Search Results

Refine Results
  1. 1

    The Browser Hacker's Handbook by Alcorn, Wade

    Published 2014
    Book
  2. 2
  3. 3

    Identity and access management business performance through connected intelligence by Osmanoglu, Ertem

    Published 2013
    Book
  4. 4

    Innovative solutions for access control management

    Published 2016
    Book
  5. 5

    Snort IDS and IPS toolkit by Beale, Jay, Baker, Andrew R., Esler, Joel

    Published 2007
    Book
  6. 6

    The Stephen cobb complete book of PC and LAN security by Cobb lhStephen

    Book
  7. 7
  8. 8

    Modern cryptography theory and practice by Mao, Wenbo

    Published 2004
    Book
  9. 9

    Computer security a comprehensive controls checklist by lh

    Published 1987
    Book
  10. 10

    Security in computing by Pfleeger lhCharles P.

    Book
  11. 11

    Web security for network and system administrators by Mackey, David

    Published 2003
    Book
  12. 12

    Computer and communication security strategies for the 1990s by Cooper

    Published 1989
    Book
  13. 13

    Cryptography and security services mechanisms and applications by Mogollon, Manuel

    Published 2007
    Book
  14. 14

    The hacker's handbook the strategy behind breaking into and defending network by Young 1968-

    Published 2004
    Book
  15. 15

    Practical intrusion analysis prevention and detection for the twenty-first century by Trost, Ryan

    Published 2010
    Book
  16. 16

    Managing security with Snort and IDS tools by Cox, Kerry

    Published 2004
    Book
  17. 17

    AAA identity management security by Santuka, Vivek

    Published 2011
    Book
  18. 18

    Client - side attacks and defense by Shimonski, Robert

    Published 2012
    Book
  19. 19
  20. 20

    Kali Linux cookbook effective penetration testing solutions by Schultz, Corey P., Perciaccante, Bob

    Published 2017
    Book