Books
- Computer Forensics: Investigation Procedures and Response
- Computer Forensics: Investigating Network Intrusions and Cyber Crime
- Computer Forensics: Investigating Data and Image Files
- Network Security Bible
- 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
- Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
- The CSSLP Prep Guide: Mastering the Certified Secure Software Lifecycle Professional
- Oracle Data Guard 11g Handbook
- Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
- Information Security Management Handbook, 2009 CD-ROM Edition
- Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
- The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
- Windows Internals: Including Windows Server 2008 and Windows Vista, Fifth Edition
- Windows Forensic Analysis DVD Toolkit, Second Edition
- Algorithmic Cryptanalysis (Chapman & Hall/Crc Cryptography and Network Security)
- Wireless and Mobile Networks Security
- Beautiful Security: Leading Security Experts Explain How They Think
- The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
- The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
- Gray Hat Python: Python Programming for Hackers and Reverse Engineers
- CompTIA Network+ Study Guide: Exam N10-004
- Cloud Application Architectures: Building Applications and Infrastructure in the Cloud
- HOWTO Secure and Audit Oracle 10g and 11g
- Chained Exploits: Advanced Hacking Attacks from Start to Finish
- The Mac Hacker's Handbook
First Previous 5 6 7 8 9 Next Last