Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Trusted Computing (Professional Applications of Computing)
Backtrack Hacking Tutorials
Sim Card Hacking
ACT! 2005 For Dummies
Lectures on Data Security: Modern Cryptology in Theory and Practice
The Internet Under Crisis Conditions: Learning from September 11
Group Policy: Fundamentals, Security, and the Managed Desktop
Traffic Grooming for Optical Networks: Foundations, Techniques and Frontiers
Pro Spring Security
Data Mining and Machine Learning in Cybersecurity
Hacking Exposed Malware and Rootkits
How to Comply with the PCI Data Security Standard
Linux Security
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Intrusion Prevention Fundamentals
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
The Best of 2600: A Hacker Odyssey
Microsoft Security Essentials User Manual
Metasploit Penetration Testing Cookbook (2nd Edition)
Hacking Wireless Networks For Dummies
Privacy and Big Data
Digital Video Surveillance and Security
Global Initiatives to Secure Cyberspace: An Emerging Landscape
I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy
Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
The Tao of Network Security Monitoring: Beyond Intrusion Detection
Security+ Guide to Network Security Fundamentals, 4 edition
Hacking: The Art of Exploitation, 2nd Edition