Computers Security General
Showing 1 - 12 of 164 results
Search Titles![IP Address Management: Principles and Practice](https://s3.amazonaws.com/bookpreview/PubmatchTitleImages/thumb2/book_small_image_1568634273.jpg)
IP Address Management:...
- Published in 2011
- 448
![Schneier on Security](https://images-na.ssl-images-amazon.com/images/I/51cDsBfQtkL._SL160_.jpg)
Schneier on Security
- Published in 2008
- 336
![The Best of 2600: A Hacker Odyssey](https://images-na.ssl-images-amazon.com/images/I/51qJQHvHiJL._SL160_.jpg)
The Best of 2600: A Ha...
- Published in 2008
- 888
![Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography](https://images-na.ssl-images-amazon.com/images/I/5121iYqvnxL._SL160_.jpg)
Hardware-Based Compute...
- Published in 2008
- 256
![Modern Cryptanalysis: Techniques for Advanced Code Breaking](https://images-na.ssl-images-amazon.com/images/I/51vMsX2v4dL._SL160_.jpg)
Modern Cryptanalysis:...
- Published in 2008
- 264
![The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking](https://images-na.ssl-images-amazon.com/images/I/51V8GtxpqFL._SL160_.jpg)
The CEH Prep Guide: Th...
- Published in 2007
- 768
![Information Security Governance: A Practical Development and Implementation Approach](https://images-na.ssl-images-amazon.com/images/I/51CLW08b7fL._SL160_.jpg)
Information Security G...
- Published in 2009
- 220
![Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition](https://images-na.ssl-images-amazon.com/images/I/51VH4UcK68L._SL160_.jpg)
Security Engineering:...
- Published in 2008
- 1088
![Unauthorised Access - Physical Penetration Testing For IT Security Teams](https://images-na.ssl-images-amazon.com/images/I/41FCVk30SKL._SL160_.jpg)
Unauthorised Access -...
- Published in 2009
- 308
![Security for Ubiquitous Computing](https://images-na.ssl-images-amazon.com/images/I/51G0zDo9VIL._SL160_.jpg)
Security for Ubiquitou...
- Published in 2002
- 268
![Security Standards in a Web + 2.0 World - AStandards-Based Approach](https://images-na.ssl-images-amazon.com/images/I/51nXHLUySPL._SL160_.jpg)
Security Standards in...
- Published in 2009
- 296
![Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions](https://bookpreview.s3.amazonaws.com/PubmatchUsersImages/books/thumb2/9781118810118.jpg)
Hacking Point of Sale:...
- Published in 2014
- 312