Wednesday, September 29, 2010

Books of Data Security

Encyclopaedia Of Security Management (Set Of 2 Vols.)
Wales, Patrick
Proceedings Of International Conference On Network Security And Workshop (ICONS 2007)
Venkatachalam, V & Sivakumar, G
Cyber Security
Augastine, Paul T
Network Security
Venkatachalam, V, Sivakumar, G
IT Governance
Calder, Alan, Watkins, Steve
Network Security
Fadia, Ankit
Data Warehousing
Prabhu, C S R
Secure Messaging With Microsoft Exchange Server 2000
Robichaux
Network Security And Management
Singh Brijendra
Decision Support Systems And Data Warehouses
Ravindranath, B
Bruce Schneier Practical Cryptography
Ferguson, Niels, Schneier, Bruce
Incident Response
Schweitzer, Douglas
Applied Cryptography
Schneier, Bruice
IT Security Interviews Exposed
Butler, Chris, Rogers, Russ, Ferratt, Masson
Cryptology Unlocked (Reprint)
Wobst, Reinhard
Google Hacking
Fadia, Ankit, Goel, Diwakar
Encryption
Fadia, Ankit, Bhattacharjee, Jaya
Intrusion Alert
Fadia, Ankit, Zacharia, Manu
Handbook Of Security, Cryptography And Digital Signature
Bhaskar, S M, Ramchandran, P
Cryptography And Network Security
Kahate, Atul
Cryptography In The Database
Kenan, Kevin
The Smart Way To Study Exam 70-431 MCTS Implementing And Maintaining Microsoft SQL Server 2005
Moore, Thomas
Security In Computing (Reprint)
Pfleeger, Charles P, Pfleeger, Shari Lawrence
Introduction To Cryptography With Coding Theory (Reprint)
Trappe, Wade, Washington, Lawrence C
Understanding DB2 9 Security (Reprint)
Bond, Rebecca, Wong, Carmen Ka Man, Chan, Yuk-Kuen Henry
CD Cracking Uncovered
Kaspersky, Kris
Cryptography & Network Security (Reprint)
Forouzan, Behrouz A
Spyware
Jain, Ravi Kumar B
Web Service Security
Hogg, J
Security In Computing (Reprint)
Peleeger, ShariLawrence
Secutiry Monitoring With Cisco Security MARS (Reprint)
Halleen, Gary, Kellogg, Greg
Hacking Exposed Web 2.0
Cannings, Rich, Dwivedi, Himanshu, Lackey, Zane
Gray Hat Hacking
Harris, Shon, Harper, Allen, Eagle, Chris
Identity Theft, A High-Tech Menace
Zodagekar, Sameer A
Information Security
Patel, Dhiren
Network Security Essentials
Stallings, William

No comments:

Post a Comment