Browsing by Subject Information security

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 21  next >
Issue DateTitleAuthor(s)
2014Applied Network Security Monitoring. Collection, Detection, and AnalysisSanders, Chris; Smith, Jason
2014The basics of information security. Understanding the fundamentals of infosec in theory and practiceAndress, Jason
2009Computer Network Security Theory and PracticeWang, Jie
2011Computer Networks, Fifth EditionTanenbaum, Andrew S.; Wetherall, David J.
2010Cryptography and Network Security: Principles and Practice, Fifth EditionStallings, William
2014Cryptography in constant parallel timeApplebaum, Benny
2016Cryptography made simpleSmart, Nigel p.
2014Cybersecurity systems for human cognition augmentationPino, Robinson E.; Kott, Alexander; Shevenell, Michael
2013Economics of information security and privacy IIIRansbotham, Sam; Mitra, Sabyasachi; Schneier, Bruce
2007Foundations of Security: What Every Programmer Needs to KnowDaswani, Neil; Kern, Christoph; Kesavan, Anita
2012Hacking Web Apps: Detecting and Preventing Web Application Security ProblemsShema, Mike
1996Handbook of applied cryptographyMenezes, Alfred; Oorschot, Paul van; Vanstone, Scott
2013Information security analystMara, Wil
2011Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication: 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. ProceedingsAmarilli, Antoine; Ardagna, Claudio A.; Zhou, Jianying
2013Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. ProceedingsPeng, Kun; Henricksen, Matt; Cavallaro, Lorenzo; Gollmann, Dieter
2014The infoSec handbook: An inroduction to information securityRao, Umesh Hodeghatta; Nayak, Umesha
2014Introduction to Information Security. A Strategic-Based ApproachShimeall, Timothy; Spring, Jonathan
2007Network Security Assessment: From Vulnerability to PatchManzuik, Steve; Gold, Andre; Pfeil, Ken
2011Readings and cases in information security : law and ethicsWhitman, Michael E; Mattord, Herbert J
2011The web application hacker's handbook: finding and exploiting security flaws, Second EditionStuttard, Dafydd; Pinto, Marcus