BooksSitemapComputersSecurityGeneral
101 problems by Mabel Clark DuBois, Robert Sewall DuBois, American Cryptogram Association - 1966 - 15 pages
10th National Computer Security Conference by United States. National Bureau of Standards, National Computer Security Center (U.S.) - 1987 - 388 pages
11th Computer Security Foundations Workshop by IEEE Computer Society - 1998 - 203 pages
11th National Computer Security Conference by United States. National Bureau of Standards, National Computer Security Center (U.S.) - 1988 - 348 pages
13th National Computer Security Conference by National Institute of Standards and Technology (U.S.), National Computer Security Center (U.S.) - 1990 - 839 pages
14th National Computer Security Conference by National Institute of Standards and Technology (U.S.), National Computer Security Center (U.S.) - 1991 - 715 pages
1980 computer security buyer's guide - 1979 - 400 pages
1981 census of population, confidentiality and computing by Great Britain. Parliament, Great Britain. Dept. of Health and Social Security, Great Britain. Scottish Office, British Computer Society - 1981 - 16 pages
1991 census of population, confidentiality and computing by Great Britain. Dept. of Health, Great Britain. Scottish Office - 1991 - 28 pages
1991 IEEE Computer Society Symposium on Research in Security and Privacy - 1991 - 389 pages
1992-1993 ACM SIGSAC New Security Paradigms Workshop by J. Bret Michael, Victoria Ashby, Catherine Meadows, Association for Computing Machinery. Special Interest Group on Security, Audit, and Control, George Mason University. Center for Secure Information Systems, IEEE Computer Society - 1993 - 198 pages
1994 ACM Sigsac New Security Paradigms Workshop - 1994 - 121 pages
1995 IEEE Symposium on Security and Privacy - 1995 - 261 pages
1996 IEEE Symposium on Security and Privacy - 1996 - 233 pages
1997 IEEE International Carnahan Conference on Security Technology by Larry D. Sanson - 1997 - 240 pages
1997 IEEE International Carnahan Conference on Security Technology by Larry D. Sanson, Institute of Electrical and Electronics Engineers. Lexington Section, Security Construction and Equipment Committee - 1995 - 240 pages
1999 IEEE International Carnahan Conference on Security Technology by Larry D. Sanson - 1999 - 487 pages
2002 網路法制與智慧財產權硏討會論文集 by 劉尚志, 國立交通大學 (China : Republic : 1949- ). 科技法律硏究所 - 2002 - 210 pages
2006 IEEE Symposium on Security and Privacy (SP 2006) - 2006 - 401 pages
2007 editors' symposium by University of San Diego. School of Law - 2007 - 368 pages
21st National Information Systems Security Conference by National Institute of Standards and Technology (U.S.), National Computer Security Center (U.S.) - 1998 - 798 pages
24 Deadly Sins of Software Security (ebook) by Michael Howard, David LeBlanc - 2009 - 464 pages
25 years anniversary anthology in computers and law by Universitetet i Oslo. Institutt for privatrett. Avdeling for EDB-spørsmål - 1995 - 589 pages
2nd ACM Conference on Computer and Communications Security, Nov. 2-4 1994, Fairfax, Virginia by Association for Computing Machinery. Special Interest Group on Security, Audit, and Control, Association for Computing Machinery - 1994 - 293 pages
4th ACM Conference on Computer and Communications Security, April 1-4, 1997, Zurich, Switzerland by Association for Computing Machinery. Special Interest Group on Security, Audit, and Control, Association for Computing Machinery - 1997 - 161 pages
6th ACM Conference on Computer and Communications Security by Association for Computing Machinery. Special Interest Group on Security, Audit, and Control - 1999 - 147 pages
A Arte de Hackear Pessoas by ANTONIO MARCELO, MARCOS PEREIRA - 104 pages
A difesa dell'azienda. Ict Security Governance: uno scudo a 360° by Stefano Privitera, Lorenzo Longhi, Andrea Pellegrino - 2005 - 128 pages
A Guide to Kernel Exploitation by Enrico Perla, Massimiliano Oldani - 2010 - 464 pages
A Guide to Procurement of Trusted Systems by Joan Fowler - 1994 - 160 pages
A Guide to Procurement of Trusted Systems - 1993 - 124 pages
A guide to the Data Protection Act 1984 by Nigel Savage, Chris Edwards, Great Britain - 1984 - 159 pages
A Guide to understanding identification and authentication in trusted systems by National Computer Security Center (U.S.) - 1991 - 29 pages
A Guide to Understanding Security Modeling in Trusted Systems - 1993 - 159 pages
A Guide to Understanding Security Testing and Test Documentation in Trusted Systems by DIANE Publishing Company - 1994 - 121 pages
A Hacker Manifesto by McKenzie Wark - 2004 - 208 pages
A Legal guide to EC regulation by Euromoney Publications Ltd, Allen & Overy (Firm) - 1992 - 38 pages
A legal guide to EDP management by Michael C. Gemignani - 1989 - 260 pages
A natural history of Nevis, and the rest of the English Leeward Charibee islands in America. With many other observations on nature and art; particularly, an introduction to the art of decyphering. In eleven letters from the Revd Mr. Smith by William Smith (Revd. Mr.) - 1745 - 318 pages
A New Breed Satellite Terrorism by John Hall - 2009 - 132 pages
A new look at the issue of privacy by Louis Harris and Associates - 1976
A new look at the issue of privacy by Louis Harris and Associates - 1976
A Practical approach to logical access control by Ernst & Young - 1993 - 234 pages
A Practical Guide to Trusted Computing by David Challener, Kent Yoder, Ryan Catherman, David Safford, Leendert Van Doorn - 2007 - 384 pages
A Process for Developing a Common Vocabulary in the Information Security Area by Jan Von Knop, V. V. I︠A︡shchenko - 2007 - 107 pages
A Question of Balance by Committee for a Study on Promoting Access to Scientific and Technical Data for the Public Interest, National Research Council - 1999 - 143 pages
A Question of Balance by Committee for a Study on Promoting Access to Scientific and Technical Data for the Public Interest, National Research Council - 1999 - 143 pages
A Question of Balance by Committee for a Study on Promoting Access to Scientific and Technical Data for the Public Interest, National Research Council - 1999 - 130 pages
A Question of Balance by Committee for a Study on Promoting Access to Scientific and Technical Data for the Public Interest, National Research Council - 1999 - 143 pages
A small business guide to computer security by Stuart W. Katzke, United States. Small Business Administration. Computer Security & Education Advisory Council - 1987 - 30 pages
Academic and legal implications of VA's data loss by United States. Congress. House. Committee on Veterans' Affairs - 2007 - 123 pages
Academic and legal implications of VA's data loss by United States. Congress. House. Committee on Veterans' Affairs - 2007 - 123 pages
Access control and personal identification systems by Dan M. Bowers - 1988 - 232 pages
Access Control, Security, and Trust by Shiu-Kai Chin, Susan Beth Older - 2011 - 351 pages
Access denied by Ronald Deibert - 2008 - 449 pages
Accesso non autorizzato by Dmitry Skyarov - 2004 - 240 pages
Ada and Beyond by Committee on the Past and Present Contexts for the Use of Ada in the Department of Defense, National Research Council - 1997 - 102 pages
Ada and Beyond by Committee on the Past and Present Contexts for the Use of Ada in the Department of Defense, National Research Council - 1997 - 102 pages
Ada and Beyond by Committee on the Past and Present Contexts for the Use of Ada in the Department of Defense, National Research Council - 1997 - 102 pages
Ada and Beyond by Committee on the Past and Present Contexts for the Use of Ada in the Department of Defense, National Research Council - 1997 - 102 pages
Ada and Beyond by Committee on the Past and Present Contexts for the Use of Ada in the Department of Defense, National Research Council - 1997 - 96 pages
Administration of export controls on encryption products by United States. President (1993-2001 : Clinton), Bill Clinton, United States. Congress. House. Committee on International Relations - 1997 - 5 pages
ADP security by United States Postal Service - 1989
Advanced Persistent Threat by Eric Cole - 2012 - 320 pages
Advances in computer security management by Marvin M. Wofsey - 1983 - 268 pages
Advances in computer system security - 1984 - 376 pages
Advances in computer system security - 1981 - 403 pages
Advances in cryptography by Allen Gersho - 1982 - 156 pages
Advances in cryptology by Douglas R. Stinson - 1994 - 491 pages
Advances in cryptology by EUROCRYPT - 1991 - 500 pages
Advances in cryptology - ASIACRYPT 2000 by Tatsuaki Okamoto - 2000 - 630 pages
Advances in Cryptology - CRYPTO '86 - 1987
Advances in Cryptology - CRYPTO '89 - 1990 - 634 pages
Advances in Cryptology - CRYPTO '90 - 1991 - 644 pages
Advances in Cryptology - CRYPTO '90 - 1991 - 644 pages
Advances in Cryptology - CRYPTO 2005 by Victor Shoup - 2005 - 568 pages
Advances in Cryptology - CRYPTO 2005 by Victor Shoup - 2005 - 568 pages
Advances in Cryptology - EUROCRYPT '87 - 1988 - 314 pages
Advances in Cryptology 1981 - 1997 - 1999 - 460 pages
Advances in cryptology, EUROCRYPT '93 by Tor Helleseth - 1994 - 465 pages
Advances in Cryptology--Crypto '85 by Hugh C. Williams - 1986 - 548 pages
Advances in cryptology--CRYPTO '87 by Carl Pomerance - 1988 - 460 pages
Advances in cryptology--CRYPTO '90 by Alfred J. Menezes, Scott A. Vanstone - 1991 - 643 pages
Advances in Digital Forensics IV - 2008 - 368 pages
Agencies implementation of and compliance with the Privacy act can be improved by United States. General Accounting Office - 1978 - 29 pages
Agencies in peril by United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security - 2008 - 211 pages
Agencies in peril by United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security - 2008 - 211 pages
Algorithms, Architectures and Information Systems Security by Bhargab B. Bhattacharya - 2008 - 371 pages
Amended Proposal for a Council Directive on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data by Commission of the European Communities, Council of the European Communities - 1992 - 130 pages
America the Vulnerable by Joel Brenner - 2011 - 320 pages
An analysis of computer security safeguards for detecting and preventing intentional computer misuse by Brian Ruder, J. D. Madden - 1978 - 74 pages
An essay on the art of decyphering by John Davys, John Wallis - 1737 - 58 pages
An Exploration of Cyberspace Security R & D Investment Strategies for Darpa by Robert Helms Anderson, Anthony C. Hearn, United States. Defense Advanced Research Projects Agency, National Defense Research Institute (U. S.), Rand Corporation - 1996 - 67 pages
An Information Security Handbook by John M. D. Hunter - 2001 - 226 pages
An integrated standard of care for healthcare information security by John R. Christiansen, American Health Lawyers Association - 2005 - 249 pages
An introduction to computer security by Barbara Guttman, Edward Roback - 1995 - 276 pages
An Introduction to Computer Security by Barbara Guttman, Barbara Guttman (au), Edward A. Roback (au) - 1995 - 276 pages
An Unofficial Guide To Ethical Hacking (2 Edition) by Ankit Fadia - 2006 - 616 pages
Anti-Hacker Tool Kit, Third Edition by Mike Shema, Chris Davis, Aaron Philipp, David Cowen - 2006 - 800 pages
Applied Algebra by Darel W. Hardy, Fred Richman, Carol L. Walker - 2011 - 410 pages
Applied Cryptanalysis by Mark Stamp, Richard M. Low - 2007 - 407 pages
Applied Cryptanalysis by Mark Stamp, Richard M. Low - 2007 - 407 pages
Applied Cryptography and Network Security by Jianying Zhou, Moti Yung, Feng Bao - 2006 - 488 pages
Applied Cryptography and Network Security by John Ioannidis, Angelos Keromytis, Moti Yung - 2005 - 530 pages
Applied Cryptography and Network Security by Jianying Zhou, Moti Yung, Yongfei Han - 2003 - 436 pages
Applied Cyber Security and the Smart Grid by Eric D. Knapp, Raj Samani - 2013 - 230 pages
Approximative Public-Key-Kryptosysteme by Patrick Horster, Hartmut Isselhorst - 1989 - 174 pages
Are We Prepared for Cyberwar? by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2000 - 197 pages
Are we prepared for cyberwar? by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2000 - 197 pages
Are we prepared for cyberwar? by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2000 - 197 pages
Are we prepared for cyberwar? by United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology - 2000 - 197 pages
Arlarm, Sensor & Security Circuit Cookbook Cloth Ed. by Thomas Petruzzellis - 1994 - 286 pages
Arte e identidad en Internet by Gemma San Cornelio Esquerdo - 2010 - 104 pages
Assessing data security by United States. Congress. House. Committee on Financial Services - 2005 - 118 pages
Assessing data security by United States. Congress. House. Committee on Financial Services - 2005 - 118 pages
Assessing data security by United States. Congress. House. Committee on Financial Services - 2005 - 118 pages
Asterisk Hacking by Joshua Brashars - 2007 - 272 pages
Australia and Cyber-Warfare by Gary Waters, Desmond Ball, Ian Dudgeon - 2008 - 173 pages
Authentication by keystroke timing by R. Stockton Gaines - 1980 - 41 pages
Authentication Codes and Combinatorial Designs by Dingyi Pei - 2006 - 256 pages
Automated systems security--Federal agencies should strengthen safeguards over personal and other sensitive data by United States. General Accounting Office - 1979 - 74 pages
Automated tools for testing computer system vulnerability by William T. Polk - 1992 - 35 pages
Availability, Reliability and Security for Business, Enterprise and Health Information Systems - 2011 - 388 pages
Avances en criptología y seguridad de la información by Benjamín Ramos Alvarez - 2004 - 712 pages
Bacula - Ferramenta Livre de Backup by HEITOR MEDRADO DE FARIA - 208 pages
BCMSN by Richard A. Deal - 2003 - 528 pages
Best Truth by Bruce D. Berkowitz, Allan E. Goodman - 2000 - 224 pages
Beyond Fear by Bruce Schneier - 2003 - 295 pages
Beyond Fear by Bruce Schneier - 2003 - 295 pages
Biometrics by John D. Woodward (Jr.), Nicholas M. Orlans, Peter T. Higgins - 2003 - 432 pages
Biometrics by Samir Nanavati, Michael Thieme, Raj Nanavati - 2002 - 320 pages
Biometrics In Identity Management by Shimon K. Modi - 2011 - 278 pages
Blackhatonomics by Will Gragido, Daniel Molina, John Pirc, Nick Selby - 2012 - 216 pages
Blackjacking by Daniel V. Hoffman - 2007 - 336 pages
Blackstone's guide to the Data Protection Act 1998 by Peter Carey (LL. M.), Peter Carey - 1998 - 176 pages
Blackstone's Statutes on IT and E-Commerce by Steve Hedley, Tanya Frances Aplin - 2004 - 444 pages
British secret writing in the revolution by Howard Henry Peckham - 131 pages
Brute Force by Matt Curtin - 2005 - 291 pages
Brute Force by Matt Curtin - 2005 - 291 pages
Build Your Own Security Lab by Michael Gregg - 2010 - 428 pages
Build Your Own Security Lab by Michael Gregg - 2008 - 428 pages
Building a secure computer system by Morrie Gasser - 1988 - 288 pages
Business guide to privacy and data protection legislation by Charles E. H. Franklin, International Chamber of Commerce - 1996 - 570 pages
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1936
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1927
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1909
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1904
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1903
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1867
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1866
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office, Richard Bruce Wernham - 1589
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1587
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1586
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1583
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1566
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1564
Calendar of state papers, foreign series, of the reign of Elizabeth by Great Britain. Public Record Office - 1560
Calendar of state papers, foreign series, of the reign of Elizabeth, 1558-[1589] by Great Britain. Public Record Office - 1966
Calendar of state papers, foreign series, of the reign of Elizabeth, 1558-[1589] by Great Britain. Public Record Office - 1921
Calendar of state papers, foreign series, of the reign of Elizabeth, 1558-[1589] by Great Britain. Public Record Office - 1916
Case studies of auditing in a computer-based systems environment by United States. General Accounting Office - 1971 - 297 pages
CASP CompTIA Advanced Security Practitioner Study Guide by Michael Gregg, Billy Haines - 2012 - 552 pages
CASP: CompTIA Advanced Security Practitioner Study Guide Authorized Courseware by Michael Gregg, Billy Haines - 2012 - 608 pages
CASP: CompTIA Advanced Security Practitioner Study Guide Authorized Courseware by Michael Gregg, Billy Haines - 2012 - 608 pages
CCNA Wireless Study Guide by Todd Lammle - 2010 - 600 pages
CCNA Wireless Study Guide by Todd Lammle - 2010 - 600 pages
CCNP Security Firewall 642-617 Official Cert Guide by Dave Hucaby, Dave Garneau, Anthony Sequeira - 2011 - 738 pages
CCSP Cisco Secure PIX Firewall by Greg Bastien, Christian Abera Degu - 2003 - 433 pages
CDSA explained by Richard Sargent, X/Open Group - 1998 - 116 pages
CEH: Official Certified Ethical Hacker Review Guide by Kimberly Graves - 2007 - 238 pages
Check point CCSA by Sean Walberg - 2005 - 282 pages
China's cyber-wall by United States. Congressional-Executive Commission on China - 2003 - 32 pages
China's cyber-wall by United States. Congressional-Executive Commission on China - 2003 - 32 pages
CISA Certified Information Systems Auditor Study Guide by David L. Cannon - 2011 - 704 pages
CISA Certified Information Systems Auditor Study Guide by David L. Cannon - 2011 - 704 pages
CISA Certified Information Systems Auditor Study Guide by David L. Cannon - 2009 - 624 pages
CISA Certified Information Systems Auditor Study Guide by David L. Cannon - 2008 - 570 pages
Cisco ASA Configuration by Richard Deal - 2009 - 736 pages
CISSP 100 Success Secrets by Gerard Blokdijk - 2007 - 180 pages
CISSP Practice by S. Rao Vallabhaneni - 2011 - 1250 pages
CISSP Practice by S. Rao Vallabhaneni - 2011 - 1250 pages
CISSP: Certified Information Systems Security Professional Study Guide by James M. Stewart, Mike Chapple, Darril Gibson - 2012 - 936 pages
Classical cryptography course by Randall K. Nichols - 1996 - 301 pages
Classical cryptography course by Randall K. Nichols - 1996
Cloud Security by Ronald L. Krutz, Russell Dean Vines - 2010 - 504 pages
Cloud Security by Ronald L. Krutz, Russell Dean Vines - 2010 - 504 pages
Cloud Security by Ronald L. Krutz, Russell Dean Vines - 2010 - 384 pages
CMS Security Handbook by Tom Canavan - 2011 - 456 pages
CMS Security Handbook by Tom Canavan - 2011 - 456 pages
Codemaster #2 by Marvin Miller - 2005 - 70 pages
Codes, ciphers, and computers by Bruce Bosworth - 1982 - 259 pages
Coding Theory and Cryptography by D.C. Hankerson, Gary Hoffman, D.A. Leonard, Charles C. Lindner, K.T. Phelps, C.A. Rodger, J.R. Wall - 2000 - 368 pages
Cognitive radio technology by Bruce Alan Fette - 2006 - 622 pages
Collaborative Financial Infrastructure Protection by Roberto Baldoni, Gregory Chockler - 2012 - 224 pages
Combating computer crime by Chantico Publishing Co - 1992 - 311 pages
Combating spyware by United States. Congress. House. Committee on Energy and Commerce - 2005 - 71 pages
Combating spyware by United States. Congress. House. Committee on Energy and Commerce - 2005 - 71 pages
Combating spyware by United States. Congress. House. Committee on Energy and Commerce - 2005 - 71 pages
Come si fa a usare la firma digitale by Andrea Battistella, Enrico Zimuel - 2010 - 110 pages
Community Policing - 2009 - 328 pages
1 2 3 4 5 6 7 8 9 10 11