Management of Information Security
Whitman/Mattord
Download - Immediately Available
Format: eBook (PDF)
Enterprise Security Architecture : A Business-Driven Approach
Nicholas Sherwood
Download - Immediately Available
Format: eBook (EPUB)
Enterprise Security Architecture : A Business-Driven Approach
Nicholas Sherwood
Download - Immediately Available
Format: eBook (PDF)
Handbook of Applied Cryptography
Alfred J. Menezes
Download - Immediately Available
Format: eBook (PDF)
PRAGMATIC Security Metrics : Applying Metametrics to Information Security
W. Krag, CISM (Enterprise Security Architect, Thousand Oaks, C Brotby
Download - Immediately Available
Format: eBook (PDF)
Information Processing and Security Systems
Khalid Saeed
Download - Immediately Available
Format: eBook (PDF)
Complete Guide to CISM Certification
Thomas R. (Thomas R. Peltier Associates, LLC, Wyandotte, Mich Peltier
Download - Immediately Available
Format: eBook (PDF)
Applied Cryptography : Protocols, Algorithms and Source Code in C
Bruce Schneier
Download - Immediately Available
Format: eBook (EPUB)
Everyday Cryptography : Fundamental Principles and Applications
Keith Martin
Download - Immediately Available
Format: eBook (PDF)
Security Engineering : A Guide to Building Dependable Distributed Systems
Ross J. Anderson
Download - Immediately Available
Format: eBook (PDF)
Foundations of Cryptography: Volume 1, Basic Tools
Oded (Weizmann Institute of Science, Israel) Goldreich
Download - Immediately Available
Format: eBook (PDF)
Foundations of Cryptography: Volume 2, Basic Applications
Oded Goldreich
Download - Immediately Available
Format: eBook (PDF)
The Official (ISC)2 Guide to the SSCP CBK
Adam Gordon
Download - Immediately Available
Format: eBook (EPUB)
Guide to Computer Forensics and Investigations
Nelson/Phillips/Steuart
Download - Immediately Available
Format: eBook (PDF)
An Introduction to Mathematical Cryptography
Jeffrey Hoffstein
Download - Immediately Available
Format: eBook (PDF)
Embedded Security in Cars : Securing Current and Future Automotive IT Applications
Kerstin Lemke
Download - Immediately Available
Format: eBook (PDF)
Information Security Architecture : An Integrated Approach to Security in the Organization, Second Edition
Jan Killmeyer
Download - Immediately Available
Format: eBook (PDF)
Official (ISC)2(R) Guide to the CISSP(R)-ISSEP(R) CBK(R)
Susan Hansche
Download - Immediately Available
Format: eBook (PDF)
Windows(R) XP Professional Security
C. J. Weber
Download - Immediately Available
Format: eBook (PDF)
Microsoft Windows Security Fundamentals : For Windows 2003 SP1 and R2
Jan De Clercq
Download - Immediately Available
Format: eBook (PDF)
Digital Watermarking and Steganography
Ingemar Cox
Download - Immediately Available
Format: eBook (PDF)
DDoS Attacks : Evolution, Detection, Prevention, Reaction, and Tolerance
Dhruba Kumar (Tezpur University, Assam, India) Bhattacharyya
Download - Immediately Available
Format: eBook (PDF)
Programming Bitcoin : Learn How to Program Bitcoin from Scratch
Jimmy Song
Download - Immediately Available
Format: eBook (EPUB)