2,432,730 books
direct links
for free
Mobile version (beta)
Books
Categories
Top
Add book
Library
Help
Mobile version (beta)
Plugin
Contacts
Community
Investors
API
Donate
Main
→
Category
→
List of books in category "Security & Encryption"
#1
Encryption for Digital Content (Advances in Information Security 52)
Aggelos Kiayias
,
Serdar Pehlivanoglu
Category:
Наука (общее)
Download (PDF)
|
or Buy
5.17 Mb,
English
#2
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)
Carlos Cid
,
Sean Murphy
,
Matthew Robshaw
,
Category:
Наука (общее)
Download (PDF)
|
or Buy
5.62 Mb,
English
#3
Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology)
Orr Dunkelman
Category:
Компьютеры
Download (PDF)
|
or Buy
7.10 Mb,
English
#4
Introduction to Identity-Based Encryption (Information Security and Privacy Series)
Luther Martin
Download (PDF)
|
or Buy
1.69 Mb,
English
#5
The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography)
Joan Daemen
,
Vincent Rijmen
Category:
Искусство
,
Графические виды искусства
Download (PDF)
|
or Buy
4.09 Mb,
English
#6
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering
Hamid R. Nemati
Download (PDF)
|
or Buy
5.40 Mb,
English
#7
Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, Februara 7-10, 2010 Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology)
Seokhie Hong
,
Tetsu Iwata
Download (PDF)
|
or Buy
4.28 Mb,
English
#8
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)
Information Security
Download (PDF)
|
or Buy
1.85 Mb,
English
#9
The Dynamics of Disability: Measuring and Monitoring Disability for Social Security Programs
Committee to Review the Social Security Administration's Disability Decision Process Research
,
National Research Council
Category:
Общественные науки прочие
Download (PDF)
|
or Buy
6.67 Mb,
English
#10
Second review of a new data management system for the Social Security Administration a report to the Social Security Administration, Department of Health, Education and Welfare
by the Panel on Social Security Administration Data Management System
,
Board on Telecommunications--Computer Applications
,
Assembly of Engineering
,
National Research Council.
Category:
Образование
Download (PDF)
|
or Buy
537 Kb,
English
#11
The 2000-2005 World Outlook for Security and Commodity Brokers, Dealers (Strategic Planning Series)
Research Group
,
The Security
,
Dealers Research Group Commodity Brokers
Category:
История
Download (PDF)
|
or Buy
9.78 Mb,
English
#12
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Committee on Balancing Scientific Openness and National Security
,
National Academy of Sciences
,
National Academy of Engineering
,
Institute of Medicine
Category:
Техника
,
Военная техника
,
Оружие
Download (PDF)
|
or Buy
177 Kb,
English
#13
Growing Vulnerability of the Public Switched Networks: Implications for National Security Emergency Preparedness
the Committee on Review of Switching
,
Synchronization and Network Control in National Security Telecommunications
,
Board on Telecommunications and Computer Applications
,
Commission on Engineering and Technical Systems
,
National Research Council.
Category:
Компьютеры
,
Сети
Download (PDF)
|
or Buy
545 Kb,
English
#14
Setting the 21st Century Security Agenda: Proceedings of the 5th International Security Forum (Studies in Contemporary History and Security Policy)
Switzerland) International Security Forum 2002 Zurich
Category:
История
Download (PDF)
|
or Buy
593 Kb,
English
#15
Balancing Scientific Openness and National Security Controls at the Nuclear Weapons Laboratories
Committee on Balancing Scientific Openness and National Security
,
National Academy of Sciences
,
National Academy of Engineering
,
Institute of Medicine
Category:
Техника
,
Военная техника
,
Оружие
Download (PDF)
|
or Buy
177 Kb,
English
#16
Assessment of technologies deployed to improve aviation security.
Panel on Assessment of Technologies Deployed to Improve Aviation Security
,
National Materials Advisory Board
,
Commission on Engineering and Technical Systems
,
National Research Council.
Download (PDF)
|
or Buy
695 Kb,
English
#17
Future of the Nuclear Security Environment in 2015: Proceedings of a Russian-U.S. Workshop
Joint Committees on the Future of the Nuclear Security Environment in 2015
,
Russian Academy of Sciences
,
National Research Council
Download (PDF)
|
or Buy
1.20 Mb,
English
#18
English-Chinese, Chinese-English Nuclear Security Glossary
Committee on the U.S.-Chinese Glossary of Nuclear Security Terms
,
National Research Council
Download (PDF)
|
or Buy
1.96 Mb,
English
#19
Canadian Securities Course Volume 1
Canadian Securities Institute
Download (PDF)
|
or Buy
1.80 Mb,
English
#20
The Standard of Good Practice for Information Security
Information Security Forum (ISF)
Download (PDF)
|
or Buy
3.22 Mb,
English
#21
Beyond 'Fortress America': National Security Controls on Science and Technology in a Globalized World
Security
,
and Prosperity Committee on Science
,
Committee on Scientific Communication and National Security
,
National Research Council
Download (PDF)
|
or Buy
1.03 Mb,
English
#22
Assessment of the Bureau of Reclamation's Security Program
Committee to Assess the Bureau of Reclamation's Security Program
,
National Research Council
Download (PDF)
|
or Buy
2.02 Mb,
English
#23
HIV and Disability: Updating the Social Security Listings
Committee on Social Security HIV Disability Criteria
,
Board on the Health of Select Populations
,
Institute of Medicine
Download (PDF)
|
or Buy
1.23 Mb,
English
#24
The Standard of Good Practice for Information Security
ISF Information Security Forum
Download (PDF)
|
or Buy
6.21 Mb,
English
#25
Himalayan Glaciers: Climate Change, Water Resources, and Water Security
Hydrology
,
Climate Change
,
and Implications for Water Security Committee on Himalayan Glaciers
,
Board on Atmospheric Studies and Climate
,
Division on Earth and Life Studies
,
National Research Council
Download (PDF)
|
or Buy
22.46 Mb,
English
#26
Solaris 10 Security Essentials
Sun Microsystems Security Engineers
Download (PDF)
|
or Buy
1.68 Mb,
English
#27
Homeland Security Act of 2002
Committee on Homeland Security
,
U.S. House of Representatives
Category:
fiction
829 Kb,
English
#28
Secure XML: The New Syntax for Signatures and Encryption
Donald E. Eastlake
,
Kitty Niles
Download (CHM)
1.40 Mb,
English
#29
Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Jothy Rosenberg
,
David Remy
Download (CHM)
3.80 Mb,
English
#30
Image and Video Encryption From Digital Rights Management to Secured Personal Communication
Tommy M. McGuire
,
Mohamed G. Gouda
Download (PDF)
|
or Buy
8.02 Mb,
English
#31
On the security of the RC5 encryption algorithm
Kaliski B.S.
Category:
Радио
Download (PDF)
|
or Buy
442 Kb,
English
#32
Image and Video Encryption From Digital Rights Management to Secured Personal Communication
Andreas Uhl
,
Andreas Pommer
Download (PDF)
|
or Buy
7.68 Mb,
English
#33
Secure XML: The New Syntax for Signatures and Encryption
Donald E. Eastlake
,
Kitty Niles
Category:
Computer science
Download (CHM)
1.40 Mb,
English
#34
Introduction to Identity-Based Encryption (Information Security and Privacy Series)
Luther Martin
Download (PDF)
|
or Buy
1.95 Mb,
English
#35
Microsoft Windows Security Resource Kit
Ben Smith
,
Corporation Microsoft Corporation
,
Brian Komar
,
Elliot Lewis
,
Members of the Microsoft Security Team
Download (CHM)
1.57 Mb,
English
#36
Safety and Security of Commercial Spent Nuclear Fuel Storage: Public Report
Committee on the Safety and Security of Commercial Spent Nuclear Fuel Storage
,
National Research Council
Download (PDF)
|
or Buy
9.01 Mb,
English
#37
Бразильское джиу-джитсу: теория и техника. (Brazilian Jiu-Jitsu: Theory & Technique)
Авторы: Ренцо & Ройлер Грейси. Со Авторы: Кид Пелигро и Джон Данахер. Фотографии Рикардо Азури. Художник-оформитель А.Киричёк.
Category:
физическая культура и спорт
Download (DJVU)
|
or Buy
4.32 Mb,
Russian
#38
Social Security Administration Electronic Service Provision: A Strategic Assessment
Committee on the Social Security Administration's E-Government Strategy and Planning for the Future
,
National Research Council
,
Leon J. Osterweil
,
Lynette I. Millett
,
Joan D. Winston
Download (PDF)
|
or Buy
1.25 Mb,
English
#39
Information Assurance: Managing Organizational IT Security Risks
Joseph Boyce Employee of the Department of Defense
,
Daniel Jennings Information Systems Security Manager European Command (EUCOM)
Download (PDF)
|
or Buy
1.03 Mb,
English
#40
Biometrics for Network Security
Paul Reid
Category:
Computer Science
,
Computer Security
,
Biometrics
Download (CHM)
1.11 Mb,
English
#41
Biometrics, Computer Security Systems and Artificial Intelligence Applications
Khalid Saeed
,
Khalid Saeed;Jerzy Pejas;Romuald Mosdorf
Category:
Computer Science
,
Computer Security
,
Biometrics
Download (PDF)
|
or Buy
16.20 Mb,
English
#42
High-rise security and fire life safety
Geoff Craighead
Category:
'Skyscrapers -- Security measures.'
,
'Skyscrapers -- Fires and fire prevention.'
Download (PDF)
|
or Buy
9.54 Mb,
English
#43
Role Engineering for Enterprise Security Management (Information Security and Privacy)
Edward J. Coyne
,
John M. Davis
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
2.74 Mb,
English
#44
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Joel Scambray
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
9.06 Mb,
English
#45
Physical Security for IT
Michael Erbschloe
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
1.03 Mb,
English
#46
Open Source Security Tools: Practical Guide to Security Applications, A
Tony Howlett
Category:
Computer science
,
Computer Security
Download (CHM)
11.64 Mb,
English
#47
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia
Husrev T. Sencar
,
Mahalingam Ramkumar
,
Ali N. Akansu
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
3.18 Mb,
English
#48
Trust and Security in Collaborative Computing (Computer and Network Security)
Xukai Zou
,
Yuan-shun Dai
,
Yi Pan
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
2.41 Mb,
English
#49
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
John R. Goodall
,
Gregory Conti
,
Kwan-Liu Ma
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
6.34 Mb,
English
#50
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Selim Aissi
,
Nora Dabbous
,
Anand R. Prasad
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
1.84 Mb,
English
#51
Access Control Systems: Security, Identity Management and Trust Models
Messaoud Benantar
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
13.33 Mb,
English
#52
Security of Mobile Communications
Noureddine Boudriga
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
5.34 Mb,
English
#53
How to Cheat at Configuring Open Source Security Tools
Michael Gregg
,
Eric Seagren
,
Angela Orebaugh
,
Matt Jonkman
,
Raffael Marty
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
7.64 Mb,
English
#54
Defending the Digital Frontier: A Security Agenda
Ernst & Young LLP
,
Mark W. Doll
,
Sajai Rai
,
Jose Granado
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
3.03 Mb,
English
#55
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
John Hoopes
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
7.93 Mb,
English
#56
How to Develop and Implement a Security Master Plan
Timothy Giles
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
3.00 Mb,
English
#57
Information Processing and Security Systems
Khalid Saeed
,
Jerzy Pejas
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
22.38 Mb,
English
#58
Smart Cards, Tokens, Security and Applications
Keith Mayes
,
Konstantinos Markantonakis
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
8.50 Mb,
English
#59
Applied Security Visualization
Raffael Marty
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
21.10 Mb,
English
#60
Securing HP NonStop Servers in an Open Systems World: TCP/IP, OSS and SQL
XYPRO Technology Corp
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
5.43 Mb,
English
#61
Malware Detection (Advances in Information Security)
Mihai Christodorescu
,
Somesh Jha
,
Douglas Maughan
,
Dawn Song
,
Cliff Wang
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
16.27 Mb,
English
#62
Security Software Development: Assessing and Managing Security Risks
Douglas A. Ashbaugh CISSP
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
2.72 Mb,
English
#63
Intrusion Detection Systems (Advances in Information Security)
Roberto Pietro
,
Luigi V. Mancini
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
3.07 Mb,
English
#64
Security on Rails (The Pragmatic Programmers)
Ben Poweski
,
David Raphael
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
8.41 Mb,
English
#65
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Abhishek Singh
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
6.23 Mb,
English
#66
Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery Plans
Yusufali F. Musaji
Category:
Computer science
,
Computer Security
Download (PDF)
|
or Buy
13.48 Mb,
English
#67
Securing Biometrics Applications
Charles A. Shoniregun
,
Stephen Crosier
Category:
Computer Science
,
Computer Security
,
Biometrics
Download (PDF)
|
or Buy
9.90 Mb,
English
#68
Firewalls and Internet Security: Repelling the Wily Hacker
William R. Cheswick
,
Steven M. Bellovin
,
Aviel D. Rubin
Category:
Computers
,
Internet
,
Security
Download (PDF)
|
or Buy
3.08 Mb,
English
#69
International Security: Politics, Policy, Prospects
Michael E. Smith
Category:
international security
,
political science
,
international relations
Download (RAR)
35.06 Mb
#70
Perils of Anarchy: Contemporary Realism and International Security
Brown
,
Michael E.; Lynn-Jones
,
Sean M.; Miller
,
Steven E.
Category:
International Relations; International Security
Download (PDF)
|
or Buy
2.87 Mb
#71
Securitization Theory: How security problems emerge and dissolve
Thierry Balzacq
Category:
International Relations
,
Security Studies
Download (PDF)
|
or Buy
19.02 Mb
#72
HUMAN SECURITY IN ISLAM
Zarina Othman
Category:
HUMAN SECURITY IN ISLAM
,
Human
,
Islam
,
Muslims
,
Muslim
,
http:
Download (ZIP)
481 Kb
#73
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Jeremy Wittkop
Category:
Security
Download (PDF)
|
or Buy
9.51 Mb
#74
Бауэр Марвин - основатель McKinsey amp; Company
Спиридонова Елена Борисовна
,
Петрова Юлия
Category:
Справочники
Download (FB2)
|
or Buy
13 Kb,
ru
#75
Шваб Чарльз - учредитель брокерской компании Charles Schwab amp; Co.
Спиридонова Елена Борисовна
,
Петрова Юлия
Category:
Справочники
Download (FB2)
|
or Buy
15 Kb,
ru
#76
Encrypter User
Gaiman Neal
Download (PDF)
|
or Buy
39 Kb,
en
#77
secure
chtorr5_files
Download (PNG)
537 b,
en
#78
King, Stephen - My Little Serrated Security Blanket
King Stephen
Download (LIT)
106 Kb,
en
#79
King, Stephen - My Little Serrated Security Blanket_txt
King Stephen
Download (DOC)
5 Kb,
en
#80
Lectures on data security: Modern cryptology in theory and practice
Ivan Damgard
Category:
Computer science
,
Cryptography
Download (PDF)
|
or Buy
2.95 Mb,
English
#81
3D imaging for safety and security
Andreas Koschan
,
Marc Pollefeys
,
Mongi Abidi
Category:
Computer science
,
Image processing
Download (PDF)
|
or Buy
12.66 Mb,
English
#82
Security markets: stochastic models
Darrell Duffie
Category:
Mathematics
,
Probability
,
Stochastics in finance
Download (DJVU)
|
or Buy
3.48 Mb,
English
#83
Options, futures, and other derivative securities
John Hull
Category:
Mathematics
,
Probability
,
Stochastics in finance
Download (DJVU)
|
or Buy
6.49 Mb,
English
#84
Fixed-income securities
Lionel Martellini
,
Philippe Priaulet
,
Stéphane Priaulet
Category:
Mathematics
,
Probability
,
Stochastics in finance
Download (PDF)
|
or Buy
5.17 Mb,
English
#85
Mathematics of the Securities Industry
William Rini
Category:
Mathematics
,
Probability
,
Stochastics in finance
Download (PDF)
|
or Buy
829 Kb,
English
#86
Securing Your Business with Cisco ASA and PIX Firewalls
Greg Abelar
Download (CHM)
4.75 Mb,
English
#87
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards
Mohammad Ilyas
,
Syed A. Ahson
Download (PDF)
|
or Buy
12.64 Mb,
English
#88
Managing information security risks: the OCTAVE approach
Christopher Alberts
,
Audrey Dorofee
Download (CHM)
4.11 Mb,
English
#89
php|architect's Guide to PHP Security
Ilia Alshanetsky
,
Rasmus Lerdorf
Download (PDF)
|
or Buy
1.25 Mb,
English
#90
Check Point Next Generation Security Administration
Syngress
Download (PDF)
|
or Buy
8.27 Mb,
English
#91
Maximum Security
Anonymous
Download (CHM)
2.92 Mb,
English
#92
Current Security Management & Ethical Issues of Information Technology
Rasool Azari
Download (CHM)
2.65 Mb,
English
#93
How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN
Lee Barken
Download (CHM)
3.13 Mb,
English
#94
Linux Security Cookbook
Daniel J. Barrett
,
Richard E. Silverman
,
Robert G. Byrnes
Download (CHM)
657 Kb,
English
#95
CCSP Cisco secure PIX® firewall advanced exam certification guide
Greg Bastien
,
Christian Degu
,
Earl Carter
Download (CHM)
11.47 Mb,
English
#96
CCSP SECUR Exam Certification Guide (CCSP Self-Study, 642-501)
Greg Bastien
,
Christian Degu
Download (PDF)
|
or Buy
8.74 Mb,
English
#97
Building Secure Servers With Linux
Michael D. Bauer
Download (CHM)
1.16 Mb,
English
#98
Linux Server Security
Michael Bauer D.
Download (CHM)
2.07 Mb,
English
#99
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Baumrucker C.T.
,
Burton J.D.
,
Dentler S.
Download (PDF)
|
or Buy
13.11 Mb,
English
#100
MPLS VPN Security
Michael H. Behringer
,
Monique J. Morrow
Download (CHM)
5.29 Mb,
English
Attention! No more 100 books from choosen category are shown. If the desired book is not presented in this list, refine tour request, using
search
on the site main page.
DMCA