BooksSitemapComputersSecurityGeneral
Logics and Languages for Reliability and Security - 2010 - 325 pages
Low Tech Hacking by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther - 2011 - 264 pages
Législation et protection des données by Italy. Parlamento. Camera dei deputati - 1983 - 356 pages
Machine Learning Forensics for Law Enforcement, Security, and Intelligence by Jesus Mena - 2011 - 349 pages
Mafiaboy by Michael Calce
Maintenance testing for the data encryption standard by Jason Gait - 1980 - 25 pages
Making federal computers secure by United States. Congress. House. Committee on Government Reform - 2002 - 20 pages
Making security real by National Institute of Standards and Technology (U.S.), National Computer Security Center (U.S.) - 1995 - 759 pages
Malawi Civil Service information systems security policy by Malawi Civil Service - 2003 - 40 pages
Malicious Cryptography by Adam Young, Moti Yung - 2004 - 416 pages
Malware Analyst's Cookbook and DVD by Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard - 2010 - 744 pages
Malware Analyst's Cookbook and DVD by Michael Ligh, Steven Adair, Blake Hartstein, Matthew Richard - 2010 - 792 pages
Malware Forensics by Cameron H. Malin, Eoghan Casey, James M. Aquilina - 2008 - 592 pages
Management guide to computer security by John R. Talbot - 1981 - 180 pages
Management principles for asset protection by Philip Kropatkin, Richard P. Kusserow - 1986 - 457 pages
Managing Catastrophic Loss of Sensitive Data by Constantine Photopoulos - 2011 - 400 pages
Managing New Issues by Marten Van Heuven, Maarten Botterman, Stephan De Spiegeleire - 2003 - 38 pages
Managing Privacy by H. Jeff Smith - 1994 - 297 pages
Managing statistical confidentiality & microdata access by Conference of European Statisticians - 2007 - 102 pages
Mastering System Center Data Protection Manager 2007 by Devin L. Ganger, Ryan Femling - 2008 - 482 pages
Mastering Windows Network Forensics and Investigation by Steven Anson, Steve Bunting, Ryan Johnson, Scott Pearson - 2012 - 600 pages
Mastering Windows Network Forensics and Investigation by Steven Anson, Steve Bunting, Ryan Johnson, Scott Pearson - 2012 - 600 pages
Mastering Windows Network Forensics and Investigation by Steven Anson, Steve Bunting - 2007 - 552 pages
MasteringNetwork Security by Chris Brenton, Cameron Hunt - 2006 - 512 pages
Masters of deception by Michelle Slatalla, Joshua Quittner - 1995 - 225 pages
Mecklermedia's official Internet World internet security handbook by William Stallings - 1996 - 288 pages
Meeting new obligations for privacy protection by Canadian Institute (1985- ) - 2000
Meeting the need for inter-operability and information security in health IT by United States. Congress. House. Committee on Science and Technology - 2008 - 98 pages
Meeting the need for inter-operability and information security in health IT by United States. Congress. House. Committee on Science and Technology - 2008 - 98 pages
Mente Anti-hacker - Proteja-se! by PAULO MORAES - 196 pages
Metrics and Methods for Security Risk Management by Carl Young - 2010 - 296 pages
Metriken - der Schlüssel zum erfolgreichen Security und Compliance Monitoring by Aleksandra Sowa - 2011 - 136 pages
Microcomputer Data Security by Daniel J. Cronin - 1986 - 281 pages
Microcomputer Security by David J. Stang - 1992 - 281 pages
Microsoft Forefront UAG Mobile Configuration Starter [Instant] by Fabrizio Volpe - 2013 - 79 pages
Microsoft Security Bible by Timothy "Thor" Mullen - 2011 - 315 pages
Microsoft Security Essentials User Manual (Digital Short Cut), e-Pub by Michael Miller - 2009 - 84 pages
Microsoft Virtualization: The Complete Solution by Thomas Olzak, James Sabovik, Jason Boomer, Robert M Keefer - 2010 - 512 pages
Microsoft Windows Security Essentials by Darril Gibson - 2011 - 354 pages
Microsoft Windows Security Essentials by Darril Gibson - 2011 - 354 pages
Microsoft Windows Security Essentials by Darril Gibson - 2011 - 354 pages
Military and civilian control of computer security issues by United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee - 1989 - 317 pages
Military cryptanalytics - 1985 - 227 pages
Military cryptanalytics by William Frederick Friedman - 1985 - 227 pages
Millennium Digital Commerce Act by United States. Congress. Senate. Committee on Commerce, Science, and Transportation - 1999 - 8 pages
Millennium Digital Commerce Act, S. 761 by United States. Congress. Senate. Committee on Commerce, Science, and Transportation - 2002 - 39 pages
Millennium Digital Commerce Act, S. 761 by United States. Congress. Senate. Committee on Commerce, Science, and Transportation - 2002 - 39 pages
Mission-Critical Security Planner by Eric Greenberg - 2003 - 416 pages
Mission-Critical Security Planner by Eric Greenberg - 2003 - 416 pages
Mission-Critical Security Planner by Eric Greenberg - 2003 - 432 pages
Mobile agents and security by Giovanni Vigna - 1998 - 256 pages
Model control system and resource document for conducting computer matching projects involving individual privacy data by United States. Office of Management and Budget, President's Council on Integrity and Efficiency (U.S.). - 1985 - 90 pages
Modern Cryptanalysis by Christopher Swenson - 2012 - 264 pages
Modern cryptology by Gilles Brassard - 1988 - 107 pages
Modern methods for computer security and privacy by Lance J. Hoffman - 1977 - 255 pages
Modern methods for computer security and privacy by Lance J. Hoffman - 1977 - 255 pages
Monitoring electronic mail in the workplace by Marshall B. Babson, Daren Lawrence Bakst, National Legal Center for the Public Interest - 2001 - 32 pages
Moving Target Defense by Sushil Jajodia - 2011 - 183 pages
Multimedia Content Encryption by Shiguo Lian - 2008 - 224 pages
Multimedia Encryption and Watermarking by Borko Furht, Edin Muharemagic, Daniel Socek - 2005 - 327 pages
Multimedia Security by Frank Y. Shih - 2012 - 423 pages
Multimedia Security by Chun-Shien Lu - 2005 - 255 pages
Nagios 3 Enterprise Network Monitoring by Max Schubert, Derrick Bennett, Jonathan Gines, Andrew Hay, John Strand - 2008 - 376 pages
NASS confidentiality pledge by United States. National Agricultural Statistics Service - 2000 - 4 pages
National Computer Security Conference Proceedings, 1992 by DIANE Publishing Company - 1992 - 802 pages
National Computer Security Conference, 1993 (16th) Proceedings by DIANE Publishing Company - 1995 - 541 pages
National Identification Systems by Carl Watner, Wendy McElroy - 2004 - 308 pages
National Information Systems Security '95 (18th) Proceedings by DIANE Publishing Company - 1996 - 760 pages
National Security Issues in Science, Law, and Technology - 2007 - 680 pages
Need for Internet privacy legislation by United States. Congress. Senate. Committee on Commerce, Science, and Transportation - 2006 - 108 pages
Nessus Network Auditing - 2011 - 448 pages
Net crimes & misdemeanors by Jayne A. Hitchcock, Loraine Page - 2002 - 359 pages
Net law by Minnesota Institute of Legal Education - 1996
Net security by Michael Alexander - 1997 - 282 pages
Net Spy by Michael Wolff - 1996 - 185 pages
Netware login scripts by Gilbert Held - 1996 - 191 pages
Network Security by David J. Stang - 1991 - 298 pages
Network Security a Beginners Guide 3/E by Eric Maiwald - 2012 - 336 pages
Network Security Assessment by Chris McNab - 2009 - 508 pages
Network Security Bible by Eric Cole - 2011 - 840 pages
Network Security Bible by Eric Cole - 2009 - 936 pages
Network Security Bible by Eric Cole - 2009 - 840 pages
Network Security Bible by Eric Cole, Ronald L. Krutz, James Conley - 2005 - 694 pages
Network Security For Dummies by Chey Cobb - 2011 - 408 pages
Network Security Foundations by Matthew Strebe - 2006 - 315 pages
Network Security JumpStart by Matthew Strebe - 2006 - 384 pages
Network Security with OpenSSL by John Viega, Matt Messier, Pravir Chandra - 2009 - 386 pages
New Approaches for Security, Privacy and Trust in Complex Environments - 2007 - 498 pages
New Classes of Codes for Cryptologists and Computer Scientists by W. B. Vasantha Kandasamy - 2008 - 206 pages
New Technologies for Digital Crime and Forensics - 2011 - 350 pages
Newsworthiness and the public disclosure tort by Anne Bartol - 1980 - 404 pages
Next Generation SSH2 Implementation by Dale Liu - 2011 - 336 pages
Nine steps to effective EDP loss control by Tom S. Eason, Douglas A. Webb - 1982 - 177 pages
Nmap 6 by Paulino Calderon Pale - 2012 - 318 pages
Noiseless Steganography by Abdelrahman Desoky - 2012 - 300 pages
Nonproliferation Issues For Weapons of Mass Destruction by Mark A. Prelas, Michael Peck - 2005 - 296 pages
Nontechnical Strategies to Reduce Children's Exposure to Inappropriate Material on the Internet by Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content, Board on Children, Youth, and Families, Computer Science and Telecommunications Board, National Research Council - 2001 - 86 pages
Nontechnical strategies to reduce children's exposure to inappropriate material on the internet by Joah G. Iannotta, National Research Council (U.S.). Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content - 2001 - 90 pages
Nuevo reglamento de protección de datos de carácter personal by Emilio del Peso Navarro - 2012 - 872 pages
Obscene material available via the Internet by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 2000 - 141 pages
Obscene material available via the Internet by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 2000 - 141 pages
Obscene material available via the Internet by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 2000 - 141 pages
Obscene material available via the Internet by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 2000 - 141 pages
Obscene material available via the Internet by United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection - 2000 - 141 pages
Ochrona prawna systemów informatycznych wobec zagrożenia cyberterroryzmem by Aleksandra Suchorzewska - 2010 - 396 pages
ODM&T ADP security handbook by United States. Veterans Administration. Office of Data Management and Telecommunications - 1986
OECD guidelines on the protection of privacy and transborder flows of personal data by Organisation for Economic Co-operation and Development - 2002 - 62 pages
Official (Isc)2 Guide to the Cap Cbk by Patrick D. Howard - 2010 - 400 pages
Official (ISC)2 Guide to the SSCP CBK by Diana-Lynn Contesti, Douglas Andre, Paul A. Henry, Bonnie A. Goins, Eric Waxvik - 2007 - 608 pages
On the record by Duncan Campbell, Steve Connor - 1986 - 347 pages
On-Line Business Security Systems by Godfried Williams - 2007 - 220 pages
On-line services and data protection and privacy by Joel R. Reidenberg, Paul M. Schwartz, Commission of the European Communities. Directorate-General Internal Market and Financial Services - 1998
On-line services and data protection and the protection of privacy by European Commission - 1999 - 152 pages
Once more into the data breach by United States - 2006 - 105 pages
Once more into the data breach - 2006 - 105 pages
Once more into the data breach by United States - 2006 - 105 pages
Online Consumer Protection by Kuanchin Chen, Adam Fadlalla - 2008 - 439 pages
Online fraud and crime by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade and Consumer Protection, United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection, Eileen Harrington - 2001 - 76 pages
Online fraud and crime by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection - 2001 - 76 pages
Online fraud and crime by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection - 2001 - 76 pages
Online fraud and crime by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection - 2001 - 76 pages
Online fraud and crime by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection - 2001 - 76 pages
Oops-A-Daisy Smile by Martin Holzke - 2008 - 88 pages
Open Information Security Management Maturity Model (O-Ism3) by Van Haren - 2011 - 152 pages
Optical and Digital Techniques for Information Security - 2005 - 354 pages
Optical document security by Rudolf L. Van Renesse - 1998 - 505 pages
Organised crime in Europe by Council of Europe. Octopus Programme - 2005 - 268 pages
Organizing for computer crime investigation and prosecution by Catherine H. Conly, National Institute of Justice (U.S.), Abt Associates - 1989 - 124 pages
Organizing for computer crime investigation and prosecution by Catherine H. Conly, National Institute of Justice (U.S.), Abt Associates - 1989 - 124 pages
Orientations toward privacy by Nancy Jean Chapman Marshall - 1970 - 290 pages
OS/390-z/OS Security, Audit and Control Features - 2004 - 543 pages
Out of the inner circle by Bill Landreth - 1985 - 230 pages
Outsourcing Information Security by C. Warren Axelrod - 2004 - 248 pages
Oversight and authorization of the Justice Management Division, U.S. Department of Justice by United States. Congress. House. Committee on the Judiciary. Subcommittee on Economic and Commercial Law - 1991 - 86 pages
Oversight and Authorization of the Justice Management Division, U.S. Department of Justice by United States. Congress. House. Committee on the Judiciary. Subcommittee on Economic and Commercial Law - 1991 - 86 pages
Oversight and authorization of the Justice Management Division, U.S. Department of Justice by United States. Congress. House. Committee on the Judiciary. Subcommittee on Economic and Commercial Law - 1991 - 86 pages
Oversight of the State Department by United States. Congress. House. Committee on International Relations - 2001 - 128 pages
Oversight of the State Department by United States. Congress. House. Committee on International Relations - 2001 - 128 pages
Oversight of the State Department by United States. Congress. House. Committee on International Relations - 2001 - 128 pages
Oversight of the State Department by United States. Congress. House. Committee on International Relations - 2001 - 128 pages
Passport files by United States. Congress. Senate. Committee on the Judiciary - 2008 - 89 pages
Password usage by United States. National Bureau of Standards - 1985 - 56 pages
Patriotic Information Systems by Todd Loendorf, G. David Garson - 2008 - 258 pages
PC by Gustavo Talaván - 2006 - 64 pages
PC by Gustavo Talaván - 2006 - 64 pages
PCI Compliance by Branden R. Williams, Anton Chuvakin - 2012 - 360 pages
PCI Compliance by Branden R. Williams, Anton Chuvakin - 2011 - 352 pages
PCI Compliance by Anton Chuvakin, Branden R. Williams - 2009 - 368 pages
Penetration Tester's Open Source Toolkit by Jeremy Faircloth, Chris Hurley - 2007 - 592 pages
Penetration Tester's Open Source Toolkit by Jeremy Faircloth, Chris Hurley - 2007 - 592 pages
Personal Computer Security by Joseph F. Callahan - 1988 - 112 pages
Personal data protection by John M. Court - 1984 - 75 pages
Personal data protection by John M. Court - 1984 - 75 pages
Personal firewalls for administrators and remote users by Lisa Yeo - 2003 - 216 pages
Personal privacy protection by Harold Relyea - 2001 - 80 pages
Personal records by J. Baudot, Task Force on Privacy and Computers (Canada) - 1973 - 417 pages
Persönlichkeitsschutz und Datensicherung by Peter Mutter - 1980 - 198 pages
PGP companion for Windows by Peter Kent - 1995 - 172 pages
Phishing by Rachael Lininger, Russell Dean Vines - 2008 - 334 pages
Phishing by Rachael Lininger, Russell Dean Vines - 2005 - 334 pages
Physical Security Standard for Construction of Sensitive Compartmented Information Facilities by DIANE Publishing Company - 1994 - 281 pages
Piccolo manuale della sicurezza informatica by Riccardo Meggiato - 2010 - 216 pages
Pirataria de Software by Hugo Orrico Jr. - 2004 - 230 pages
Pki by Andrew Nash - 2001 - 513 pages
PKI assessment guidelines by American Bar Association. Electronic Commerce and Information Technology Division. Information Security Committee - 2003 - 363 pages
PKI Security Solutions for the Enterprise by Kapil Raina - 2003 - 336 pages
Placing the Suspect Behind the Keyboard by Brett Shavers - 2013 - 320 pages
Plan for compliance with federal regulations affecting the security and privacy of criminal history record information - 1976 - 230 pages
Police Corruption by Tim Prenzler - 2010 - 240 pages
Policies & Procedures for Data Security by Thomas R. Peltier - 1991 - 176 pages
Policing Cyberspace by Johnny Nhan - 2010 - 208 pages
Policy issues in data protection and privacy by Organisation for Economic Co-operation and Development - 1976 - 324 pages
Pornography on the Internet by United States. Congress. Senate. Committee on the Judiciary - 2008 - 338 pages
Postal Inspection Service's monitoring and control of mail surveillance and mail cover programs by United States. Congress. House. Committee on Post Office and Civil Service. Subcommittee on Postal Facilities, Mail, and Labor Management - 1975 - 238 pages
Postal Inspection Service's monitoring and control of mail surveillance and mail cover programs by United States. Congress. House. Committee on Post Office and Civil Service. Subcommittee on Postal Facilities, Mail, and Labor Management - 1975 - 238 pages
Power and Security in the Information Age by Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel - 2008 - 182 pages
Počítače a kriminalita by Martin Vlček - 1989 - 95 pages
Practical Lock Picking by Deviant Ollam - 2012 - 296 pages
Practical Lock Picking by Deviant Ollam - 2012 - 269 pages
Practical Lock Picking by Deviant Ollam - 2010 - 256 pages
Practical Lock Picking by Deviant Ollam - 2010 - 256 pages
Practices for securing critical information assets by United States. Critical Infrastructure Assurance Office - 2000 - 60 pages
Practicing law in cyberspace 2001 by Indiana Continuing Legal Education Forum - 2001
Praxis Des IT-Rechts by Horst Speichert - 2007 - 368 pages
Praxis Des IT-Rechts by Horst Speichert - 2007 - 368 pages
Pre-Employment Background Investigations for Public Safety Professionals by Frank A. Colaprete - 2012 - 603 pages
Predicting Malicious Behavior by Gary M. Jackson - 2012 - 528 pages
Predicting Malicious Behavior by Gary M. Jackson - 2012 - 528 pages
Preventing computer fraud by Dana L. Stern - 1993 - 294 pages
Preventing Good People From Doing Bad Things by Brian Anderson, John Mutch - 2011 - 220 pages
Primality and cryptography by Evangelos Kranakis - 1986 - 235 pages
Primality and cryptography by Evangelos Kranakis - 1986 - 235 pages
Primality Testing and Integer Factorization in Public-Key Cryptography by Song Y. Yan - 2004 - 236 pages
Principles of Cybercrime by Jonathan Clough - 2010 - 449 pages
Principles of secure communication systems by Don J. Torrieri - 1992 - 576 pages
Principles of secure communication systems by Don J. Torrieri - 1992 - 576 pages
Privacy by Linda D. Koontz - 2007 - 74 pages
Privacy by Janlori Goldman, Zoe Hudson, Richard Mark Smith, California HealthCare Foundation - 2000 - 82 pages
Privacy act system of records by United States. Dept. of the Air Force - 1978 - 299 pages
Privacy and 1984 by United States. Congress. House. Committee on Government Operations. Government Information, Justice, and Agriculture Subcommittee - 1984 - 173 pages
1 2 3 4 5 6 7 8 9 10 11