Search Results
-
1
-
2
-
3
-
4
-
5
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
Published 2001Get full text
Licensed eBooks -
6
-
7
Information security best practices : 200 basic rules /
Published 2001Get full text
Licensed eBooks -
8
-
9
Techniques and applications of digital watermarking and content protection /
Published 2003Get full text
Licensed eBooks -
10
Who goes there? : authentication through the lens of privacy /
Published 2003Get full text
Licensed eBooks -
11
Protecting your library's digital sources : the essential guide to planning and preservation /
Published 2004Get full text
Licensed eBooks -
12
-
13
-
14
Security and control in information systems : a guide for business and accounting /
Published 2000Get full text
Licensed eBooks -
15
-
16
Basics of contemporary cryptography for IT practitioners /
Published 2005Get full text
Licensed eBooks -
17
Essential computer security : everyone's guide to e-mail, internet, and wireless security /
Published 2006Get full text
Licensed eBooks -
18
-
19
Risk management for computer security : Protecting your network and information assets /
Published 2005Get full text
Licensed eBooks -
20
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Published 2006Get full text
Licensed eBooks