BooksSitemapComputersSecurityGeneral
The Best of 2600, Collector's Edition by Emmanuel Goldstein - 2009 - 912 pages
The Big Brother society by Ian Will - 1983 - 221 pages
The branded child: the school psyche-snoops exposed, and what can be done about them by Edward J. Van Allen - 1964 - 154 pages
The branded child: the school psyche-snoops exposed, and what can be done about them by Edward J. Van Allen - 1964 - 154 pages
The CEH Prep Guide by Ronald L. Krutz, Russell Dean Vines - 2008 - 738 pages
The CEH Prep Guide by Ronald L. Krutz, Russell Dean Vines - 2007 - 768 pages
The CEH Prep Guide by Ronald L. Krutz, Russell Dean Vines - 2007 - 768 pages
The CERT C Secure Coding Standard by Robert C. Seacord - 2008 - 720 pages
The CERT Guide to Insider Threats by Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak - 2012 - 432 pages
The Cert Guide to Insider Threats by Dawn M. Cappelli, Andrew P. Moore, Randall F. Trzeciak - 2012 - 389 pages
The Chief Information Security Officer by Barry Kouns, Jake Kouns - 2011 - 71 pages
The Chief Information Security Officer by Barry Kouns, Jake Kouns - 2011 - 71 pages
The CISSP Prep Guide by Ronald L. Krutz, Russell Dean Vines - 2004 - 1056 pages
The CISSP Prep Guide by Ronald L. Krutz, Russell Dean Vines - 2002 - 944 pages
The CISSP Prep Guide by Ronald L. Krutz, Russell Dean Vines - 2002 - 944 pages
The CISSPand CAP Prep Guide by Ronald L. Krutz, Russell Dean Vines - 2007 - 1236 pages
The codebreakers by David Kahn - 1967 - 1164 pages
The Complete Book of Electronic Security by Bill Phillips - 2001 - 324 pages
The complete RFID handbook by Diane Marie Ward - 2007 - 261 pages
The Computer Abuse Amendments Act of 1990 by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law - 1991 - 110 pages
The Computer Abuse Amendments Act of 1990 by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law - 1991 - 110 pages
The Computer Abuse Amendments Act of 1990 by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law - 1991 - 110 pages
The computer and invasion of privacy by United States. Congress. House. Government Operations - 1966 - 318 pages
The Computer in the 21st century - 1995 - 196 pages
The Computer Security Enhancement Act of 1997 to amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes by United States. Congress. House. Committee on Science. Subcommittee on Technology - 1997 - 144 pages
The Computer Security Enhancement Act of 1997 to amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes by United States. Congress. House. Committee on Science. Subcommittee on Technology - 1997 - 144 pages
The Computer Security Enhancement Act of 1997 to amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes by United States. Congress. House. Committee on Science. Subcommittee on Technology - 1997 - 144 pages
The computer security handbook by Richard H. Baker - 1985 - 281 pages
The constitutional foundations of privacy by Irene R. Cortés - 1970 - 105 pages
The constitutional right to privacy by Paul Lermack, Institute for Humane Studies. Law and Liberty Project - 1980 - 168 pages
The consultant by John McNeil - 1978 - 297 pages
The criminal law aspects of computer abuse by Susan H. Nycum, Stanford Research Institute, National Science Foundation (U.S.) - 1976 - 66 pages
The criminal law aspects of computer abuse by Susan H. Nycum, National Science Foundation (U.S.), Stanford Research Institute - 1976
The crypto controversy by Bert-Jaap Koops - 1999 - 285 pages
The crypto controversy by Bert-Jaap Koops - 1999 - 285 pages
The cuckoo's egg by Clifford Stoll - 1990 - 356 pages
The cuckoo's egg by Clifford Stoll - 1990 - 356 pages
The cuckoo's egg by Clifford Stoll - 1990 - 356 pages
The cuckoo's egg by Clifford Stoll - 1990 - 356 pages
The cuckoo's egg by Clifford Stoll - 1990 - 356 pages
The cuckoo's egg by Clifford Stoll - 1989 - 326 pages
The Cuckoo's Egg by Clifford Stoll - 1989 - 326 pages
The Cyber Initiative by United States. Congress. House. Committee on Homeland Security - 2008 - 37 pages
The data center disaster consultant by Kenniston W. Lord, Edwin F. Kerr, Lawrence K. Grodman - 1977 - 168 pages
The Data Processing security game by Robert S. Becker - 1977 - 103 pages
The Data Protection Act 1984 by J. A. L. Sterling, Great Britain - 1985 - 330 pages
The Death of the Internet - 2012
The Death of the Internet - 2012 - 450 pages
The Development and Evaluation of a Computer Crime Investigative Distance-learning Program for the National Cybercrime Training Partnership by Richard Gissel - 2005 - 172 pages
The development of the right of privacy in New York by Samuel H. Hofstadter, Samuel Dennis Warren, Louis Dembitz Brandeis - 1954 - 92 pages
The Digital Person by Daniel J. Solove - 2004 - 283 pages
The Digital Signature and Electronic Authemtication Law (SEAL) of 1998--S. 1594 by United States. Congress. Senate. Committee on Banking, Housing, and Urban Affairs. Subcommittee on Financial Services and Technology - 1999 - 51 pages
The Digital Signature and Electronic Authemtication Law (SEAL) of 1998--S. 1594 by United States. Congress. Senate. Committee on Banking, Housing, and Urban Affairs. Subcommittee on Financial Services and Technology - 1999 - 51 pages
The Digital Signature and Electronic Authemtication Law (SEAL) of 1998--S. 1594 by United States. Congress. Senate. Committee on Banking, Housing, and Urban Affairs. Subcommittee on Financial Services and Technology - 1999 - 51 pages
The Digital Signature and Electronic Authemtication Law (SEAL) of 1998--S. 1594 by United States. Congress. Senate. Committee on Banking, Housing, and Urban Affairs. Subcommittee on Financial Services and Technology - 1999 - 51 pages
The Disaster Recovery Handbook by Michael Wallace, Lawrence Webber - 2004 - 398 pages
The Economics of Financial and Medical Identity Theft by L. Jean Camp, M. Eric Johnson - 2012 - 166 pages
The electronic privacy papers by Bruce Schneier, David Banisar - 1997 - 747 pages
The Electronic Signatures in Global and National Commerce Act by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 1999 - 62 pages
The Electronic Signatures in Global and National Commerce Act by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 1999 - 62 pages
The Electronic Signatures in Global and National Commerce Act by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 1999 - 62 pages
The EU data protection directive by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection - 2001 - 102 pages
The EU data protection directive by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection - 2001 - 102 pages
The federal role in electronic authentication by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy - 1997 - 174 pages
The federal role in electronic authentication by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy - 1997 - 174 pages
The federal role in electronic authentication by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy - 1997 - 174 pages
The federal role in electronic authentication by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy - 1997 - 174 pages
The federal role in electronic authentication by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy - 1997 - 174 pages
The fugitive game by Jonathan Littman - 1997 - 416 pages
The fugitive game by Jonathan Littman - 1997 - 416 pages
The future of cyber and telecommunications security at DHS by United States. Congress. House. Committee on Homeland Security. Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity - 2008 - 108 pages
The future of cyber and telecommunications security at DHS by United States. Congress. House. Committee on Homeland Security. Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity - 2008 - 108 pages
The Future of Privacy: Private life and public policy by Perri 6 - 1998 - 336 pages
The Future of Privacy: Private life and public policy by Perri 6 - 1998 - 336 pages
The Future of Privacy: Private life and public policy by Perri 6, Demos (Organisation) - 1998 - 336 pages
The Future of Privacy: Public trust and the use of private information by Perri 6, Kristen Lasky, Adrian Fletcher - 1998 - 128 pages
The Future of Privacy: Public trust in the use of private information by Perri 6, Kristen Lasky, Adrian Fletcher - 1998 - 128 pages
The Global Cybercrime Industry by Nir Kshetri - 2010 - 251 pages
The Governance of Privacy by Colin Colin John Bennett, Charles D. Raab - 2003 - 257 pages
The governance of privacy by Colin John Bennett, Charles D. Raab - 2003 - 257 pages
The hacker crackdown by Bruce Sterling - 1992 - 328 pages
The hacker diaries by Dan Verton - 2002 - 219 pages
The Hacker's Guide to OS X by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei - 2012 - 248 pages
The Hacker's Handbook III by Hugo Cornwall - 1988 - 233 pages
The Handbook of Research on Computational Forensics, Digital Crime, and Investigation by Chang-Tsun Li - 2009 - 548 pages
The happy hacker by Carolyn P. Meinel - 1999 - 427 pages
The Happy Hacker by Carolyn P. Meinel - 1999 - 427 pages
The human factor in computer crime by J. A. Van Duyn - 1985 - 162 pages
The implications of COTS vulnerabilities for the DOD and critical U.S. infrastructures by Robert H. Anderson, Richard O. Hundley, Rand Corporation - 1998 - 15 pages
The information revolution and national security by Thomas E. Copeland, Army War College (U.S.). Strategic Studies Institute - 2000 - 141 pages
The information revolution and national security by Thomas E. Copeland, Army War College (U.S.). Strategic Studies Institute - 2000 - 141 pages
The International Handbook of Computer Security by Jae K. Shim, Anique A. Qureshi, Joel G. Siegel - 2000 - 260 pages
The International Handbook of Computer Security by Jae K. Shim, Anique A. Qureshi, Joel G. Siegel - 2000 - 260 pages
The international handbook on computer crime by Dr. Ulrich Sieber - 1986 - 276 pages
The Introduction and use of personal identification numbers by Council of Europe. Committee of Experts on Data Protection, Council of Europe. European Committee on Legal Co-operation - 1991 - 31 pages
The Introduction and use of personal identification numbers by Council of Europe. Committee of Experts on Data Protection, Council of Europe. European Committee on Legal Co-operation - 1991 - 31 pages
The It Service Management Processes and Activities Roles and Responsibilities Job Description Handbook by Gerard Blokdijk, Ivanka Menken - 2008 - 220 pages
The Law of Cybercrimes and Their Investigations by George Curtis - 2011 - 398 pages
The law of E-SIGN by Bernard D. Reams - 2002
The law of E-SIGN by Bernard D. Reams - 2002
The law of information conflict by Thomas C. Wingfield - 2000 - 497 pages
The legal aspects of digital signatures by Jos Dumortier, Patrick van Eecke, Commission of the European Communities, Ilse Anné, Katholieke Universiteit te Leuven (1970- ). Interdisciplinair Centrum voor Recht en Informatica - 1998
The limits of trust by Stewart Abercrombie Baker, Paul R. Hurst - 1998 - 621 pages
The Little Black Book of Computer Security by Joel Dubin - 2005 - 150 pages
The Lucifer key by Malcolm MacPherson - 1981 - 337 pages
The Myth of Homeland Security by Marcus Ranum - 2003 - 304 pages
The National Computer Security Survey (Ncss) by Lois M. Davis - 2008 - 75 pages
The NCSA guide to enterprise security by Michel E. Kabay - 1996 - 385 pages
The network security center by Frank Heinrich, Institute for Computer Sciences and Technology - 1978 - 55 pages
The new criminals by Suzan Deighton - 1979 - 74 pages
The new criminals by Suzan Deighton - 1978 - 46 pages
The new technology of crime, law and social control by James Michael Byrne, Donald J. Rebovich - 2007 - 379 pages
The next world war by James Adams - 1998 - 366 pages
The ominous ear by Bernard B. Spindel - 1968 - 268 pages
The Oracle Hacker's Handbook by David Litchfield - 2007 - 190 pages
The politics of privacy, computers, and criminal justice records by Donald A. Marchand - 1980 - 433 pages
The politics of privacy, computers, and criminal justice records by Donald A. Marchand - 1980 - 433 pages
The privacy issue and computer data security and related materials by Sutherland, Asbill & Brennan - 1977 - 256 pages
The Privacy Papers by Rebecca Herold - 2001 - 712 pages
The privacy problem by Fred H. Cate, Freedom Forum First Amendment Center at Vanderbilt University - 2003 - 28 pages
The problems of electronic eavesdropping by Monrad G. Paulsen, American Law Institute-American Bar Association Committee on Continuing Professional Education - 1977 - 136 pages
The Proceedings of the 10th European Conference on Information Warfare and Security by Rain Ottis - 2011 - 341 pages
The Protection of Computer Software by Derrick Grover - 1989 - 263 pages
The protection of medical data by Council of Europe - 1997 - 65 pages
The protection of medical data by Council of Europe - 1997 - 65 pages
The Protection of Personal Data in the Area of Telecommunication Services with Particular Reference to Telephone Services by Project Group On Data Protection - 1996 - 50 pages
The protection of personal data in the area of telecommunication services with particular reference to telephone services by Council of Europe. Committee of Ministers, Project Group on Data Protection - 1996 - 50 pages
The protection of users of legal data processing systems by Council of Europe - 1979 - 149 pages
The regulation of cyberspace by Ching-Yi Liu - 1997 - 530 pages
The right of privacy by Stephen Lamoreux - 1962 - 60 pages
The Right of Privacy in the Computer Age by Warren Freedman - 1987 - 163 pages
The right to be let alone by Marian L. Huttenstine - 1985 - 246 pages
The Right to privacy by Association of Records Managers and Administrators. Richmond Chapter, Virginia Microfilm Association - 1976 - 122 pages
The Right to privacy - 1976 - 301 pages
The rise of the computer state by David Burnham - 1983 - 273 pages
The rise of the computer state by David Burnham - 1983 - 273 pages
The role of computer security in protecting U.S. infrastructures by United States. Congress. House. Committee on Science. Subcommittee on Technology - 1998 - 161 pages
The Secret Code Book by Michael Shulan - 1996 - 48 pages
The Security & Freedom Through Encryption (Safe) Act by W. J. Tauzin - 2000 - 89 pages
The Security and Freedom Through Encryption (Safe) ACT by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 1999 - 89 pages
The Security and Freedom through Encryption (SAFE) Act by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 1999 - 89 pages
The Security and Freedom through Encryption (SAFE) Act by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 1999 - 89 pages
The Security and Freedom through Encryption (SAFE) Act by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 1999 - 89 pages
The Security and Freedom through Encryption (SAFE) Act by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 1999 - 89 pages
The Security and Freedom through Encryption (SAFE) Act by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 1997 - 121 pages
The Security and Freedom through Encryption (SAFE) Act by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 1997 - 121 pages
The Shellcoder's Handbook by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte - 2011 - 744 pages
The Shellcoder's Handbook by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte - 2011 - 744 pages
The Shellcoder's Handbook by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte - 2007 - 718 pages
The Shellcoder's Handbook by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte - 2007 - 744 pages
The Shellcoder's Handbook by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte - 2007 - 744 pages
The shellcoder's handbook by Jack Koziol - 2004 - 620 pages
The Spy Block Act by United States. Congress. Senate. Committee on Commerce, Science, and Transportation - 2004 - 16 pages
The spymaster's secret code challenge by A. M. Vale - 2003 - 48 pages
The SSCP Prep Guide by Debra S. Isaac, Michael J. Isaac - 2003 - 528 pages
The Stability Theory of Stream Ciphers by Cunsheng Ding, Guozhen Xiao, Weijuan Shan - 1991 - 187 pages
The State of Federal Information Security by United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management, Organization, and Procurement - 2010 - 78 pages
The State of Small Business Security in a Cyber Economy by United States. Congress. House. Committee on Small Business. Subcommittee on Regulatory Reform and Oversight - 2006 - 117 pages
The threat of foreign economic espionage to U.S. corporations by United States. Congress. House. Committee on the Judiciary. Subcommittee on Economic and Commercial Law - 1992 - 385 pages
The unwanted gaze by Jeffrey Rosen - 2000 - 274 pages
The Usborne book of secret codes by Eileen O'Brien, Diana Riddell - 1998 - 32 pages
The Weakest Security Link Series by Luis F. Medina - 2003 - 200 pages
The Web Application Hacker's Handbook by Dafydd Stuttard, Marcus Pinto - 2011 - 816 pages
The Web Application Hacker's Handbook by Dafydd Stuttard, Marcus Pinto - 2011 - 768 pages
The Web Application Hacker's Handbook by Dafydd Stuttard, Marcus Pinto - 2011 - 816 pages
The World Wide Military Command and Control System -- major changes needed in its automated data procesing management and direction by United States. General Accounting Office - 1979 - 103 pages
Theory of Cryptography by Shai Halevi, Tal Rabin - 2006 - 616 pages
Theory of Cryptography by Shai Halevi, Tal Rabin - 2006 - 616 pages
Third ACM Conference on Computer and Communications Security by Association for Computing Machinery. Special Interest Group on Security, Audit, and Control - 1996 - 179 pages
Threatening Communications and Behavior by National Research Council - 2011 - 105 pages
Tolley's data protection handbook by Susan Singleton - 2001 - 513 pages
Topics in Cryptology -- CT-RSA 2003 by Marc Joye - 2003 - 416 pages
Topics in Cryptology -- CT-RSA 2003 by Marc Joye - 2003 - 416 pages
Toward a Safer and More Secure Cyberspace by Committee on Improving Cybersecurity Research in the United States, National Research Council - 2007 - 309 pages
Toward a Safer and More Secure Cyberspace by Committee on Improving Cybersecurity Research in the United States, National Research Council - 2007 - 297 pages
Toward an electronic patient record '97 - 1997 - 379 pages
Toward Better Usability, Security, and Privacy of Information Technology by Steering Committee on the Usability, Security, and Privacy of Computer Systems, National Research Council - 2010 - 51 pages
Towards Hardware-Intrinsic Security by Ahmad-Reza Sadeghi - 2010 - 407 pages
Towards Zero Downtime by Vishal Rupani - 2004 - 224 pages
Traces of Guilt by Neil Barrett - 2005 - 359 pages
Trade secrets by James Pooley - 1982 - 145 pages
Traicté des chiffres, ou, Secretes manieres d'escrire by Blaise de Vigenère - 1996 - 343 pages
Transparentar al Estado by Hugo A. Concha, Sergio López Ayllón, Lucy Tacher Epelstein - 2004 - 346 pages
Transportation Systems Security by Allan McDougall, Robert Radvanovsky - 2008 - 280 pages
Tras Los Pasos de Un... Hacker by N Stor Marroqu N, Néstor Marroquín - 2010 - 746 pages
Trends & applications 1977 by IEEE Computer Society - 1977 - 124 pages
Trust, complexity and control by Piotr Cofta - 2007 - 294 pages
Trust-Service-Infrastrukturen by Philip Tauschek - 2002 - 332 pages
Trusted Computing - 2008 - 260 pages
Trusted Computing - 2008 - 260 pages
Trying the high technology case by James H. Pooley, California Continuing Education of the Bar - 1984 - 88 pages
Twelfth Annual Computer Security Applications Conference by Applied Computer Security Associates, Association for Computing Machinery. Special Interest Group on Security, Audit, and Control - 1996 - 249 pages
Ub̈erhacker! by Carolyn P. Meinel - 2000 - 247 pages
Unauthorised Access by Wil Allsopp - 2010 - 302 pages
Unauthorised Access by Wil Allsopp - 2009 - 302 pages
Unauthorized access to individual medical records by United States. Congress. House. Committee on the Judiciary. Subcommittee on Civil and Constitutional Rights - 1986 - 21 pages
Understanding computer crime by Norman R. Lyons - 1984 - 48 pages
Understanding Windows CardSpace by Vittorio Bertocci, Garrett Serack, Caleb Baker - 2007 - 384 pages
Undertaking Spam, Spyware, and Fraud Enforcement with Enforcers Beyond Borders Act of 2005 by United States. Congress. Senate. Committee on Commerce, Science, and Transportation - 2006 - 35 pages
Universidade H4CK3R by HENRIQUE CESAR ULBRICH - 384 pages
1 2 3 4 5 6 7 8 9 10 11