Showing 217 - 228 of 263 results

Search Titles

Below Are Your Selected Attending Tradeshow


CISA: Certified Information Systems Auditor Study Guide, Third Edition

CISA: Certified Inform...

by David L. Cannon
  • Published in 2011
  • 696
Dear Hacker: Letters to the Editor of 2600

Dear Hacker: Letters t...

by Emmanuel Goldstein
  • Published in 2010
  • 576
Implementing Email Security and Tokens: Current Standards, Tools, and Practices

Implementing Email Sec...

by Sean Turner, Russ Housley
  • Published in 2008
  • 296
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

Implementing NAP and N...

by Daniel V. Hoffman
  • Published in 2008
  • 288
CASP: CompTIA Advanced Security Practitioner Study Guide (Exam CAS-001)

CASP: CompTIA Advanced...

by Michael Gregg, Billy Haines
  • Published in 2012
  • 552
Applied Cryptanalysis: Breaking Ciphers in the Real World

Applied Cryptanalysis:...

by Richard M. Low, Richard M. Low
  • Published in 2007
  • 424
Information Security and IT Risk Management

Information Security a...

by Eric Pierce, Alex Campoe, Eric Pierce
  • Published in 2014
  • 432
The Death of the Internet

The Death of the Inter...

by Markus Jakobsson
  • Published in 2012
  • 386
The Database Hacker's Handbook: Defending Database Servers

The Database Hacker's...

by Bill Grindlay, Chris Anley, John Heasman, Bill Grindlay
  • Published in 2005
  • 532
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

IT Security Interviews...

by Brian Kirouac, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller
  • Published in 2007
  • 244
Practical Cryptography

Practical Cryptography

by Bruce Schneier, Bruce Schneier
  • Published in 2003
  • 432
Implementing SSL/TLS Using Cryptography and PKI

Implementing SSL/TLS U...

by Joshua Davies
  • Published in 2011
  • 704

Showing 217 - 228 of 263 results

loading