: Managing Freebsd and Netbsd Firewalls
|
100
|
Simple Computer Security: Disinfect Your PC
|
101
|
Internet Thieves You Must Avoid
|
102
|
Developer's Guide To Web Application Security
|
103
|
Secure Your Network for Free: Using NMAP, Wireshark, Snort, Nessus, And MRTG
|
104
|
Botnets: The Killer Web APP
|
105
|
Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress
|
106
|
PC Magazine Windows Vista Security Solutions
|
107
|
Secure E-Government Web Services
|
108
|
Enemy at the Water Cooler: Real-life Stories of Insider Threats and Enterprise Security Management Countermeasures
|
109
|
Patrolling Cyberspace: Lessons Learned from a Lifetime in Data Security
|
110
|
Network Security Hacks: Tips & Tools for Protecting Your Privacy
|
111
|
Developing More-secure Microsoft Asp.net 2.0 Applications
|
112
|
Network Security Assessment: From Vulnerability to Patch
|
113
|
Look Both Ways: Help Protect Your Family on the Internet
|
114
|
How to Cheat at Managing Information Security
|
115
|
Network Security 1 And 2 Companion Guide: Cisco Networking Academy Program
|
116
|
Self-defending Networks: The Next Generation of Network Security
|
117
|
Firewall Fundamentals
|
118
|
Configuring Ipcop Firewalls: Closing Borders With Open Source
|
119
|
Creacion De Sitios Web/ Creation of Websites
|
120
|
Hunting Security Bugs
|
121
|
Security Threat Mitigation And Response: Understanding Cisco Security Mars
|
122
|
The Openbsd Pf Packet Filter Book
|
123
|
Ipv6 Essentials
|
124
|
Cyberterrorism And Computer Attacks
|
125
|
IPsec Virtual Private Network Fundamentals
|
126
|
Virtually Criminal: Crime, Deviance, And Regulation Online
|
127
|
Network Security Essentials: Applications and Standards
|
128
|
Scientific Networking And the Global Health Network Supercourse
|
129
|
Just Enough Security: Information Security for Business Managers
|
130
|
How Personal & Internet Security Works
|
131
|
Cybersecurity And Homeland Security
|
132
|
Hacking Exposed Web Applications
|
133
|
Scams & Swindles: Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds How to Recognize And Avoid Rip-Offs In The Internet Age
|
134
|
Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, And Con Artists
|
135
|
Protecting Your PC
|
136
|
Steal This Computer Book 4.0: What They Won't Tell You About the Internet
|
137
|
Comparing, Designing, And Deploying Vpns
|
138
|
Terror on the Internet: The New Arena, the New Challenges
|
139
|
Protect Your Child on the Internet: A Parent's Toolkit
|
140
|
Software Security Library
|
141
|
Privacy Protection for E-services
|
142
|
Cyber Terrorism: Political And Economic Implications
|
143
|
Information Security Awareness Basics
|
144
|
Umts Security
|
145
|
Microsoft Internet Security And Acceleration (Isa) Server 2004: Administrator's Consultant
|
146
|
Preventing Web Attacks With Apache
|
147
|
Software Security: Building Security in
|
148
|
PC Magazine Windows Xp Security Solutions
|
149
|
Nine Steps to Success: An Iso 27001 Implementation Overview
|
150
|
The Case for Iso 27001
|
151
|
Intrusion Prevention Fundamentals
|
152
|
Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks And Effective Defenses
|
153
|
Sap Security: Sap Security Essentials
|
154
|
Cryptographic Libraries For Developers
|
155
|
Security Warrior
|
156
|
Information Warfare: how to survive Cyber Attacks?
|
157
|
Hacking Linux Exposed
|
158
|
Incident Response
|
159
|
Incident Response:Investigating Computer Crime
|
160
|
Hacker's Challenge
|
161
|
Cert Guide to System and Network Security
|
162
|
Know Your Enemy
|
163
|
Authentication: From Passwords to Public Keys
|
164
|
Honeypot Tracking Hackers
|
165
|
Web Hacking: Attacks and Defense
|
166
|
Building linux and openBSD firewalls
|
167
|
Anti Hacker ToolKit
|
168
|
Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems
|
169
|
Network Intrusion Detection, 3rd edition
|
170
|
Incident Response
|
COMPUTER FORENSICS
|
171
|
Guide to Computer Forensics and Investigations
|
172
|
Windows Forensic Analysis Dvd Toolkit
|
173
|
Computer Forensics: Principles And Practices
|
174
|
Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet
|
175
|
Computer Forensics Jumpstart
|
176
|
Macintosh OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
|
177
|
Real Digital Forensics: Computer Security And Incident Response
|
178
|
Multimedia Forensics and Security
|
179
|
Computer Forensics and Cyber Crime: An Introduction
|
180
|
Internet Forensics
|
181
|
Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring
|
182
|
Computer Forensics: Incident Response Essentials
|
183
|
UNIX and Linux Forensic Analysis DVD Toolkit
|
184
|
The Official CHFI Study Guide Exam 312-49: For Computer Hacking Forensic Investigator
|
185
|
Techno Security's Guide to E-Discovery and Digital Forensics
|
186
|
Forensic Discovery
|
187
|
Software Forensics: Collecting Evidence from the Scene of a Digital Crime
|
188
|
Advances in Digital Forensics II
|
189
|
Handbook of Digital and Multimedia Forensic Evidence
|
190
|
The Best Damn Cybercrime and Digital Forensics Book Period
|
191
|
Challenges to Digital Forensic Evidence
|
192
|
Digital Forensics
|
193
|
Forensic Digital Imaging and Photography
|
194
|
Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators
|
195
|
Forensic Uses of Digital Imaging
|
196
|
Digital Forensic Evidence Examination
|
197
|
Handbook of Research on Computational Forensics, Digital Crime, and Investigation:: Methods and Solutions
|
198
|
Gospeltelling to a Digital Culture: The Forensic Reconstruction of a Good Story
|
199
|
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
|
200
|
Handbook of Digital Forensics and Investigation
|
201
|
Open Source Software for Digital Forensics
|
202
|
Digital Forensics Ultimate Dvd
|
203
|
Handbook of Digital Evidence: Reliable Forensic Computing
|
204
|
Digital Crime and Forensic Science in Cyberspace
|
205
|
Natural Image Statistics in Digital Image Forensics
|
206
|
Elliptic Curves and Their Applications to Cryptography: An Introduction
|
CRYPTOGRAPHY
|
207
|
Primality Testing And Integer Factorization In Public-Key Cryptography
|
208
|
Cryptography
|
209
|
Broadband Quantum Cryptography
|
210
|
Cryptography And Network Security: Principles and Practices
|
211
|
Handbook of Financial Cryptography and Security
|
212
|
Cryptography: Theory And Practice
|
213
|
Introduction to Modern Cryptography: Principles And Protocols
|
214
|
Codes And Ciphers - a History of Cryptography
|
215
|
Progress On Cryptography: 25 Years Of Cryptography In China
|
216
|
Introduction to Cryptography and Network Security
|
217
|
Disappearing Cryptography: Information Hiding Steganography & Watermarking
|
218
|
Cryptography and Security Services: Mechanisms and Applications
|
219
|
Codes: An Introduction to Information Communication and Cryptography
|
220
|
Algebraic Geometry in Coding Theory and Cryptography
|
221
|
Codebreaker: The History of Codes and Ciphers, from the Ancient Pharaohs to Quantum Cryptography
|
222
|
Elementary Number Theory, Cryptography and Codes
|
223
|
Beginning Cryptography With Java
|
224
|
Foundations of Cryptography II: Basic Applications
|
225
|
Cryptography Research Perspectives
|
226
|
Cryptography Decrypted
|
227
|
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
|
228
|
Understanding and Applying Cryptography and Data Security
|
229
|
Contributions of Contemporary Cryptography
|
230
|
Icsa Guide to Cryptography
|
231
|
Introduction To Cryptography: With Coding Theory
|
232
|
Foundations of Cryptography: Basic Tools
|
233
|
Number Theoretic Methods in Cryptography: Complexity Lower Bounds
|
234
|
Contemporary Cryptography
|
235
|
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
|
236
|
Quantum Communications And Cryptography
|
237
|
Handbook of Applied Cryptography
|
238
|
Elliptic Curves: Theory and Cryptography
|
239
|
Cryptography & Privacy Sourcebook 1996
|
240
|
An Introduction to Cryptography
|
241
|
Algebraic Aspects of Cryptography
|
242
|
The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation
|
243
|
Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings
|
244
|
Post-Quantum Cryptography
|
245
|
Groebner Bases, Coding, and Cryptography
|
246
|
Cryptography and Computational Number Theory
|
247
|
Theory of Cryptography: Sixth Theory of Cryptography Conference, Tcc 2009, San Francisco, Ca, USA, March 15-17, 2009, Proceedings
|
248
|
Public Key Cryptography Nisi Publication
|
249
|
Cryptography: A Very Short Introduction
|
250
|
Codes and Cryptography
|
251
|
Cryptography and Coding, II
|
252
|
Introduction to Cryptography
|
253
|
Applied Cryptography: Protocols, Algorithms, and Source Code in C
|
254
|
Foundations of Cryptography
|
255
|
Protecting Information: From Classical Error Correction to Quantum Cryptography
|
256
|
Physics and Theoretical Computer Science: From Numbers and Languages to (Quantum) Cryptography
|
257
|
BFCA '05: Boolean Functions Cryptography and Applications
|
258
|
Theoretical Computer Science: Introduction to Automata, Compurability, Complexity, Algorithmics, Randomization, Communication, and Cryptography
|
259
|
Applied Cryptography And Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings
|
260
|
Financial Cryptography: 4th International Conference, Fc 2000, Anguilla, British West Indies, February 20-24, 2000, Proceedings
|
261
|
Modern Cryptography, Probabilistic Proofs and Pseudorandomness
|
262
|
Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings
|
263
|
Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity
|
264
|
Pairing-based Cryptography -- Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008. Proceedings
|
265
|
Understanding Cryptography: A Textbook for Students and Practitioners
|
266
|
Cryptography & Privacy Sourcebook (1996): Documents on Wiretapping, Cryptography, the Clipper Chip, Key Escrow & Export Controls
|
267
|
Towards a Quarter-Century of Public Key Cryptography: A Special Issue of Designs, Codes and Cryptography An International Journal Volume 19, Number 2/3 (2000)
|
268
|
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings
|
269
|
Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24,2007, Proceedings
|
270
|
Public Key Cryptography - PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, Ca, USA, March 18-20, 2009 Proceedings
|
271
|
Rsa Security's Official Guide to Cryptography
|
272
|
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
|
273
|
Public-Key Cryptography
|
274
|
Practical Cryptography
|
275
|
Complexity And Cryptography: An Introduction
|