BooksSitemapComputersSecurityGeneral
Securing consumers' data by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection - 2005 - 61 pages
Securing consumers' data by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection - 2005 - 61 pages
Securing electronic personal data by United States. Congress. Senate. Committee on the Judiciary - 2005 - 222 pages
Securing electronic personal data by United States. Congress. Senate. Committee on the Judiciary - 2005 - 222 pages
Securing electronic personal data by United States. Congress. Senate. Committee on the Judiciary - 2005 - 222 pages
Securing Intellectual Property by Information Security - 2008 - 288 pages
Securing our infrastructure by United States. Congress. Senate. Committee on Governmental Affairs - 2003 - 229 pages
Securing PCs and Data in Libraries and Schools by Allen C. Benson - 1997 - 252 pages
Securing the Virtual Environment by Davi Ottenheimer, Matthew Wallace - 2012 - 408 pages
Securing the Virtual Environment by Davi Ottenheimer, Matthew Wallace - 2012 - 408 pages
Securing the Virtual Environment, Included DVD by Davi Ottenheimer, Matthew Wallace - 2012 - 456 pages
Security 2020 by Doug Howard, Kevin Prince - 2010 - 336 pages
Security 2020 by Doug Howard, Kevin Prince - 2010 - 336 pages
Security and control of information technology in society by Richard Sizer - 1994 - 235 pages
Security and Dependability for Ambient Intelligence by George Spanoudakis, Antonio Maña Gómez, Kokolakis Spyros - 2009 - 392 pages
Security and embedded systems by Ran Giladi, Dimitrios Nikolaou Serpanos - 2006 - 203 pages
Security and Freedom through Encryption (SAFE) Act by United States. Congress. House. Committee on the Judiciary. Subcommittee on Courts and Intellectual Property - 1997 - 166 pages
Security and Intelligent Information Systems - 2012 - 401 pages
Security and privacy by IEEE Computer Society. Technical Committee on Security and Privacy, International Association for Cryptologic Research - 1999 - 243 pages
Security and privacy - 1999 - 243 pages
Security and Privacy in Digital Rights Management by Tomas Sander - 2002 - 244 pages
Security and Privacy in Digital Rights Management by Tomas Sander - 2002 - 244 pages
Security and Privacy Symposium 2000 - 2000 - 256 pages
Security and Protection in Information Processing Systems by Yves Deswarte - 2004 - 548 pages
Security and Protection in Information Processing Systems by Yves Deswarte - 2004 - 548 pages
Security and Usability by Lorrie Faith Cranor, Simson Garfinkel - 2008 - 744 pages
Security and usability by Lorrie Faith Cranor, Simson Garfinkel - 2005 - 714 pages
Security Engineering by Ross J. Anderson - 2010 - 1080 pages
Security Engineering by Ross J. Anderson - 2010 - 1080 pages
Security evaluation for small computer centers by Chantico-QED Staff - 1985 - 159 pages
Security for computer systems by M. A. L. Farr, B. Chadwick, Kenneth Kiu Wong - 1972 - 172 pages
Security for Dial-Up Lines by Eugene F. Troy - 1986 - 71 pages
Security for Microsoft Windows System Administrators by Derrick Rountree - 2011 - 216 pages
Security for mobility by Chris Mitchell, Institution of Electrical Engineers - 2004 - 440 pages
Security for Mobility by Chris J. Mitchell - 2004 - 440 pages
Security for Ubiquitous Computing by Frank Stajano - 2002 - 268 pages
Security in a Web 2.0+ World by Carlos Curtis Solari - 2010 - 268 pages
Security in a Web 2.0+ World by Carlos Curtis Solari - 2009 - 288 pages
Security in computing by Charles P. Pfleeger, Shari Lawrence Pfleeger - 2003 - 746 pages
Security in computing by Charles P. Pfleeger - 1997 - 574 pages
Security in computing by Charles P. Pfleeger - 1996 - 574 pages
Security in computing by Charles P. Pfleeger - 1989 - 538 pages
Security in Cyberspace by Richard O. Hundley, Rand Corporation, Ditchley Foundation - 1996 - 59 pages
Security in Cyberspace by Richard O. Hundley, Rand Corporation, Ditchley Foundation - 1996 - 59 pages
Security in RFID and Sensor Networks - 2010 - 560 pages
Security in Sensor Networks - 2006 - 341 pages
Security in the information age by United States. Congress. Joint Economic Committee - 2002 - 130 pages
Security mechanisms for computer networks by Sead Muftic, Per Christoffersson - 1989 - 195 pages
Security mechanisms for computer networks by Sead Muftic, Per Christoffersson - 1989 - 195 pages
Security of computer based information systems by V. P. Lane - 1985 - 182 pages
Security of Mobile Communications by Noureddine Boudriga - 2009 - 630 pages
Security Patch Management by Felicia M. Nicastro - 2011 - 270 pages
Security Patterns by Markus Schumacher, Eduardo Fernandez-Buglioni, Duane Hybertson, Frank Buschmann, Peter Sommerlad - 2006 - 600 pages
Security planning & disaster recovery by Eric Maiwald, William Sieglein - 2002 - 299 pages
Security planning & disaster recovery by Eric Maiwald, William Sieglein - 2002 - 299 pages
Security Planning & Disaster Recovery by Eric Maiwald, William Sieglein - 2002 - 299 pages
Security Power Tools by Bryan Burns, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch - 2008 - 860 pages
Security Protocols XVI - 2011 - 257 pages
Security standards for data processing by Susan Wooldridge, Colin R. Corder, Claude R. Johnson - 1973 - 186 pages
Security standards for data processing by Susan Wooldridge, Colin R. Corder, Claude R. Johnson - 1973 - 186 pages
Security Warrior by Cyrus Peikari, Anton Chuvakin - 2009 - 556 pages
Security+ by Michael A. Pastore - 2003 - 555 pages
Security+ by Kalani Kirk Hausman, Diane Barrett, Martin Weiss - 2003 - 484 pages
Security+ by Kalani Kirk Hausman, Diane Barrett, Martin Weiss - 2003 - 484 pages
Security+ by Michael A. Pastore - 2003 - 555 pages
Security+ Fast Pass by James M. Stewart - 2006 - 224 pages
Security+ Fast Pass by James M. Stewart - 2006 - 224 pages
Security+ Study Guide by Ido Dubrawsky, Jeremy Faircloth - 2007 - 864 pages
Security+ Study Guide by Mike Pastore, Michael A. Pastore, Emmett Dulaney - 2004 - 544 pages
Security+ Study Guide by Mike Pastore, Michael A. Pastore, Emmett Dulaney - 2004 - 544 pages
Security+ Training Guide by Todd King - 2003 - 699 pages
Security, Audit and Control Features SAP ERP, 3rd Edition by Deloitte Touche Tohmatsu Research Team and ISACA - 2009 - 461 pages
Seguranca Em Informatica E de Informacoes by Carlos Alberto Antonio Caruso, Flavio Deny Steffen - 1999 - 366 pages
Seguranca Em Informatica E de Informacoes by Carlos Alberto Antonio Caruso, Flavio Deny Steffen - 1999 - 366 pages
Segurança de redes em ambientes cooperativos by Emilio Tissato Nakamura, Paulo Lício de Geus - 2007 - 482 pages
SEGURANÇA EM PHP by Marcio Pessoa - 152 pages
Segurança em Redes Privadas Virtuais - VPNs by Alexandre Guedes Guimaraes, Alexandre Guedes Guimarães / Rafael Dueire Lins / Raimundo Corrêa de Oliveira, Rafael Dueire Lins, Raimundo Correa Da Oliveira - 232 pages
Segurança no desenvolvimento de software by BRUNO DE MORAIS RIBEIRO, Ricardo Albuquerque - 2002 - 310 pages
Segurança no desenvolvimento de software by BRUNO DE MORAIS RIBEIRO, Ricardo Albuquerque - 2002 - 310 pages
Seguridad de los sitemas informáticos by Royal P. Fisher - 1988 - 264 pages
Selections from Cryptologia by Cipher A. Deavours, David Kahn - 1998 - 552 pages
Sensitive data protection in the European Union by Anne Cammilleri-Subrenat, Claire Levallois-Barth - 2007 - 250 pages
Sharing the knowledge by Steven M. Rinaldi, USAF Institute for National Security Studies - 2000 - 66 pages
Shipper's export declarations by United States. Congress. Senate. Committee on Governmental Affairs - 1980 - 149 pages
Shipper's export declarations by United States. Congress. Senate. Committee on Governmental Affairs - 1980 - 149 pages
Shipper's export declarations by United States. Congress. Senate. Committee on Governmental Affairs - 1980 - 149 pages
Sicherheit der Informationsgesellschaft - 2000 - 201 pages
Sicherheit und Kryptographie im Internet by Jörg Schwenk - 2010 - 264 pages
Sicherheit und Kryptographie Im Internet by Jörg Schwenk - 2010 - 264 pages
Sicherheit und Rechtsverbindlichkeit Mobiler Agenten - 2007 - 281 pages
Sicherheit und Rechtsverbindlichkeit mobiler Agenten - 2007 - 281 pages
Sicherheit und Vertrauen in Der Mobilen Informations- und Kommunikationstechnologie - 2009 - 179 pages
Sicherheit und Vertrauen in der mobilen Informations- und Kommunikationstechnologie - 2009 - 179 pages
Sicurezza dei sistemi informatici by Maria Grazia Fugini, Fabrizio Maio, Pierluigi Plebani - 2001 - 275 pages
Sicurezza e privacy in azienda by Paolo Galdieri, Corrado Giustozzi, Marco Strano - 2001 - 142 pages
Sicurezza in informatica by Charles P. Pfleeger - 2004 - 734 pages
Simulazione e falsificazione by Alberto Benini, Maurizio Torrealta - 1981 - 172 pages
Sites Seguros by ERIK SCHETINA, JACOB CARLSON - 480 pages
Small business and computer crime by United States. Congress. House. Committee on Small Business. Subcommittee on Regulation and Business Opportunities - 1988 - 120 pages
Small Business Computer Crime Prevention Act, H.R. 3075 by United States. Congress. House. Committee on Small Business. Subcommittee on Antitrust and Restraint of Trade Activities Affecting Small Business - 1983 - 67 pages
SnortFor Dummies by Charlie Scott, Paul Wolfe, Bert Hayes - 2004 - 372 pages
Social and Human Elements of Information Security by Manish Gupta, Raj Sharman - 2008 - 383 pages
Social Engineering by Christopher Hadnagy - 2010 - 360 pages
Social Engineering by Christopher Hadnagy - 2010 - 408 pages
Social Security Number Privacy and Identity Theft Prevention Act of 2004 by United States. Congress. House. Committee on Ways and Means - 2004
Socio-technical analysis applied to computer operations organizations by James Chapman Taylor - 1979 - 25 pages
Software and System Safety by Terry L. Hardy - 2012 - 352 pages
Software Forensics by Robert Slade - 2004 - 215 pages
Software Similarity and Classification by Silvio Cesare, Yang Xiang - 2012 - 88 pages
Software under siege by Ernst L. Leiss - 1990 - 132 pages
Solutions to the Threat of Cyber Terrorism to Homeland Security by Norman Schneidewind - 2006 - 48 pages
Solving simple substitution ciphers by Frances A. Harris, S. Tuck - 1959 - 44 pages
Special inquiry on invasion of privacy by United States. Congress. House. Committee on Government Operations. Special inquiry Subcommittee on Invasion of Privacy - 1966
Special inquiry on invasion of privacy by United States. Congress. House. Committee on Government Operations. Special inquiry Subcommittee on Invasion of Privacy - 1966
Special Ops by Erik Pace Birkholz, Chip Andrews - 2003 - 784 pages
Spectacular computer crimes by Buck BloomBecker - 1990 - 242 pages
Spia e non farti spiare dal tuo capo, dai tuoi genitori, dagli hacker... by Luca Graziano - 2005 - 124 pages
Spies Among Us by Ira Winkler - 2005 - 352 pages
Spies Among Us by Ira Winkler - 2005 - 346 pages
Spies Among Us by Ira Winkler - 2005 - 326 pages
Spring Security 3 by Peter Mularien - 2010 - 396 pages
SQL Injection Attacks and Defense by Justin Clarke - 2009 - 464 pages
SSCP by Joshua J. Jacobs, Jeffrey Posluns, Lee Clemmer, Michael Dalton, Russ Rogers - 2003 - 625 pages
SSH, The Secure Shell: The Definitive Guide by Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes - 2011 - 670 pages
Staff study of computer security in Federal programs by United States. Congress. Senate. Committee on Government Operations - 1977 - 298 pages
Standard for Auditing Computer Applications, Second Edition by Martin A. Krist - 2010 - 832 pages
Standards for the security and privacy of criminal history record information by Search Group, United States. Bureau of Justice Statistics - 1988 - 42 pages
State Department foreign buildings operations and diplomatic security construction programs by United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee - 1892 - 360 pages
State official's guide to Internet privacy by Cindy J. Lackey, Council of State Governments - 2002 - 113 pages
States and Internet privacy by Pam Greenberg, National Conference of State Legislatures - 2004 - 13 pages
Statistical data banks and their effects on privacy by H. S. Gellman, Task Force on Privacy and Computers (Canada) - 1973 - 47 pages
Statistical Methods In Computer Security by William W. S. Chen - 2005 - 352 pages
Statistics and privacy by Karen Leander, Sweden. Statistiska centralbyrån - 1987 - 57 pages
Statistics and privacy by Karen Leander, Sweden. Statistiska centralbyrån - 1987 - 57 pages
Steel Bolt Hacking by Douglas Chick - 2004 - 108 pages
Steel Bolt Hacking by Douglas Chick - 2004 - 108 pages
StorageSS '05 by Bill Yurcik, Larry Brumbaugh, Yuanyuan Zhou - 2005 - 141 pages
Strategic appraisal by Zalmay Khalilzad, United States. Air Force, Rand Corporation, Project Air Force (U.S.) - 1999 - 452 pages
Strife, liberty, and the pursuit of privacy by Thomas J. White Family Center of Public Law and Government of the Saint Louis University School of Law - 2006 - 276 pages
Strong centralized management needed in computer-based information systems by United States. General Accounting Office - 1978 - 20 pages
Subcommittee hearing on data security by United States. Congress. House. Committee on Small Business. Subcommittee on Finance and Tax - 2007 - 95 pages
Subcommittee hearing on data security by United States. Congress. House. Committee on Small Business. Subcommittee on Finance and Tax - 2007 - 95 pages
Summary of a Workshop on Software Certification and Dependability by Committee on Certifiably Dependable Software Systems, National Research Council - 2004 - 42 pages
SuperKey by Borland International - 1985 - 200 pages
Supporting Internet safety awareness by United States. Congress. House. Committee on Commerce
Surreptitious Software by Jasvir Nagra, Christian Collberg - 2009 - 792 pages
Surviving security by Mandy Andress, Amanda Andress - 2001 - 525 pages
Symmetrische Verschlüsselungsverfahren by Michael Miller - 2003 - 315 pages
Symposium by University of San Francisco. School of Law - 2007 - 228 pages
Symposium by University of Mississippi. School of Law - 2007 - 350 pages
System security by David L. Oppenheimer, David A. Wagner, Michele D. Crabb, USENIX Association, System Administrators Guild - 1997 - 91 pages
System security by Online Publications (Firm) - 1985 - 276 pages
System security standards for electronic data processing by New York (N.Y.). Dept. of Investigation - 1981 - 109 pages
Systems capacity for data security by C. C. Gotlieb, J. N. P. Hume, Task Force on Privacy and Computers (Canada) - 1972 - 112 pages
Systems design for data protection by Michael B. Wood, Tony Elbra - 1984 - 143 pages
Systems safety by Donald Layton - 1989 - 166 pages
Systemy Digital Rights Management w świetle prawa autorskiego by Krzysztof Gienas - 2008 - 305 pages
Tajemnica państwowa i inne tajemnice chroniące interesy państwa i obywateli by Ryszard Taradejna, Małgorzata Taradejna - 1999 - 240 pages
Tamara Hood et al., plaintiffs and appellants, v. the National Enquirer, Inc. et al., defendants and respondents by Tamara Hood, National Enquirer, Inc, California. Superior Court (Los Angeles County). Appellate Dept - 1995 - 47 pages
Taps, bugs, and fooling the people by Herman Schwartz - 1977 - 48 pages
Targeted Violence by Glenn P. McGovern - 2011 - 331 pages
Tarjetas de datos sanitarios con circuito integrado (tarjetas inteligentes) by Otto Rienhoff, Pan American Health Organization. Health Services Organization Unit. Technology and Health Services Delivery - 2003 - 118 pages
Tax systems modernization by United States. General Accounting Office, United States. Congress. Senate. Committee on Governmental Affairs - 1992 - 11 pages
Taxpayer privacy issues by United States. Congress. House. Committee on Ways and Means. Subcommittee on Oversight - 1982 - 220 pages
Taxpayer privacy issues by United States. Congress. House. Committee on Ways and Means. Subcommittee on Oversight - 1982 - 220 pages
Taĭnopisʹ kirillit︠s︡y by A. V. Zinovʹev - 1998 - 319 pages
Techniques and Applications for Advanced Information Privacy and Security by Hamid R. Nemati - 2009 - 378 pages
Techniques and Applications of Digital Watermarking and Content Protection by Michael Konrad Arnold, Martin Schmucker, Stephen D. Wolthusen - 2003 - 274 pages
Technocrime by Stéphane Leman-Langlois - 2008 - 259 pages
Technocrime: Policing and Surveillance - 2012 - 176 pages
Technocrimes by August Bequai - 1987 - 192 pages
Technocrimes by August Bequai - 1987 - 192 pages
Technology and Privacy by Philip E. Agre, Marc Rotenberg - 1998 - 325 pages
Technology assessment by United States. General Accounting Office - 2004 - 214 pages
Technology development at the Federal Aviation Administration by United States. Congress. House. Committee on Science. Subcommittee on Technology - 1998 - 90 pages
TechnoSecurity's Guide to E-Discovery and Digital Forensics - 2011 - 400 pages
Tecnologia e Cidadania Digital by Renato da Silveira Martini - 2008 - 197 pages
Telecommunications by Patrick Flanagan - 1997 - 206 pages
Telecommunications network security by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Telecommunications and Finance - 1994 - 260 pages
Telecommunications network security by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Telecommunications and Finance - 1994 - 260 pages
Terrorism and Organized Hate Crime by Michael R. Ronczkowski - 2006 - 392 pages
Terrorist Recognition Handbook by Malcolm W. Nance - 2008 - 480 pages
Testing Web Security by Steven Splaine - 2002 - 368 pages
The application of cryptography to data base security by Ehud Gudes - 1976 - 434 pages
The Art of Deception by Kevin D. Mitnick, William L. Simon - 2011 - 368 pages
The Art of Deception by Kevin D. Mitnick, William L. Simon - 2001 - 368 pages
The Art of Intrusion by Kevin D. Mitnick, William L. Simon - 2009 - 288 pages
The Art of Intrusion by Kevin D. Mitnick, William L. Simon - 2005 - 270 pages
The Art of Intrusion by Kevin D. Mitnick, William L. Simon - 2005 - 270 pages
The Art of Intrusion by Kevin D. Mitnick, William L. Simon - 2005 - 288 pages
The art of intrusion by Kevin David Mitnick, William L. Simon - 2005 - 270 pages
The Art of Security and Information Hiding by Emmanuel Sodipo - 2008 - 192 pages
The Basics of Digital Forensics by John Sammons - 2012 - 177 pages
The Best Damn Cybercrime and Digital Forensics Book Period by Jack Wiles, Anthony Reyes - 2011 - 736 pages
The Best Damn Firewall Book Period by Thomas W Shinder - 2011 - 1168 pages
The Best Damn IT Security Management Book Period by Susan Snedaker, Robert McCrie - 2011 - 960 pages
The Best of 2600 by Emmanuel Goldstein - 2008 - 800 pages
The Best of 2600 by Emmanuel Goldstein - 2008 - 800 pages
The Best of 2600, Collector's Edition by Emmanuel Goldstein - 2009 - 912 pages
The Best of 2600, Collector's Edition by Emmanuel Goldstein - 2009 - 912 pages
1 2 3 4 5 6 7 8 9 10 11