Saturday, August 9, 2008

IT Security Books, Computer Forensics, Cryptography, Software Security, Web Application Security,


Topic Lists:

Computer Forensics, Computer Security, Enterprise Security Management, Trusted Computing, Cryptography, Cyber Security, Information Security, Information Security Architecture, Strategic Information Security, Encryption, VoIP Security, RFID Security, Wireless Communications Security, Software Security, CCSP, Computer Viruses, Authentication, Windows Vista Security, Instant Messaging Security, Privacy, Physical Security, Anti-Hacker Tool Kit, Web Application Security, Certified Ethical Hacking, Web Application Hacker's Handbook, Security Bugs, Voice Over IP Security, Wireless Security, Network Security Assessment, Windows Forensics, Vulnerability, Packet Analysis, Patch, Phishing, Electronic Identity Theft, Blackjacking, Cisco Security, Juniper Networks NetScreen, SSG Firewalls, Smart Cards, Cisco PIX Firewalls, Wireshark, Nmap, Snort, Nessus, and Mrtg, Snort, Ethereal, e-Systems, Computer Networks, Oracle Hacker's, The Shellcoder's, Exploiting Security Holes, WarDriving, Wireless Penetration, Webbots, Spiders, Screen Scrapers, Firewall Policie, VPN Configurations, Hacking Exposed Web Applications, Threat Analysis, Security Assessments, Exploits, Hardcore Hacks, Network Administrators, Systems Administrators, Linux, Web Exploitation, Hardening Network Security, Linux Network Security, Database Hacker's, Defending Database Servers, Hardening the Network Infrastructure, Rights, and Liabilities, E-Commerce, Hacking BlackBerry, Linux Firewalls, iptables, psad, and fwsnort, Access Control Systems, Identity Management, Trust Models, Audit and Trace Log, Enterprise DMZs, Insider Threats, E-Mail, Internet, and Wireless Security, Sabotage, Spying, and Theft, Hacking Firefox



Title Lists:
The CEH Prep Guide—The Comprehensive Guide to Certified Ethical Hacking
The Web Application Hacker's Handbook—Discovering and Exploiting Security Flaws
Blackjacking—Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Computer Forensics—An Essential Guide for Accountants, Lawyers, and Managers
Configuring Juniper Networks NetScreen & SSG Firewalls
Developer's Guide to Web Application Security
Hacking Exposed VoIP—Voice Over IP Security Secrets & Solutions
Hacking Exposed Wireless—Wireless Security Secrets & Solutions
Information Security Cost Management
Multi-application Smart Cards—Technology and Applications
Network Security Assessment—From Vulnerability to Patch
Network Security—Current Status and Future Directions
Practical Packet Analysis—Using Wireshark to Solve Real-World Network Problems
Risks, Controls, and Security—Concepts and Applications, 1st Edition
Secure Your Network for Free—Using Nmap, Wireshark, Snort, Nessus, and Mrtg
Security for Wireless Ad Hoc Networks
Security of e-Systems and Computer Networks
The Oracle Hacker's Handbook—Hacking and Defending Oracle
The Shellcoder's Handbook—Discovering and Exploiting Security Holes, Second Edition
WarDriving & Wireless Penetration Testing
Webbots, Spiders, and Screen Scrapers—A Guide to Developing Internet Agents with PHP CURL
Windows Vista Security—Securing Vista Against Malicious Attacks
Anti-Hacker Tool Kit, Third Edition
Defeating the Hacker—A Non-Technical Guide to Computer Security
Firewall Policies and VPN Configurations
Hack the Stack—Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hacking Exposed Cisco Networks—Cisco Security Secrets & Solutions
Hacking Exposed Web Applications, Second Edition
Hunting Security Bugs
Information Security Architecture—An Integrated Approach to Security in the Organization, Second Edition
Phishing and Countermeasures—Understanding the Increasing Problem of Electronic Identity Theft
Syngress Force—Emerging Threat Analysis—From Mischief to Malicious
Windows Forensics—The Field Guide for Conducting Corporate Computer Investigations
A Practical Guide to Security Assessments
Cisco PIX Firewalls—Configure, Manage, & Troubleshoot
Extreme Exploits—Advanced Defenses Against Hardcore Hacks
Firewalls—Jumpstart for Network and Systems Administrators
Hacker Linux Uncovered
Hacker Web Exploitation Uncovered
Hacking Exposed—Network Security Secrets & Solutions, Fifth Edition
Hardening Network Security
Information Security Illuminated
Linux Network Security
The Database Hacker's Handbook — Defending Database Servers
Security SAGE’s Guide to Hardening the Network Infrastructure
Strategic Information Security
Information Security Best Practices—205 Basic Rules
Security, Rights, and Liabilities in E-Commerce
Computer Security and Cryptography
Cyber Security
Hacking BlackBerry—ExtremeTech
Hacking Windows Vista (ExtremeTech)
Hacking World of Warcraft
Linux Firewalls—Attack Detection and Response with iptables, psad, and fwsnort
PC Magazine Windows Vista Security Solutions
Simple Computer Security—Disinfect Your PC
A Classical Introduction to Cryptography—Applications for Communications Security
Access Control Systems—Security, Identity Management and Trust Models
Audit and Trace Log Management—Consolidation and Analysis
Designing and Building Enterprise DMZs
Enemy at the Water Cooler—Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Essential Computer Security—Everyone’s Guide to E-Mail, Internet, and Wireless Security
How to Cheat at Managing Information Security
How to Cheat at Securing a Wireless Network
Insider Threat—Protecting the Enterprise from Sabotage, Spying, and Theft
Multimedia Encryption and Authentication Techniques and Applications
Practical VoIP Security
RFID Security
Security Education, Awareness, and Training—From Theory to Practice
Understanding Voice over IP Security
Wireless Communications Security
19 Deadly Sins of Software Security—Programming Flaws and How to Fix Them
A Practical Guide to Security Assessments
CCSP Complete Study Guide (642-501, 642-511, 642-521, 642-531, 642-541)
Computer Security—20 Things Every Employee Should Know, Second Edition
Computer Viruses—From Theory to Applications
Hacking Firefox—More Than 150 Hacks, Mods, and Customizations
IM Instant Messaging Security
Managing an Information Security and Privacy Awareness and Training Program
Physical Security for IT
Security in Wireless LANs and MANs
Trusted Computing
User's Guide to Cryptography and Standards



For more Information:
* KuTenk 2000 - Book Lover's Paradise. Get Free PDF EBook Download *
Access Extensive Library of Professional, Technical and Academic Ebooks from World's Leading Publishers.

Share/Save/Bookmark

1 comment:

  1. Here is a software Security Assessment Software
    Secure Bytes is an information security software development company which focuses on developing automated auditing tools to strengthen information security management system.

    ReplyDelete

Place Your Comments Here

Recent Posts

Make Money Profit

Smart Money Success. Financial Success. Business Success.

Online Success Center. Professional Resources for Online Success.

Yahoo MyWebLog Recent Viewers

Business & Life Success Resources Centre

Support Us

1. Rate Me 5 STARS-->

2. Favourite my Blog --> Add to 

Technorati Favorites
3. Vote me --> Top Blogs
4. Vote me -->Blogroll.net
5. Just Click this one only--> the best
6. Just Click this one only --> Blog Directory
7. Click "HOME" -->
8. Rate me --> blog search 

directory
9. Rate Me --> Rate My Blog

Verified Blog

Total Pageviews

 

Learning Corner.Engineering Books.Management EBooks.Business Books.Computer Book.Discount Bookstore. Copyright 2008 All Rights Reserved Revolution Two Church theme