Designing and building enterprise DMZs /
Managing Cisco network security /
Ethereal : packet sniffing /
CyberWar, CyberTerror, CyberCrime.
The definitive guide to the C & A transformation : the first publication of a comprehensive view Of the C & A transformation /
Network and system security /
Information security risk management for ISO27001/ISO27002 /
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrator or DevOps to master Kali Linux 2 and perform effective security assessment /
Information security best practices : 200 basic rules /
Firewall design and analysis /
Network security evaluation : using the NSA IEM /
Microsoft Identity Manager 2016 handbook : a complete handbook on Microsoft Identity Manager 2016--from design considerations to operational best practices /
Securing the cloud : cloud computer security techniques and tactics /
Advances in cyber security : technology, operations, and experiences /
Hack proofing Sun Solaris 8 /
Web application security is a stack : how to CYA (Cover Your Apps) completely /
Cyberdeterrence and cyberwar /
Internet privacy rights : rights to protect autonomy /
Stopping the spies : constructing and resisting the surveillance state in South Africa /
Norms in a wired world /
Toleration and the Constitution /
Private lives and public policies : confidentiality and accessibility of government statistics /
Technology and privacy : the new landscape /
Who goes there? : authentication through the lens of privacy /
Digital borders and real rights : effective remedies for third-country nationals in the Schengen Information System /
Pax technica : how the internet of things may set us free or lock us up /
Digital whoness : identity, privacy and freedom in the cyberworld /
A world without privacy : what law can and should do? /
Radical secrecy : the ends of transparency in datafied America /
The California Privacy Rights Act (CPRA) - an implementation and compliance guide.
Privacy matters : conversations about surveillances within and beyond the classroom /
Civil liberties : overview, issues and trends /
Anonymous Speech : Literature, Law and Politics.
Personal freedom through human rights law? : autonomy, identity and integrity under the European Convention on Human Rights /
Personality rights in European tort law /
American surveillance : intelligence, privacy, and the Fourth Amendment /
Privacy, intimacy, and isolation /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Computer network /
Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linus 2.0 /
The resilience of networked infrastructure systems : analysis and measurement /
Network analysis, architecture, and design /
Strategy for an Army center for network science, technology, and experimentation /
Transforming combustion research through cyberinfrastructure /
Toward a national research network /
Computer networks and communications /
Theories, Practices and Examples for Community and Social Informatics.
Global trends in computer technology and their impact on export control /
Getting started with Terraform : manage production infrastructure as a code /
Nokia network security : solutions handbook /
PCI compliance : implementing effective PCI data security standards /
Cyber crime, security and digital intelligence /
Nessus network auditing /
Foundational cybersecurity research improving science, engineering, and institutions /