| Encyclopaedia Of Security Management (Set Of 2 Vols.) | Wales, Patrick |
| Proceedings Of International Conference On Network Security And Workshop (ICONS 2007) | Venkatachalam, V & Sivakumar, G |
| Cyber Security | Augastine, Paul T |
| Network Security | Venkatachalam, V, Sivakumar, G |
| IT Governance | Calder, Alan, Watkins, Steve |
| Network Security | Fadia, Ankit |
| Data Warehousing | Prabhu, C S R |
| Secure Messaging With Microsoft Exchange Server 2000 | Robichaux |
| Network Security And Management | Singh Brijendra |
| Decision Support Systems And Data Warehouses | Ravindranath, B |
| Bruce Schneier Practical Cryptography | Ferguson, Niels, Schneier, Bruce |
| Incident Response | Schweitzer, Douglas |
| Applied Cryptography | Schneier, Bruice |
| IT Security Interviews Exposed | Butler, Chris, Rogers, Russ, Ferratt, Masson |
| Cryptology Unlocked (Reprint) | Wobst, Reinhard |
| Google Hacking | Fadia, Ankit, Goel, Diwakar |
| Encryption | Fadia, Ankit, Bhattacharjee, Jaya |
| Intrusion Alert | Fadia, Ankit, Zacharia, Manu |
| Handbook Of Security, Cryptography And Digital Signature | Bhaskar, S M, Ramchandran, P |
| Cryptography And Network Security | Kahate, Atul |
| Cryptography In The Database | Kenan, Kevin |
| The Smart Way To Study Exam 70-431 MCTS Implementing And Maintaining Microsoft SQL Server 2005 | Moore, Thomas |
| Security In Computing (Reprint) | Pfleeger, Charles P, Pfleeger, Shari Lawrence |
| Introduction To Cryptography With Coding Theory (Reprint) | Trappe, Wade, Washington, Lawrence C |
| Understanding DB2 9 Security (Reprint) | Bond, Rebecca, Wong, Carmen Ka Man, Chan, Yuk-Kuen Henry |
| CD Cracking Uncovered | Kaspersky, Kris |
| Cryptography & Network Security (Reprint) | Forouzan, Behrouz A |
| Spyware | Jain, Ravi Kumar B |
| Web Service Security | Hogg, J |
| Security In Computing (Reprint) | Peleeger, ShariLawrence |
| Secutiry Monitoring With Cisco Security MARS (Reprint) | Halleen, Gary, Kellogg, Greg |
| Hacking Exposed Web 2.0 | Cannings, Rich, Dwivedi, Himanshu, Lackey, Zane |
| Gray Hat Hacking | Harris, Shon, Harper, Allen, Eagle, Chris |
| Identity Theft, A High-Tech Menace | Zodagekar, Sameer A |
| Information Security | Patel, Dhiren |
| Network Security Essentials | Stallings, William |
No comments:
Post a Comment