Books In Information Security
    
    
        | 
        	#
         | 
        
        	Book Title
         | 
    
    
        | 
        	INTERNET, COMPUTER AND SYSTEM SECURITY
         | 
    
    
        | 
        	1
         | 
        
        	Access and Identity Management: Controlling Access to Online Information
         | 
    
    
        | 
        	2
         | 
        
        	Network Security Incident Response
         | 
    
    
        | 
        	3
         | 
        
        	Wi-foo II: The Secrets of Wireless Hacking
         | 
    
    
        | 
        	4
         | 
        
        	Web Services Security Development and Architecture: Theoretical and Practical Issues
         | 
    
    
        | 
        	5
         | 
        
        	Cryptography and Network Security: Principles and Practice
         | 
    
    
        | 
        	6
         | 
        
        	Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance
         | 
    
    
        | 
        	7
         | 
        
        	Inside Cyber Warfare
         | 
    
    
        | 
        	8
         | 
        
        	Beyond Hip: The End to Hacking As We Know It
         | 
    
    
        | 
        	9
         | 
        
        	Modelling Cyber Security: Approaches, Methodology, Strategies - Human and Societal Dynamics
         | 
    
    
        | 
        	10
         | 
        
        	Innovation in the Software Sector
         | 
    
    
        | 
        	11
         | 
        
        	It Security for Homeland Security Specialists
         | 
    
    
        | 
        	12
         | 
        
        	Using the Internet Safely for Seniors for Dummies
         | 
    
    
        | 
        	13
         | 
        
        	The Virtual Battlefield: Perspectives on Cyber Warfare
         | 
    
    
        | 
        	14
         | 
        
        	SSL and TLS: Theory and Practice
         | 
    
    
        | 
        	15
         | 
        
        	Computer and Network Technology: Proceedings of the International Conference on ICCMT 2009
         | 
    
    
        | 
        	16
         | 
        
        	Cloud Security and Privacy
         | 
    
    
        | 
        	17
         | 
        
        	Hacking Exposed Malware & Rootkits: Security Secrets & Solutions
         | 
    
    
        | 
        	18
         | 
        
        	Security Econometrics: The Dynamics of (In)security
         | 
    
    
        | 
        	19
         | 
        
        	Google Bomb
         | 
    
    
        | 
        	20
         | 
        
        	2009 Fourth International Conference on Internet Monitoring and Protection (Icimp)
         | 
    
    
        | 
        	21
         | 
        
        	Cyberspace and the National Security of the United Kingdom: Treats and Responses
         | 
    
    
        | 
        	22
         | 
        
        	Corporate Computer and Network Security
         | 
    
    
        | 
        	23
         | 
        
        	The Management of Network Security: Technology, Design, and Management Control
         | 
    
    
        | 
        	24
         | 
        
        	Applied Information Security: A Hands-on Guide to Information Security Software
         | 
    
    
        | 
        	25
         | 
        
        	The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
         | 
    
    
        | 
        	26
         | 
        
        	Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
         | 
    
    
        | 
        	27
         | 
        
        	Understanding Online Piracy: The Truth About Illegal File Sharing
         | 
    
    
        | 
        	28
         | 
        
        	2008 Third International Conference on Risks and Security of Internet and Systems (Crisis 2008)
         | 
    
    
        | 
        	29
         | 
        
        	Chained Exploits: Advanced Hacking Attacks
         | 
    
    
        | 
        	30
         | 
        
        	Security Monitoring
         | 
    
    
        | 
        	31
         | 
        
        	Network Security for Government and Corporate Executive
         | 
    
    
        | 
        	32
         | 
        
        	Information Security: Strategies for Understanding and Reducing Risks
         | 
    
    
        | 
        	33
         | 
        
        	Handbook of Research on Social and Organizational Liabilities in Information Security
         | 
    
    
        | 
        	34
         | 
        
        	Perceptual Differences of Urban Destination Websites: An Empirical Analysis Using the Example of the Capitals of the Nine Austrian Provinces
         | 
    
    
        | 
        	35
         | 
        
        	Cybercrime: Secure It or Lose It
         | 
    
    
        | 
        	36
         | 
        
        	Securing PHP Web Applications
         | 
    
    
        | 
        	37
         | 
        
        	Cyber Crime Fighters: Tales from the Trenches
         | 
    
    
        | 
        	38
         | 
        
        	Digital Rights Management for E-Commerce Systems
         | 
    
    
        | 
        	39
         | 
        
        	Governance of Picture Archiving and Communications Systems: Data Security and Quality Management of Filmless Radiology
         | 
    
    
        | 
        	40
         | 
        
        	Asterisk Essentials: A Practical Guide to Open Source Voice over Ip
         | 
    
    
        | 
        	41
         | 
        
        	Googling Security: How Much Does Google Know About You?
         | 
    
    
        | 
        	42
         | 
        
        	Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
         | 
    
    
        | 
        	43
         | 
        
        	Spam 2 Scam How 2 B E-safe
         | 
    
    
        | 
        	44
         | 
        
        	Voice Over IP Security
         | 
    
    
        | 
        	45
         | 
        
        	C++ Hacker's Guide
         | 
    
    
        | 
        	46
         | 
        
        	Online Predators
         | 
    
    
        | 
        	47
         | 
        
        	Cisco Secure Firewall Services Module (FWSM)
         | 
    
    
        | 
        	48
         | 
        
        	The Hackers' Handbook 3.0
         | 
    
    
        | 
        	49
         | 
        
        	Applied Security Visualization
         | 
    
    
        | 
        	50
         | 
        
        	Hacking Exposed Linux: Linux Security Secrets & Solutions
         | 
    
    
        | 
        	51
         | 
        
        	Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem
         | 
    
    
        | 
        	52
         | 
        
        	Email Spam Filtering: A Systematic Review
         | 
    
    
        | 
        	53
         | 
        
        	Seguridad y propiedad intelectual en internet/ Internet Security and intellectual property
         | 
    
    
        | 
        	54
         | 
        
        	Internet Security for Parents: Discover the Hidden Dangers That You and Your Children Face Online
         | 
    
    
        | 
        	55
         | 
        
        	SSL Remote Access VPNs
         | 
    
    
        | 
        	56
         | 
        
        	Is It Safe?: Protecting Your Computer, Your Business, and Yourself Online
         | 
    
    
        | 
        	57
         | 
        
        	Guide to Firewalls and Network Security: Intrusion Detection and Vpns
         | 
    
    
        | 
        	58
         | 
        
        	It Security Management 100 Success Secrets: 100 Most Asked Questions the Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide
         | 
    
    
        | 
        	59
         | 
        
        	Integrating ISA Server 2006 with Microsoft Exchange 2007
         | 
    
    
        | 
        	60
         | 
        
        	Wireless Sensor Network Security
         | 
    
    
        | 
        	61
         | 
        
        	Cisco Firewall Video Mentor
         | 
    
    
        | 
        	62
         | 
        
        	Foundations of MAC OS X Leopard Security
         | 
    
    
        | 
        	63
         | 
        
        	The Future of the Internet and How to Stop It
         | 
    
    
        | 
        	64
         | 
        
        	Crimeware: Understanding New Attacks and Defenses
         | 
    
    
        | 
        	65
         | 
        
        	PCI DSS: A Practical Guide to Implementation
         | 
    
    
        | 
        	66
         | 
        
        	Security and Software for Cybercafes
         | 
    
    
        | 
        	67
         | 
        
        	Network Security Technologies and Solutions
         | 
    
    
        | 
        	68
         | 
        
        	Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities
         | 
    
    
        | 
        	69
         | 
        
        	Internet Security Today
         | 
    
    
        | 
        	70
         | 
        
        	SOA Security
         | 
    
    
        | 
        	71
         | 
        
        	Identity Theft: A Comprehensive Guide
         | 
    
    
        | 
        	72
         | 
        
        	The DotCrime Manifesto: How To Stop Internet Crime
         | 
    
    
        | 
        	73
         | 
        
        	Ajax Security
         | 
    
    
        | 
        	74
         | 
        
        	Microsoft ISA Server 2006 Unleashed
         | 
    
    
        | 
        	75
         | 
        
        	Hacking Exposed Malware & Rootkits
         | 
    
    
        | 
        	76
         | 
        
        	The Book of PF: A No-nonsense Guide to the OpenBSD Firewall
         | 
    
    
        | 
        	77
         | 
        
        	Geekonomics: The Real Cost of Insecure Software
         | 
    
    
        | 
        	78
         | 
        
        	The Craft of System Security
         | 
    
    
        | 
        	79
         | 
        
        	Critical Infrastructure Protection
         | 
    
    
        | 
        	80
         | 
        
        	Tiger Guide: Information Security
         | 
    
    
        | 
        	81
         | 
        
        	Web of Terror: Exposing Jihad on the Internet
         | 
    
    
        | 
        	82
         | 
        
        	End-to-End Network Security Defense-in-Depth
         | 
    
    
        | 
        	83
         | 
        
        	Cisco ASA, PIX, and FWSM Firewall Handbook
         | 
    
    
        | 
        	84
         | 
        
        	Lock the Boogie Man Out of Your Computer: The Easy Way to Stay Safe on the Internet
         | 
    
    
        | 
        	85
         | 
        
        	Information Security and Ethics: Concepts, Methodologies, Tools and Applications
         | 
    
    
        | 
        	86
         | 
        
        	Spam And Internet Privacy
         | 
    
    
        | 
        	87
         | 
        
        	Virtual Honeypots: From Botnet Tracking to Intrusion Detection
         | 
    
    
        | 
        	88
         | 
        
        	Security Monitoring With Cisco Security Mars
         | 
    
    
        | 
        	89
         | 
        
        	Toda la verdad sobre los peligros de internet/ The Whole Truth About the Dangers of Internet
         | 
    
    
        | 
        	90
         | 
        
        	Fuzzing: Brute Force Vulnerability Discovery
         | 
    
    
        | 
        	91
         | 
        
        	Hacking Windows Vista
         | 
    
    
        | 
        	92
         | 
        
        	Designing BSD Rootkits: An Introduction to Kernel Hacking
         | 
    
    
        | 
        	93
         | 
        
        	Security Simplified: Computer Internet Protection for Beginners
         | 
    
    
        | 
        	94
         | 
        
        	Security Metrics: Replacing Fear, Uncertainty, and Doubt
         | 
    
    
        | 
        	95
         | 
        
        	Endpoint Security
         | 
    
    
        | 
        	96
         | 
        
        	To Catch a Predator: Protecting Your Kids from Online Enemies Already in Your Home
         | 
    
    
        | 
        	97
         | 
        
        	2006 1st IEEE Workshop Voip Management and Security
         | 
    
    
        | 
        	98
         | 
        
        	The Good, the Spam, and the Ugly: Shooting It Out with Internet Bad Guys
         | 
    
    
        | 
        	99
         | 
        
        	The Radiobsd Crier 2007/01: Managing Freebsd and Netbsd Firewalls
         | 
    
    
        | 
        	100
         | 
        
        	Simple Computer Security: Disinfect Your PC
         | 
    
    
        | 
        	101
         | 
        
        	Internet Thieves You Must Avoid
         | 
    
    
        | 
        	102
         | 
        
        	Developer's Guide To Web Application Security
         | 
    
    
        | 
        	103
         | 
        
        	Secure Your Network for Free: Using NMAP, Wireshark, Snort, Nessus, And MRTG
         | 
    
    
        | 
        	104
         | 
        
        	Botnets: The Killer Web APP
         | 
    
    
        | 
        	105
         | 
        
        	Cyberbullying and Cyberthreats: Responding to the Challenge of Online Social Aggression, Threats, and Distress
         | 
    
    
        | 
        	106
         | 
        
        	PC Magazine Windows Vista Security Solutions
         | 
    
    
        | 
        	107
         | 
        
        	Secure E-Government Web Services
         | 
    
    
        | 
        	108
         | 
        
        	Enemy at the Water Cooler: Real-life Stories of Insider Threats and Enterprise Security Management Countermeasures
         | 
    
    
        | 
        	109
         | 
        
        	Patrolling Cyberspace: Lessons Learned from a Lifetime in Data Security
         | 
    
    
        | 
        	110
         | 
        
        	Network Security Hacks: Tips & Tools for Protecting Your Privacy
         | 
    
    
        | 
        	111
         | 
        
        	Developing More-secure Microsoft Asp.net 2.0 Applications
         | 
    
    
        | 
        	112
         | 
        
        	Network Security Assessment: From Vulnerability to Patch
         | 
    
    
        | 
        	113
         | 
        
        	Look Both Ways: Help Protect Your Family on the Internet
         | 
    
    
        | 
        	114
         | 
        
        	How to Cheat at Managing Information Security
         | 
    
    
        | 
        	115
         | 
        
        	Network Security 1 And 2 Companion Guide: Cisco Networking Academy Program
         | 
    
    
        | 
        	116
         | 
        
        	Self-defending Networks: The Next Generation of Network Security
         | 
    
    
        | 
        	117
         | 
        
        	Firewall Fundamentals
         | 
    
    
        | 
        	118
         | 
        
        	Configuring Ipcop Firewalls: Closing Borders With Open Source
         | 
    
    
        | 
        	119
         | 
        
        	Creacion De Sitios Web/ Creation of Websites
         | 
    
    
        | 
        	120
         | 
        
        	Hunting Security Bugs
         | 
    
    
        | 
        	121
         | 
        
        	Security Threat Mitigation And Response: Understanding Cisco Security Mars
         | 
    
    
        | 
        	122
         | 
        
        	The Openbsd Pf Packet Filter Book
         | 
    
    
        | 
        	123
         | 
        
        	Ipv6 Essentials
         | 
    
    
        | 
        	124
         | 
        
        	Cyberterrorism And Computer Attacks
         | 
    
    
        | 
        	125
         | 
        
        	IPsec Virtual Private Network Fundamentals
         | 
    
    
        | 
        	126
         | 
        
        	Virtually Criminal: Crime, Deviance, And Regulation Online
         | 
    
    
        | 
        	127
         | 
        
        	Network Security Essentials: Applications and Standards
         | 
    
    
        | 
        	128
         | 
        
        	Scientific Networking And the Global Health Network Supercourse
         | 
    
    
        | 
        	129
         | 
        
        	Just Enough Security: Information Security for Business Managers
         | 
    
    
        | 
        	130
         | 
        
        	How Personal & Internet Security Works
         | 
    
    
        | 
        	131
         | 
        
        	Cybersecurity And Homeland Security
         | 
    
    
        | 
        	132
         | 
        
        	Hacking Exposed Web Applications
         | 
    
    
        | 
        	133
         | 
        
        	Scams & Swindles: Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds How to Recognize And Avoid Rip-Offs In The Internet Age
         | 
    
    
        | 
        	134
         | 
        
        	Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, And Con Artists
         | 
    
    
        | 
        	135
         | 
        
        	Protecting Your PC
         | 
    
    
        | 
        	136
         | 
        
        	Steal This Computer Book 4.0: What They Won't Tell You About the Internet
         | 
    
    
        | 
        	137
         | 
        
        	Comparing, Designing, And Deploying Vpns
         | 
    
    
        | 
        	138
         | 
        
        	Terror on the Internet: The New Arena, the New Challenges
         | 
    
    
        | 
        	139
         | 
        
        	Protect Your Child on the Internet: A Parent's Toolkit
         | 
    
    
        | 
        	140
         | 
        
        	Software Security Library
         | 
    
    
        | 
        	141
         | 
        
        	Privacy Protection for E-services
         | 
    
    
        | 
        	142
         | 
        
        	Cyber Terrorism: Political And Economic Implications
         | 
    
    
        | 
        	143
         | 
        
        	Information Security Awareness Basics
         | 
    
    
        | 
        	144
         | 
        
        	Umts Security
         | 
    
    
        | 
        	145
         | 
        
        	Microsoft Internet Security And Acceleration (Isa) Server 2004: Administrator's Consultant
         | 
    
    
        | 
        	146
         | 
        
        	Preventing Web Attacks With Apache
         | 
    
    
        | 
        	147
         | 
        
        	Software Security: Building Security in
         | 
    
    
        | 
        	148
         | 
        
        	PC Magazine Windows Xp Security Solutions
         | 
    
    
        | 
        	149
         | 
        
        	Nine Steps to Success: An Iso 27001 Implementation Overview
         | 
    
    
        | 
        	150
         | 
        
        	The Case for Iso 27001
         | 
    
    
        | 
        	151
         | 
        
        	Intrusion Prevention Fundamentals
         | 
    
    
        | 
        	152
         | 
        
        	Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks And Effective Defenses
         | 
    
    
        | 
        	153
         | 
        
        	Sap Security: Sap Security Essentials
         | 
    
    
        | 
        	154
         | 
        
        	Cryptographic Libraries For Developers
         | 
    
    
        | 
        	155
         | 
        
        	Security Warrior
         | 
    
    
        | 
        	156
         | 
        
        	Information Warfare: how to survive Cyber Attacks?
         | 
    
    
        | 
        	157
         | 
        
        	Hacking Linux Exposed
         | 
    
    
        | 
        	158
         | 
        
        	Incident Response
         | 
    
    
        | 
        	159
         | 
        
        	Incident Response:Investigating Computer Crime
         | 
    
    
        | 
        	160
         | 
        
        	Hacker's Challenge
         | 
    
    
        | 
        	161
         | 
        
        	Cert Guide to System and Network Security
         | 
    
    
        | 
        	162
         | 
        
        	Know Your Enemy
         | 
    
    
        | 
        	163
         | 
        
        	Authentication: From Passwords to Public Keys
         | 
    
    
        | 
        	164
         | 
        
        	Honeypot Tracking Hackers
         | 
    
    
        | 
        	165
         | 
        
        	Web Hacking: Attacks and Defense
         | 
    
    
        | 
        	166
         | 
        
        	Building linux and openBSD firewalls
         | 
    
    
        | 
        	167
         | 
        
        	Anti Hacker ToolKit
         | 
    
    
        | 
        	168
         | 
        
        	Inside Network Perimeter Security: The Definitive Guide to Firewalls, Virtual Private Networks (VPNs), Routers, and Intrusion Detection Systems
         | 
    
    
        | 
        	169
         | 
        
        	Network Intrusion Detection, 3rd edition 
         | 
    
    
        | 
        	170
         | 
        
        	Incident Response 
         | 
    
    
        | 
        	COMPUTER FORENSICS
         | 
    
    
        | 
        	171
         | 
        
        	Guide to Computer Forensics and Investigations
         | 
    
    
        | 
        	172
         | 
        
        	Windows Forensic Analysis Dvd Toolkit
         | 
    
    
        | 
        	173
         | 
        
        	Computer Forensics: Principles And Practices
         | 
    
    
        | 
        	174
         | 
        
        	Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet
         | 
    
    
        | 
        	175
         | 
        
        	Computer Forensics Jumpstart
         | 
    
    
        | 
        	176
         | 
        
        	Macintosh OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
         | 
    
    
        | 
        	177
         | 
        
        	Real Digital Forensics: Computer Security And Incident Response
         | 
    
    
        | 
        	178
         | 
        
        	Multimedia Forensics and Security
         | 
    
    
        | 
        	179
         | 
        
        	Computer Forensics and Cyber Crime: An Introduction
         | 
    
    
        | 
        	180
         | 
        
        	Internet Forensics
         | 
    
    
        | 
        	181
         | 
        
        	Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring
         | 
    
    
        | 
        	182
         | 
        
        	Computer Forensics: Incident Response Essentials
         | 
    
    
        | 
        	183
         | 
        
        	UNIX and Linux Forensic Analysis DVD Toolkit
         | 
    
    
        | 
        	184
         | 
        
        	The Official CHFI Study Guide Exam 312-49: For Computer Hacking Forensic Investigator
         | 
    
    
        | 
        	185
         | 
        
        	Techno Security's Guide to E-Discovery and Digital Forensics
         | 
    
    
        | 
        	186
         | 
        
        	Forensic Discovery
         | 
    
    
        | 
        	187
         | 
        
        	Software Forensics: Collecting Evidence from the Scene of a Digital Crime
         | 
    
    
        | 
        	188
         | 
        
        	Advances in Digital Forensics II
         | 
    
    
        | 
        	189
         | 
        
        	Handbook of Digital and Multimedia Forensic Evidence
         | 
    
    
        | 
        	190
         | 
        
        	The Best Damn Cybercrime and Digital Forensics Book Period
         | 
    
    
        | 
        	191
         | 
        
        	Challenges to Digital Forensic Evidence
         | 
    
    
        | 
        	192
         | 
        
        	Digital Forensics
         | 
    
    
        | 
        	193
         | 
        
        	Forensic Digital Imaging and Photography
         | 
    
    
        | 
        	194
         | 
        
        	Photoshop CS3 for Forensics Professionals: A Complete Digital Imaging Course for Investigators
         | 
    
    
        | 
        	195
         | 
        
        	Forensic Uses of Digital Imaging
         | 
    
    
        | 
        	196
         | 
        
        	Digital Forensic Evidence Examination
         | 
    
    
        | 
        	197
         | 
        
        	Handbook of Research on Computational Forensics, Digital Crime, and Investigation:: Methods and Solutions
         | 
    
    
        | 
        	198
         | 
        
        	Gospeltelling to a Digital Culture: The Forensic Reconstruction of a Good Story
         | 
    
    
        | 
        	199
         | 
        
        	Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
         | 
    
    
        | 
        	200
         | 
        
        	Handbook of Digital Forensics and Investigation
         | 
    
    
        | 
        	201
         | 
        
        	Open Source Software for Digital Forensics
         | 
    
    
        | 
        	202
         | 
        
        	Digital Forensics Ultimate Dvd
         | 
    
    
        | 
        	203
         | 
        
        	Handbook of Digital Evidence: Reliable Forensic Computing
         | 
    
    
        | 
        	204
         | 
        
        	Digital Crime and Forensic Science in Cyberspace
         | 
    
    
        | 
        	205
         | 
        
        	Natural Image Statistics in Digital Image Forensics
         | 
    
    
        | 
        	206
         | 
        
        	Elliptic Curves and Their Applications to Cryptography: An Introduction
         | 
    
    
        | 
        	CRYPTOGRAPHY
         | 
    
    
        | 
        	207
         | 
        
        	Primality Testing And Integer Factorization In Public-Key Cryptography
         | 
    
    
        | 
        	208
         | 
        
        	Cryptography
         | 
    
    
        | 
        	209
         | 
        
        	Broadband Quantum Cryptography
         | 
    
    
        | 
        	210
         | 
        
        	Cryptography And Network Security: Principles and Practices
         | 
    
    
        | 
        	211
         | 
        
        	Handbook of Financial Cryptography and Security
         | 
    
    
        | 
        	212
         | 
        
        	Cryptography: Theory And Practice
         | 
    
    
        | 
        	213
         | 
        
        	Introduction to Modern Cryptography: Principles And Protocols
         | 
    
    
        | 
        	214
         | 
        
        	Codes And Ciphers - a History of Cryptography
         | 
    
    
        | 
        	215
         | 
        
        	Progress On Cryptography: 25 Years Of Cryptography In China
         | 
    
    
        | 
        	216
         | 
        
        	Introduction to Cryptography and Network Security
         | 
    
    
        | 
        	217
         | 
        
        	Disappearing Cryptography: Information Hiding Steganography & Watermarking
         | 
    
    
        | 
        	218
         | 
        
        	Cryptography and Security Services: Mechanisms and Applications
         | 
    
    
        | 
        	219
         | 
        
        	Codes: An Introduction to Information Communication and Cryptography
         | 
    
    
        | 
        	220
         | 
        
        	Algebraic Geometry in Coding Theory and Cryptography
         | 
    
    
        | 
        	221
         | 
        
        	Codebreaker: The History of Codes and Ciphers, from the Ancient Pharaohs to Quantum Cryptography
         | 
    
    
        | 
        	222
         | 
        
        	Elementary Number Theory, Cryptography and Codes
         | 
    
    
        | 
        	223
         | 
        
        	Beginning Cryptography With Java
         | 
    
    
        | 
        	224
         | 
        
        	Foundations of Cryptography II: Basic Applications
         | 
    
    
        | 
        	225
         | 
        
        	Cryptography Research Perspectives
         | 
    
    
        | 
        	226
         | 
        
        	Cryptography Decrypted
         | 
    
    
        | 
        	227
         | 
        
        	Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
         | 
    
    
        | 
        	228
         | 
        
        	Understanding and Applying Cryptography and Data Security
         | 
    
    
        | 
        	229
         | 
        
        	Contributions of Contemporary Cryptography
         | 
    
    
        | 
        	230
         | 
        
        	Icsa Guide to Cryptography
         | 
    
    
        | 
        	231
         | 
        
        	Introduction To Cryptography: With Coding Theory
         | 
    
    
        | 
        	232
         | 
        
        	Foundations of Cryptography: Basic Tools
         | 
    
    
        | 
        	233
         | 
        
        	Number Theoretic Methods in Cryptography: Complexity Lower Bounds
         | 
    
    
        | 
        	234
         | 
        
        	Contemporary Cryptography
         | 
    
    
        | 
        	235
         | 
        
        	The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
         | 
    
    
        | 
        	236
         | 
        
        	Quantum Communications And Cryptography
         | 
    
    
        | 
        	237
         | 
        
        	Handbook of Applied Cryptography
         | 
    
    
        | 
        	238
         | 
        
        	Elliptic Curves: Theory and Cryptography
         | 
    
    
        | 
        	239
         | 
        
        	Cryptography & Privacy Sourcebook 1996
         | 
    
    
        | 
        	240
         | 
        
        	An Introduction to Cryptography
         | 
    
    
        | 
        	241
         | 
        
        	Algebraic Aspects of Cryptography
         | 
    
    
        | 
        	242
         | 
        
        	The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation
         | 
    
    
        | 
        	243
         | 
        
        	Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings
         | 
    
    
        | 
        	244
         | 
        
        	Post-Quantum Cryptography
         | 
    
    
        | 
        	245
         | 
        
        	Groebner Bases, Coding, and Cryptography
         | 
    
    
        | 
        	246
         | 
        
        	Cryptography and Computational Number Theory
         | 
    
    
        | 
        	247
         | 
        
        	Theory of Cryptography: Sixth Theory of Cryptography Conference, Tcc 2009, San Francisco, Ca, USA, March 15-17, 2009, Proceedings
         | 
    
    
        | 
        	248
         | 
        
        	Public Key Cryptography Nisi Publication
         | 
    
    
        | 
        	249
         | 
        
        	Cryptography: A Very Short Introduction
         | 
    
    
        | 
        	250
         | 
        
        	Codes and Cryptography
         | 
    
    
        | 
        	251
         | 
        
        	Cryptography and Coding, II
         | 
    
    
        | 
        	252
         | 
        
        	Introduction to Cryptography
         | 
    
    
        | 
        	253
         | 
        
        	Applied Cryptography: Protocols, Algorithms, and Source Code in C
         | 
    
    
        | 
        	254
         | 
        
        	Foundations of Cryptography
         | 
    
    
        | 
        	255
         | 
        
        	Protecting Information: From Classical Error Correction to Quantum Cryptography
         | 
    
    
        | 
        	256
         | 
        
        	Physics and Theoretical Computer Science: From Numbers and Languages to (Quantum) Cryptography
         | 
    
    
        | 
        	257
         | 
        
        	BFCA '05: Boolean Functions Cryptography and Applications
         | 
    
    
        | 
        	258
         | 
        
        	Theoretical Computer Science: Introduction to Automata, Compurability, Complexity, Algorithmics, Randomization, Communication, and Cryptography
         | 
    
    
        | 
        	259
         | 
        
        	Applied Cryptography And Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings
         | 
    
    
        | 
        	260
         | 
        
        	Financial Cryptography: 4th International Conference, Fc 2000, Anguilla, British West Indies, February 20-24, 2000, Proceedings
         | 
    
    
        | 
        	261
         | 
        
        	Modern Cryptography, Probabilistic Proofs and Pseudorandomness
         | 
    
    
        | 
        	262
         | 
        
        	Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings
         | 
    
    
        | 
        	263
         | 
        
        	Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity
         | 
    
    
        | 
        	264
         | 
        
        	Pairing-based Cryptography -- Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008. Proceedings
         | 
    
    
        | 
        	265
         | 
        
        	Understanding Cryptography: A Textbook for Students and Practitioners
         | 
    
    
        | 
        	266
         | 
        
        	Cryptography & Privacy Sourcebook (1996): Documents on Wiretapping, Cryptography, the Clipper Chip, Key Escrow & Export Controls
         | 
    
    
        | 
        	267
         | 
        
        	Towards a Quarter-Century of Public Key Cryptography: A Special Issue of Designs, Codes and Cryptography An International Journal Volume 19, Number 2/3 (2000)
         | 
    
    
        | 
        	268
         | 
        
        	Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings
         | 
    
    
        | 
        	269
         | 
        
        	Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24,2007, Proceedings
         | 
    
    
        | 
        	270
         | 
        
        	Public Key Cryptography - PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, Ca, USA, March 18-20, 2009 Proceedings
         | 
    
    
        | 
        	271
         | 
        
        	Rsa Security's Official Guide to Cryptography
         | 
    
    
        | 
        	272
         | 
        
        	The Code Book: The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography
         | 
    
    
        | 
        	273
         | 
        
        	Public-Key Cryptography
         | 
    
    
        | 
        	274
         | 
        
        	Practical Cryptography
         | 
    
    
        | 
        	275
         | 
        
        	Complexity And Cryptography: An Introduction
         |