|
Title |
Authors/Editors |
Publisher |
Type |
Copies |
|
Windows Server 2008 PKI and Certificate Security (PRO-Other)
|
|
Microsoft Press |
Books |
1 |
|
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
|
|
Syngress |
Books |
1 |
|
Security Engineering: A Guide to Building Dependable Distributed Systems
|
|
Wiley |
Books |
1 |
|
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
|
|
Springer |
Books |
1 |
|
Applied Cryptography and Network Security: 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings (Lecture Notes in Computer Science)
|
|
Springer |
Books |
1 |
|
Intelligence and Security Informatics: IEEE ISI 2008 International Workshops: PAISI, PACCF and SOCO 2008, Taipei, Taiwan, June 17, 2008, Proceedings (Lecture Notes in Computer Science)
|
|
Springer |
Books |
1 |
|
Transactions on Data Hiding and Multimedia Security III (Lecture Notes in Computer Science)
|
|
Springer |
Books |
1 |
|
Googling Security: How Much Does Google Know About You?
|
|
Addison-Wesley Professional |
Books |
1 |
|
Software Security Engineering: A Guide for Project Managers
|
|
Addison-Wesley Professional |
Books |
1 |
|
Applied Security Visualization
|
|
Addison-Wesley Professional |
Books |
1 |