Security related eBooks
English | Nov 29, 2004 | ISBN: 1587201321 | 528 Pages | CHM | 7.12 MB CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the obje...
( Category:Security related Date:06 May 2015 )
English | Sep 20, 2002 | ISBN: 0321108957 | 480 Pages | CHM | 2 MB Honeypots are highly sophisticated technologies used to observe and learn about hackers. Practical and commercial interest in these n...
( Category:Security related Date:06 May 2015 )
2014 | ISBN: 1627222545 | English | 316 pages | EPUB | 0.35 MB The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms and Business Professionals provides practical cyber threat informatio...
( Category:Security related Date:04 May 2015 )
English | ASIN: B00KFM16JW | 2014 | 59 pages | EPUB | 0,7 MB Protect your privacy and use the internet safely! Don't let news about internet risks deter you from taking full advantage of its benefits!...
( Category:Security related Date:04 May 2015 )
2015 | ISBN-10: 3319167448 | 564 pages | PDF | 30 MB This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptolo...
( Category:Security related Date:03 May 2015 )
2015 | ISBN-10: 3319159429 | 448 pages | PDF | 23 MB This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information Security and Cryptolo...
( Category:Security related Date:03 May 2015 )
English | Oct 1, 2006 | ISBN: 0868409235 | 281 Pages | PDF | 2.1 MB Whether they want to or not, police are increasingly having to work with and through many local, national and international partners...
( Category:Security related Date:02 May 2015 )
English | Oct 2003 | ISBN: 0816049785 | 401 Pages | PDF | 2.1 MB This reference offers a comprehensive survey of how the underworld takes advantage of new technologies, tools and techniques and adapts...
( Category:Security related Date:02 May 2015 )
2014 | 373 Pages | ISBN: 1466594446 | PDF | 3 MB Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing ...
( Category:Security related Date:02 May 2015 )
English | 2010 | ISBN: 1592293557 | 742 pages | PDF | 82.7 MB The revised and expanded second edition of this best-selling book describes all requirements, basic principles, and best practices of secu...
( Category:Security related Date:02 May 2015 )
English | 01 May, 2015 | ISBN: 150864778X | 188 Pages | PDF | 12.7 MB This book is intended to walk you, the end-user, through the best practices for securing both a personal computer running the Wind...
( Category:Security related Date:02 May 2015 )
English | 2012 | ISBN: 1592294065 | 346 pages | PDF | 19.3 MB Work smarter with authorizations! Have you ever had an unauthorized user access something in your system that you could have sworn was off...
( Category:Security related Date:30 Apr 2015 )
English | April 24, 2015 | ASIN: B00WOY87ZU | 718 Pages | PDF | 12.7 MB Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches ...
( Category:Security related Date:30 Apr 2015 )
English | Nov 28, 2006 | ISBN: 0072263644 | 539 Pages | CHM | 16 MB Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hack...
( Category:Security related Date:29 Apr 2015 )
English | May 7, 2004 | ISBN: 0072255021 | 552 Pages | CHM | 16 MB I first got to know Wesley Noonan through a common newsgroup. His insightful and technical comments stuck with me, and I finally met ...
( Category:Security related Date:29 Apr 2015 )