Sunday, October 19, 2008

System Security

Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
by: Ramesh Subramanian
Detection of Intrusions and Malware, and Vulnerability Assessment
by: Diego Zamboni
Applied Security Visualization
by: Raffael Marty
CISSP: Certified Information Systems Security Professional Study Guide
by: James Michael Stewart
Crimeware: Understanding New Attacks and Defenses
by: Markus Jakobsson
Handbook of Research on Wireless Security
by: Yan Zhang
Securing Citrix Presentation Server in the Enterprise
by: Tariq Azad
Foundations of Security: What Every Programmer Needs to Know
by: Neil Daswani, Christoph Kern, Anita Kesavan
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, 3rd Edition
by: Joel Scambray
Rootkits for Dummies
by: Larry Stevenson, Nancy Altholz
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
by: Rich Cannings, Himanshu Dwivedi, Zane Lackey et al.
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
by: Jack Wiles
Best Damn Cybercrime and Forensics Book Period
by: Jack Wiles
Alternate Data Storage Forensics
by: Amber Schroader
Conquest in Cyberspace: National Security and Information Warfare
by: Martin C. Libicki
Computer Security and Cryptography
by: Alan G. Konheim
Blackjacking: Security Threats to BlackBerrys, PDAs, and Cell Phones in the Enterprise
by: Daniel Hoffman
Complete Guide to CISM Certification
by: Thomas Peltier, Justin Peltier
The Developer Highway Code
by: Paul Maher
Wireless Security Handbook
by: Aaron E. Earle
Google Hacks 3rd Edition
by: Paul Bausch, Tara Calishain, Rael Dornfest
Preventing Web Attacks with Apache
by: Ryan C. Barnett
PGP & GPG: Email for the Practical Paranoid
by: Michael W Lucas
Network Security Tools: Writing, Hacking, and Modifying Security Tools
by: Nitesh Dhanjani, Justin Clarke
Writing Security Tools and Exploits
by: James C. Foster
Microsoft Internet Security and Acceleration ISA Server 2004 Unleashed
by: Michael Noel
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
by: James C. Foster, Stuart McClure
Trojans, Worms, and Spyware: A Computer Security Professional's Guide to Malicious Code
by: Michael Erbschloe
Perfect Passwords - Selection, Protection, Authentication
by: Mark Burnett
Honeypots for Windows
by: Roger A. Grimes
Greasemonkey Hacks
by: Mark Pilgrim
Computer Viruses For Dummies
by: Peter H. Gregory
Innocent Code: A Security Wake-Up Call for Web Programmers
by: Sverre H. Huseby
Defense and Detection Strategies against Internet Worms
by: Jose Nazario
Dr. Tom Shinder's Configuring ISA Server 2004
by: Thomas W. Shinder, Debra Littlejohn Shinder (Editor), Martin Grasdal
Firewalls: Jumpstart for Network and Systems Administrators
by: John R. Vacca, Scott Ellis
PDF Hacks
by: Sid Steward
Network Security: A Beginner's Guide, Second Edition
by: Eric Maiwald
HackNotes Windows Security Portable Reference
by: Michael O'Dea
Cybersecurity Operations Handbook
by: John Rittinghouse
Understanding Surveillance Technologies: Spy Devices, Their Origins & Applications
by: Julie K. Petersen
Securing LINUX Step by Step
by: David Ranch Lee Brotzman

No comments: