Showing 253 - 263 of 263 results

Search Titles

Below Are Your Selected Attending Tradeshow


Professional Rootkits

Professional Rootkits

by Ric Vieler
  • Published in 2007
  • 360
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, Second Edition

The Shellcoder's Handb...

by Gerardo Richarte, John Heasman, Felix Lindner, Gerardo Richarte
  • Published in 2007
  • 744
The Oracle Hacker's Handbook: Hacking and Defending Oracle

The Oracle Hacker's Ha...

by David Litchfield
  • Published in 2007
  • 216
Carry On: Sound Advice from Schneier on Security

Carry On: Sound Advice...

by Bruce Schneier
  • Published in 2013
  • 384
Public Key Cryptography: Applications and Attacks

Public Key Cryptograph...

by Lynn Margaret Batten
  • Published in 2013
  • 224
Computational Number Theory and Modern Cryptography

Computational Number T...

by Song Y. Yan
  • Published in 2013
  • 432
Reliability and Availability of Cloud Computing

Reliability and Availa...

by Randee Adams, Randee Adams
  • Published in 2012
  • 352
Computer, Network, Software, and Hardware Engineering with Applications

Computer, Network, Sof...

by Norman F. Schneidewind
  • Published in 2012
  • 608
Cyber Security Policy Guidebook

Cyber Security Policy...

by Joseph Weiss, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt
  • Published in 2012
  • 288
Computer Security and Cryptography

Computer Security and...

by Alan G. Konheim
  • Published in 2007
  • 544
Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams

Information Technology...

by Daniel Minoli, Daniel Minoli
  • Published in 2010
  • 440

Showing 253 - 263 of 263 results

loading