Buy Web Site Data Security + Encryption Books

This version is alphabetized by title. Click here to sort in order of current sales rank.

Please click any product name to check the price and shipping information

Search amazon.com for ...

All Products
Books & Audio Books
Magazine Subscriptions
Popular Music
Classical Music
VHS Videos
DVD
Electronics
Computers & Add-On
Software
Cameras & Photo
Office Products
Furniture
Kitchen & Housewares
Baby Products
Lawn - Garden - Patio
Tools & Hardware
Travel Accessories
Toys & Games
Video Games
Cell Phones
Bargain Outlet


Keywords:

  1. (SCTS) Symantec Certified Technical Specialist : Small Business Security Study Guide , by Nik Alston , Mike Chapple , Kirk Hausman (Paperback, 30 September, 2005)
  2. .NET Security , by Jason Bock , Pete Stromquist , Tom Fischer , Nathan Smith (Paperback, 09 July, 2002)
  3. .NET Security and Cryptography , by Peter Thorsteinson , G. Gnana Arun Ganesh (Paperback, 29 August, 2003)
  4. .NET Security Programming (Gearhead Press - In the Trenches) , by Donis Marshall , Donis Marshall (Paperback, 08 November, 2002)
  5. 1337 h4x0r h4ndb00k , by tapeworm (Paperback, 10 August, 2005)
  6. 19 Deadly Sins of Software Security (Security One-off) - Michael Howard (2005-07-26, Paperback)
  7. 70-220 : MCSE Guide to Designing Microsoft Windows 2000 Security , by Stanley Reimer , Conan Kezema (Paperback, 29 January, 2002)
  8. 70-227 : MCSE Guide to Microsoft ISA Server 2000 , by Jeremy Cioara (Hardcover, 21 December, 2001)
  9. 70-299 MCSE Guide to Implementing and Administering Security in a Microsoft Windows Server 2003 Network , by Diane Barrett , Bill Ferguson (Paperback, 08 July, 2005)
  10. 802.11 Security , by Bruce Potter , Bob Fleck (Paperback, December, 2002)
  11. A Course in Derivative Securities : Introduction to Theory and Computation (Springer Finance) , by Kerry Back (Hardcover, 21 July, 2005)
  12. A Gift of Fire , by Sara Baase (Paperback, 15 July, 2002)
  13. A Guide to Forensic Testimony : The Art and Practice of Presenting Testimony As An Expert Technical Witness , by Fred Chris Smith , Rebecca Gurley Bace (Paperback, 09 October, 2002)
  14. A Practical Guide to Managing Information Security (Artech House Technology Management Library) , by Steve Purser (Hardcover, 01 April, 2004)
  15. A Practical Guide to Security Assessments , by Sudhanshu Kairab (Hardcover, 29 September, 2004)
  16. A Practical Guide to Security Engineering and Information Assurance , by Debra S. Herrmann (Hardcover, 18 October, 2001)
  17. A Simple Guide for the Clueless, on Using the Internet to Build and Protect Your Investments : What Your Money Manager, Broker, and Financial Advisor Won't Tell You , by Richard I., Sr Overall (Paperback, 01 October, 2003)
  18. A Technical Guide to IPSec Virtual Private Networks , by James S. Tiller , Jim S. Tiller (Paperback, 11 December, 2000)
  19. A+, Network+, Security+ Exams in a Nutshell : A Desktop Quick Reference (In a Nutshell (O'Reilly)) , by Pawan Bhardwaj (Paperback, 27 March, 2007)
  20. AAA and Network Security for Mobile Access : Radius, Diameter, EAP, PKI and IP Mobility , by Madjid Nakhjiri , Mahsa Nakhjiri (Hardcover, 28 October, 2005)
  21. Absolute Beginner's Guide to Personal Firewalls , by Jerry Lee Ford (Paperback, 24 October, 2001)
  22. Absolute Beginner's Guide to Security, Spam, Spyware & Viruses (Absolute Beginner's Guide) , by Andy Walker (Paperback, 09 November, 2005)
  23. Absolute Beginner's Guide to WordPerfect 12 (Absolute Beginner's Guide) , by Laura Acklen (Paperback, 29 July, 2004)
  24. Absolute PC Security and Privacy , by Michael Miller (Paperback, 01 August, 2002)
  25. Acquiring New ID : How To Easily Use The Latest Technology To Drop Out, Start Over, And Get On With Your Life , by Ragnar Benson (Paperback, September, 1996)
  26. Active Directory Cookbook, 2nd Edition - Robbie Allen (2006-06-09, Paperback)
  27. Active Directory, 3rd Edition - Joe Richards (2006-01-19, Paperback)
  28. Administering Windows Vista Security : The Big Surprises - Mark Minasi (2006-12-26, Paperback)
  29. Administrating Web Servers, Security, & Maintenance Interactive Workbook , by Eric Larson , Brian Stephens (Paperback, 15 December, 1999)
  30. Advanced Host Intrusion Prevention with CSA (Networking Technology) , by Chad Sullivan , Jeff Asher , Paul Mauvais (Paperback, 27 April, 2006)
  31. Advanced modelling in finance using Excel and VBA - Mary Jackson (2001-05-30, Hardcover)
  32. Adversarial Reasoning : Computational Approaches to Reading the Opponent's Mind , by Alexander Kott , William M. McEneaney (Hardcover, 20 July, 2006)
  33. Aggressive Network Self-Defense , by Neil R. Wyler , Bruce Potter , Chris Hurley (Paperback, 01 March, 2005)
  34. Al Jazeera : How Arab TV News Challenges America , by Hugh Miles (Hardcover, 09 January, 2005)
  35. All About Mutual Funds , by Bruce Jacobs (Paperback, 15 October, 2001)
  36. Always Use Protection : A Teen's Guide to Safe Computing , by Dan Appleman (Paperback, 03 May, 2004)
  37. Anti-Hacker Tool Kit, Third Edition , by Mike Shema (Paperback, 09 February, 2006)
  38. Apache Cookbook - Ken Coar (2003-11-18, Paperback)
  39. Apache Security - Ivan Ristic (2005-03-15, Paperback)
  40. Applied Cryptography : Protocols, Algorithms, and Source Code in C, Second Edition - Bruce Schneier (1995-10-18, Paperback)
  41. ASP.NET 2.0 MVP Hacks , by David Yack , Joe Mayo , Scott Hanselman , Fredrik Normen , Dan Wahlin , J. Ambrose Little , Jonathan Goodyear (Paperback, 30 May, 2006)
  42. Asterisk Hacking , by Joshua Brashars (Paperback, 25 May, 2007)
  43. Authentication : From Passwords to Public Keys , by Richard E. Smith (Paperback, 01 October, 2001)
  44. Backup & Recovery - W. Curtis Preston (2007-01-03, Paperback)
  45. Basic Methods of Cryptography , by Jan C. A. van der Lubbe , Steve Gee (Paperback, May, 1998)
  46. Beacon of Hatred : Inside Hizballahs Al-Manar Television , by Avi Jorisch (Paperback, 30 August, 2004)
  47. Beginning Cryptography with Java , by David Hook (Paperback, 19 August, 2005)
  48. Biometrics : Identity Verification in a Networked World , by Samir Nanavati , Michael Thieme , Raj Nanavati (Paperback, 15 March, 2002)
  49. BIOS Disassembly Ninjutsu Uncovered (Uncovered series) , by Darmawan Salihun (Paperback, 28 October, 2006)
  50. Black Hat Physical Device Security , by Drew Miller , Rob Shein , Michael Bednarczyk , Black Hat Services (Paperback, 01 October, 2004)
  51. Black Ice : The Invisible Threat of Cyber-Terrorism , by Dan Verton (Hardcover, 19 August, 2003)
  52. Blocking Spam For Business For Dummies® (For Dummies (Computers)) , by Peter H. Gregory (Paperback, 13 December, 2004)
  53. Botnets : The Killer Web Applications , by Craig Schiller , Jim Binkley , Gadi Evron , Carsten Willems , Tony Bradley , David Harley , Michael Cross (Paperback, 26 January, 2007)
  54. Brute Force : Cracking the Data Encryption Standard , by Matt Curtin (Hardcover, March, 2005)
  55. Buffer Overflow Attacks , by James C. Foster , Vitaly Osipov , Nish Bhalla (Paperback, 01 February, 2005)
  56. Building an Information Security Awareness Program , by Mark B. Desman (Paperback, 30 October, 2001)
  57. Building and Implementing a Security Certification and Accreditation Program , by Patrick D. Howard (Hardcover, 15 December, 2005)
  58. Building Automated Trading Systems : With an Introduction to Visual C++.NET 2005 (Financial Market Technology) , by Benjamin Van Vliet (Hardcover, 07 March, 2007)
  59. Building Internet Firewalls (2nd Edition) , by Elizabeth D. Zwicky , Simon Cooper , D. Brent Chapman (Paperback, 15 January, 2000)
  60. Building Linux Virtual Private Networks , by Oleg Kolesnikov , Brian Hatch (Paperback, ..)
  61. Building Open Source Network Security Tools : Components and Techniques , by Mike Schiffman , Mike Schiffman (Paperback, 11 October, 2002)
  62. Building Secure Microsoft ASP.NET Applications (Pro-Developer (Paperback)) , by Microsoft Corporation (Paperback, 13 March, 2006)
  63. Building Secure Software : How to Avoid Security Problems the Right Way - John Viega (2001-09-24, Hardcover)
  64. Building Secure Wireless Networks with 802.11 , by Jahanzeb Khan , Anis Khwaja , Jahanzeb Khan , Anis Khwaja (Paperback, 10 January, 2003)
  65. Bulls, Bears and Brains : Investing with the Best and Brightest of the Financial Internet , by Adam Leitzes , Joshua Solan (Hardcover, 04 January, 2002)
  66. Byte Wars : The Impact of September 11 on Information Technology , by Edward Yourdon , Ed Yourdon (Hardcover, 15 March, 2002)
  67. C++ Design Patterns and Derivatives Pricing (Mathematics, Finance and Risk) - Mark S. Joshi (2004-09-06, Hardcover)
  68. Canning Spam : You've Got Mail (That You Don't Want) , by Jeremy Poteet (Paperback, 13 May, 2004)
  69. CCIE Routing and Switching Official Exam Certification Guide (2nd Edition) (Exam Certification Guide) - Wendell Odom (2006-02-20, Hardcover)
  70. CCNP ISCW Official Exam Certification Guide - Brian Morgan (2007-07-18, Hardcover)
  71. CCS-P Coding Exam Review 2006 : The Certification Step (CCS-P Coding Exam Review : The Certification Step) , by Carol J. Buck (Paperback, 09 December, 2005)
  72. CCS Coding Exam Review 2006 : The Certification Step (CCS Coding Exam Review : The Certification Step (W/CD)) , by Carol J. Buck (Paperback, 19 January, 2006)
  73. CCS Coding Exam Review 2007 : The Certification Step (CCS Coding Exam Review : The Certification Step (W/CD)) , by Carol J. Buck (Paperback, 15 December, 2006)
  74. CCSA NG : Check Point Certified Security Administrator Study Guide , by Justin Menga , Justin Menga (Hardcover, 14 January, 2003)
  75. CCSP : Secure Intrusion Detection and SAFE Implementation Study Guide (642-531 and 642-541) , by Justin Menga , Carl Timm (Paperback, 08 March, 2004)
  76. CCSP Cisco Secure VPN Exam Certification Guide (CCSP Self-Study) , by John Roland , Mark J. Newcomb (Hardcover, 02 April, 2003)
  77. CCSP CSI Exam Certification Guide (2nd Edition) , by Ido Dubrawsky , Paul Grey (Hardcover, 29 November, 2004)
  78. CCSP CSPFA Exam Cram 2 (Exam Cram 642-521) , by Daniel P. Newman , Daniel Newman (Paperback, 10 October, 2003)
  79. CCSP Flash Cards and Exam Practice Pack (Flash Cards and Exam Practice Packs) , by Behzad Behtash , Grant Moerschel (Paperback, 20 December, 2005)
  80. CCSP SECUR Exam Certification Guide (CCSP Self-Study, 642-501) (Ccsp Self-Study) , by Greg Bastien , Christian Abera Degu (Hardcover, 22 December, 2003)
  81. CCSP SECUR Exam Cram 2 (642-501) , by Raman Sud , Ken Edelman (Paperback, 14 November, 2003)
  82. CCSP Self-Study : Cisco Secure Intrusion Detection System (CSIDS) (2nd Edition) (Certification Self-Study Series) , by Earl Carter , Inc. Cisco Systems (Hardcover, 09 February, 2004)
  83. CCSP Self-Study : Cisco Secure PIX Firewall Advanced (CSPFA) (2nd Edition) , by Behzad Behtash , Cisco Systems Inc. (Hardcover, 14 January, 2004)
  84. CCSP Self-Study : Cisco Secure Virtual Private Networks (CSVPN) (2nd Edition) (Self-Study Guide) , by Andrew Mason (Hardcover, 19 May, 2004)
  85. CCSP SNPA Official Exam Certification Guide (3rd Edition) (Exam Certification Guide) , by Greg Bastien , Earl Carter , Christian Degu , Michael Gibbs (Hardcover, 24 April, 2006)
  86. CCSP SNRS Exam Certification Guide , by Greg Bastien , Sara Nasseh , Christian Degu (Hardcover, 08 December, 2005)
  87. CCSP Study Guide Kit , by Eric Quinn , Justin Menga , Tom Lancaster , Todd Lammle (Paperback, 26 April, 2004)
  88. CD and DVD Forensics , by Paul Crowley , Dave Kleiman (Paperback, 26 February, 2007)
  89. CEH : Official Certified Ethical Hacker Review Guide : Exam 312-50 - Kimberly Graves (2007-02-27, Paperback)
  90. Certified Ethical Hacker Exam Prep (Exam Prep 2 (Que Publishing)) - Michael Gregg (2006-04-07, Paperback)
  91. Check Point Next Generation Security Administration , by Cherie Amon , Allen V. Keele , Daniel Kligerman , Drew Simonis , Corey Pincock (Paperback, March, 2002)
  92. Check Point NG VPN-1/Firewall-1 : Advanced Configuration and Troubleshooting , by Barry J. Stiefel , Doug Maxwell , Kyle X. Hourihan , Cherie Amon , James Noble (Paperback, May, 2003)
  93. Check Point™ Next Generation with Application Intelligence Security , by Chris Tobkin , Daniel Kligerman (Paperback, 07 January, 2004)
  94. CISA : Certified Information Systems Auditor Study Guide - David L. Cannon (2006-05-08, Paperback)
  95. Cisco Access Control Security : AAA Administration Services (Networking Technology) , by Brandon Carroll (Paperback, 27 May, 2004)
  96. Cisco ASA : All-in-One Firewall, IPS, and VPN Adaptive Security Appliance (Networking Technology) - Omar Santos (2005-10-14, Paperback)
  97. Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology : Security) - David Hucaby (2007-08-09, Paperback)
  98. Cisco IOS Access Lists , by Jeff Sedayao (Paperback, June, 2001)
  99. Cisco Network Admission Control, Volume I : NAC Framework Architecture and Design (Networking Technology) , by Denise Helfrich , Lou Ronnau , Jason Frazier , Paul Forbes (Paperback, 08 December, 2006)
  100. Cisco Network Admission Control, Volume II : NAC Deployment and Troubleshooting (Networking Technology) , by Jazib Frahim , Omar Santos , David White (Paperback, 21 November, 2006)
  101. Cisco Network Security Little Black Book , by Joe Harris (Paperback, 15 August, 2002)
  102. Cisco Networking Academy Program CCNA 3 and 4 Lab Companion, Third Edition - Cisco Systems Inc. (2003-06-20, Paperback)
  103. Cisco PIX Firewalls : Configure, Manage, & Troubleshoot , by Charles Riley (Editor) , Umer Khan , Michael Sweeney (Paperback, 01 May, 2005)
  104. Cisco Router Firewall Security (Networking Technology) , by Richard Deal (Paperback, 10 August, 2004)
  105. Cisco Security Agent , by Chad Sullivan (Paperback, 01 June, 2005)
  106. Cisco Security Bible , by K. S. Rajesh , Rajesh, NIIT K.S. (Paperback, 01 March, 2002)
  107. Cisco Security Specialist's Guide to PIX Firewall , by Umer Khan , Vitaly Osipov , Mike Sweeney , Woody Weaver (Paperback, December, 2002)
  108. Cisco Wireless LAN Security (Networking Technology) , by Krishna Sankar , Sri Sundaralingam , Darrin Miller , Andrew Balinsky (Hardcover, 15 November, 2004)
  109. Cisco(R) PIX Firewalls - Richard Deal (2002-10-23, Paperback)
  110. CISSP : Certified Information Systems Security Professional Study Guide, Third Edition - James Michael Stewart (2005-09-09, Paperback)
  111. CISSP All-in-One Exam Guide, Third Edition (All-in-One) - Shon Harris (2005-09-15, Hardcover)
  112. CISSP Exam Cram 2 , by Michael Gregg (Paperback, 22 September, 2005)
  113. CISSP For Dummies (For Dummies (Computer/Tech)) - Lawrence H. Miller (2007-04-02, Paperback)
  114. CISSP Practice Questions Exam Cram 2 , by Michael Gregg (Paperback, 21 October, 2004)
  115. CISSP Training Guide , by Roberta Bragg (Paperback, 18 November, 2002)
  116. Citizen Cyborg : Why Democratic Societies Must Respond to the Redesigned Human of the Future , by James Hughes (Hardcover, 26 October, 2004)
  117. Citrix Access Suite 4 for Windows Server 2003 : The Official Guide, Third Edition , by Steve Kaplan , Tim Reeser , Alan Wood (Paperback, 25 September, 2006)
  118. Citrix Access Suite Security for IT Administrators , by Citrix Engineering Team (Paperback, 13 October, 2006)
  119. Citrix CCA MetaFrame Presentation Server 3.0 and 4.0 (Exams 223/256) (Exam Cram 2) , by Todd Mathers , Elias Khnaser (Paperback, 21 December, 2005)
  120. CIW : Security Professional Study Guide Exam 1D0-470 (With CD-ROM) , by James Stanger , Patrick T. Lane , Tim Crothers , James Stanger Ph.D. (Hardcover, 15 June, 2002)
  121. Classical and Contemporary Cryptology , by Richard J. Spillman (Hardcover, 26 May, 2004)
  122. Code Hacking : A Developer's Guide to Network Security (Networking Series) , by Richard Conway , Julian Cordingley (Paperback, 01 May, 2004)
  123. Codebreaker : The History of Codes and Ciphers , by Stephen Pincock (Hardcover, 03 October, 2006)
  124. Codebreakers' Victory : How the Allied Cryptogaphers Won World War II , by Hervie Haufler (Paperback, 04 November, 2003)
  125. Codes and Ciphers : Julius Caesar, the ENIGMA, and the Internet , by Robert Churchhouse (Paperback, 06 December, 2001)
  126. Coding Theory and Cryptography : The Essentials (Pure and Applied Mathematics (Marcel Dekker)) , by D. G. Hoffman , D. A. Leonard , C. C. Lindner , K. T. Phelps , C. A. Rodger , J. R. Wall , Darrel R. Hankerson (Hardcover, 01 September, 2000)
  127. ColdFusion 5 : A Beginner's Guide , by Jeffry Houser (Paperback, 08 February, 2002)
  128. Colossus : The Secrets of Bletchley Park's Code-breaking Computers (Popular Science) , by Jack Copeland (Hardcover, 07 April, 2006)
  129. Comparing, Designing, and Deploying VPNs , by Mark Lewis (Paperback, 12 April, 2006)
  130. Complete Guide to Security and Privacy Metrics : Measuring Regulatory Compliance, Operational Resilience, and ROI , by Debra S. Herrmann (Hardcover, 22 January, 2007)
  131. CompTIA Security+ Study Guide : Exam SY0-101 - Mike Pastore (2006-05-08, Hardcover)
  132. CompTIA Security+ Study Guide : Exam SY0-101 , by Mike Pastore , Emmett Dulaney (Paperback, 01 May, 2006)
  133. Computational Financial Mathematics using Mathematica , by Srdjan Stojanovic (Hardcover, 04 October, 2002)
  134. Computer Evidence : Collection & Preservation (Networking Series) , by Christopher LT Brown (Paperback, 03 October, 2005)
  135. Computer Forensics : Computer Crime Scene Investigation (Networking Series) (Networking Series) , by John R Vacca (Paperback, 27 May, 2005)
  136. Computer Forensics : Incident Response Essentials - Warren G. Kruse II (2001-09-26, Paperback)
  137. Computer Forensics : Principles and Practices (Prentice Hall Security Series) - Linda Volonino (2006-08-21, Paperback)
  138. Computer Forensics and Cyber Crime : An Introduction , by Marjie T. Britz (Paperback, 01 August, 2003)
  139. Computer Forensics JumpStart (Jumpstart (Sybex)) - Michael Solomon (2004-12-10, Paperback)
  140. Computer Security - Dieter Gollmann (2006-01-18, Paperback)
  141. Computer Security : Art and Science - Matt Bishop (2002-12-02, Hardcover)
  142. Computer Security : Principles and Practice - William Stallings (2007-08-02, Hardcover)
  143. Computer Security Basics , by Debby Russell , Sr. G.T Gangemi (Paperback, 01 July, 1991)
  144. Computer Security Basics , by Rick Lehtinen , Deborah Russell , G T Gangemi (Paperback, 13 June, 2006)
  145. Computer Security for the Home and Small Office , by Thomas C. Greene (Paperback, 01 March, 2004)
  146. Computer Security Fundamentals (Prentice Hall Security Series) - Chuck Easttom (2005-03-03, Paperback)
  147. Computer Security Handbook - (2002-04-11, Paperback)
  148. Computer Security Lab Manual (Information Assurance & Security) - Vincent J. Nestler (2005-06-22, Paperback)
  149. Computer Viruses For Dummies , by Peter H. CISA, CISSP Gregory (Paperback, 27 August, 2004)
  150. Computers, Ethics, and Society , by M. David Ermann , Michele S. Shauf (Paperback, 14 November, 2002)
  151. Configuring Check Point NGX VPN-1/Firewall-1 , by Robert Stephens , Barry Stiefel , Stephen Watkins , Simon Desmeules , Eli Faskha (Paperback, 01 August, 2005)
  152. Configuring Juniper Networks NetScreen & SSG Firewalls - Rob Cameron (2006-11-28, Paperback)
  153. Configuring Netscreen Firewalls , by Rob Cameron , CJ Cui , Thomas Byrne , Dave Killion , Kevin Russell , Chris Cantrell (Paperback, 01 December, 2004)
  154. Configuring Sonicwall Firewalls , by Barry Steifel , Simon Desmeules (Paperback, 26 April, 2006)
  155. Contemporary Security Management, Second Edition , by John Fay (Hardcover, 04 October, 2005)
  156. Core Security Patterns : Best Practices and Strategies for J2EE, Web Services, and Identity Management (Core Series) - Christopher Steel (2005-10-14, Hardcover)
  157. Corporate Computer and Network Security - Raymond Panko (2003-03-17, Hardcover)
  158. Counter Hack : A Step-by-Step Guide to Computer Attacks and Effective Defenses , by Ed Skoudis (Paperback, 23 July, 2001)
  159. Counter Hack Reloaded : A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (The Radia Perlman Series in Computer Networking and Security) - Edward Skoudis (2005-12-23, Paperback)
  160. CramSession's Cisco Secure Pix Firewall Fundamentals : Certification Study Guide (Digital, 17 August, 2000)
  161. CramSession's Cisco Secure PIX Firewall Fundamentals Advanced : Certification Study Guide (Digital, 01 March, 2001)
  162. CramSession's Citrix SecureICA and Security : Certification Study Guide (Digital, 20 December, 2000)
  163. CramSession's CIW Foundations : Certification Study Guide (Digital, 09 March, 2001)
  164. CramSession's CIW Security Professional Version 4 : Certification Study Guide (Digital, 10 November, 2000)
  165. CramSession's NAI Sniffer Certified Professional - Troubleshooting with the Sniffer Pro Network Analyzer : Certification Study Guide (Digital, 10 January, 2002)
  166. CRCP Crystal Reports Certified Professional All-in-One , by Annette Harper (Hardcover, 20 January, 2005)
  167. Creating a Presentation in PowerPoint : Visual QuickProject Guide , by Tom Negrino (Paperback, 06 October, 2004)
  168. Critical Infrastructure Protection in Homeland Security : Defending a Networked Nation , by Ted G. Lewis (Hardcover, ..)
  169. Cross Site Scripting Attacks : Xss Exploits and Defense , by Seth Fogie , Jeremiah Grossman , Robert Hansen , Anton Rager , Petko D. Petkov (Paperback, 15 May, 2007)
  170. Cryptanalysis , by Helen F. Gaines (Paperback, 01 April, 1989)
  171. Cryptanalysis of Number Theoretic Ciphers , by Samuel S., Jr. Wagstaff , Mikhail J. Atallah (Hardcover, 27 December, 2002)
  172. Cryptographic Security Architecture : Design and Verification , by Peter Gutmann (Hardcover, 04 April, 2003)
  173. Cryptography : Theory and Practice, Third Edition (Discrete Mathematics and Its Applications) - Douglas R. Stinson (2005-11-01, Hardcover)
  174. Cryptography and Network Security (4th Edition) - William Stallings (2005-11-16, Hardcover)
  175. Cryptography and Public Key Infrastructure on the Internet , by Klaus Schmeh (Paperback, June, 2003)
  176. Cryptography Decrypted - H. X. Mel (2000-12-21, Paperback)
  177. Cryptography Demystified , by John Hershey (Paperback, 23 August, 2002)
  178. Cryptography for Dummies , by Chey Cobb (Paperback, 30 January, 2004)
  179. Cryptography in C and C++, Second Edition , by Michael Welschenbach (Hardcover, 25 May, 2005)
  180. Cryptography in the Database : The Last Line of Defense , by Kevin Kenan (Paperback, 19 October, 2005)
  181. Cryptological Mathematics (Classroom Resource Material) , by Robert Edward Lewand (Paperback, 07 December, 2000)
  182. Cryptology (Spectrum) , by Albrecht Beutelspacher , William Watkins , Chris J. Fisher (Paperback, 05 September, 1996)
  183. CSIDS Exam Cram 2 (Exam Cram 642-531) , by Daniel Newman , Kristina Maria Manalo , Ed Tittel (Paperback, 15 March, 2004)
  184. CWSP Certified Wireless Security Professional Official Study Guide (Exam PW0-200), Second Edition , by Tom Carpenter , Grant Moerschel , Richard Dreger (Paperback, 26 September, 2006)
  185. CYA : Securing Exchange Server 2003 & Outlook Web Access , by Henrik Walther , Patrick Santry (Paperback, 01 April, 2004)
  186. CYA Securing IIS 6.0 , by Chris Peiris , Bernard Cheah , Ken Schaefer (Paperback, 01 April, 2004)
  187. Cyber-Threats, Information Warfare, and Critical Infrastructure Protection : Defending the U.S. Homeland , by Anthony H. Cordesman , Justin G. Cordesman (Hardcover, 30 November, 2001)
  188. Cyber Adversary Characterization : Auditing the Hacker Mind , by Tom Parker , Marcus Sachs , Eric Shaw , Ed Stroz , Matthew G. Devost (Paperback, June, 2004)
  189. Cyber Forensics : A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes , by Albert J. Marcella Jr , Robert S. Greenfield (Paperback, 23 January, 2002)
  190. Cyber Spying , by Ted Fair , Michael Nordfelt , Sandra Ring , Eric Cole (Paperback, 15 February, 2005)
  191. Cyber Threats and Information Security : Meeting the 21st Century Challenge (Csis Report) , by Arnaud de Borchgrave , Frank J. Cilluffo , Sharon L. Cardash , Michele Ledgerwood , Csis Homeland Defense Project (Paperback, 21 May, 2001)
  192. Cybercrime : Digital Cops in a Networked Environment (Ex Machina : Law, Technology, and Society) , by J. M. Balkin , Katz Eddan , James Grimmelmann , Nimrod Kozlovski , Shlomit Wagman , Tal Zarsky (Paperback, 01 March, 2007)
  193. Cybernetic Trading Strategies : Developing a Profitable Trading System with State-of-the-Art Technologies , by Murray A. Ruggiero (Hardcover, 17 June, 1997)
  194. Cyberpolitics , by Kevin A. Hill , John E. Hughes (Paperback, April, 1998)
  195. CYBERPUNK : Outlaws and Hackers on the Computer Frontier, Revised , by Katie Hafner (Paperback, 01 November, 1995)
  196. Cybershock : Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption , by Winn Schwartau (Paperback, 30 March, 2001)
  197. Darknet : Hollywood's War Against the Digital Generation , by J. D. Lasica (Hardcover, 02 May, 2005)
  198. Data Mining and Predictive Analysis : Intelligence Gathering and Crime Analysis , by Colleen McCue (Paperback, 01 May, 2007)
  199. Data Mining Techniques : For Marketing, Sales, and Customer Relationship Management - Michael J. A. Berry (2004-04-09, Paperback)
  200. Database Nation : The Death of Privacy in the 21st Century , by Simson Garfinkel (Paperback, January, 2001)
  201. Database Security and Auditing : Protecting Data Integrity and Accessibility - Hassan A. Afyouni (2005-04-06, Paperback)
  202. Day Trade Futures Online (Wiley Online Trading for a Living) , by Larry Williams (Hardcover, 29 May, 2000)
  203. Day Trade Online , by Christopher A. Farrell (Hardcover, 31 March, 1999)
  204. Day Trade Online , by Christopher A. Farrell (Paperback, 15 October, 2001)
  205. Decrypted Secrets , by Friedrich L. Bauer (Hardcover, 05 March, 2002)
  206. Defend I.T. : Security by Example , by Ajay Gupta , Scott Laliberte (Paperback, 19 May, 2004)
  207. Defense and Detection Strategies against Internet Worms , by Jose Nazario , Nazario (Hardcover, 01 October, 2003)
  208. Deleteyourbroker.com : Using the Internet to Beat the Pros on Wall Street , by Christopher Byron (Hardcover, January, 2001)
  209. Demystifying the Ipsec Puzzle (Artech House Computer Security Series) , by Sheila Frankel (Hardcover, 01 May, 2001)
  210. Deploying Secure 802.11 Wireless Networks with Microsoft Windows , by Joseph Davies (Paperback, 13 August, 2003)
  211. Design, Testing, and Optimization of Trading Systems , by Robert Pardo (Hardcover, 12 August, 1992)
  212. Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter , by Lucian, Gheorghe (Paperback, 31 October, 2006)
  213. Designing BSD Rootkits : An Introduction to Kernel Hacking , by Joseph Kong (Paperback, 10 April, 2007)
  214. Designing Microsoft Windows 2000 Network Security (Academic Learning Series) , by Microsoft Corporation (Hardcover, 01 July, 2001)
  215. Designing Network Security, Second Edition , by Merike Kaeo (Hardcover, 29 October, 2003)
  216. Developer's Guide to Web Application Security , by Michael Cross (Paperback, 01 January, 2007)
  217. Developing Java Web Services : Architecting and Developing Secure Web Services Using Java , by Ramesh Nagappan , Robert Skoczylas , Rima Patel Sriganesh (Paperback, ..)
  218. Developing More-Secure Microsoft ASP.NET 2.0 Applications (Pro Developer) - Dominick Baier (2006-10-25, Paperback)
  219. Developing Secure Applications with Visual Basic , by Davis Chapman (Paperback, 18 May, 2000)
  220. Digital Certificates : Applied Internet Security , by Jalal Feghhi , Peter Williams (Paperback, 15 October, 1998)
  221. Digital Defense : What You Should Know About Protecting Your Company's Assets , by Thomas J. Parenty (Hardcover, September, 2003)
  222. Digital Evidence and Computer Crime, Second Edition - Eoghan Casey (2004-03-08, Hardcover)
  223. Digital Fortress : A Thriller , by Dan Brown (Mass Market Paperback, 30 December, 2003)
  224. Digital Identity , by Phillip Windley (Paperback, 01 August, 2005)
  225. Disappearing Cryptography, Second Edition - Information Hiding : Steganography and Watermarking , by Peter Wayner (Paperback, 29 April, 2002)
  226. Disaster Recovery Handbook, The : A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities, and Assets , by Michael Wallace , Lawrence Webber (Hardcover, July, 2004)
  227. Disaster Recovery Planning : For Computers and Communication Resouces , by Jon William Toigo (Paperback, 21 December, 1995)
  228. Disaster Recovery Planning : Strategies for Protecting Critical Information Assets , by Jon William Toigo , Jon Toigo (Hardcover, 27 August, 2002)
  229. Disaster Recovery Planning for Nonprofits , by Michael K. Robinson (Paperback, 01 November, 2003)
  230. Don't Click on the Blue E! : Switching to Firefox , by Scott Granneman (Paperback, 25 April, 2005)
  231. Dot.Con : How America Lost Its Mind and Money in the Internet Era , by John Cassidy (Paperback, 13 May, 2003)
  232. Dr. Tom Shinder's Configuring ISA Server 2004 , by Thomas W. Shinder , Debra Littlejohn Shinder , Martin Grasdal (Paperback, 01 August, 2004)
  233. Dr. Tom Shinder's ISA Server and Beyond with CDROM , by Thomas W. Shinder , Martin Grasdal , Debra Littlejohn Shinder (Hardcover, 10 November, 2002)
  234. Effective Oracle Database 10g Security by Design - David Knox (2004-06-10, Paperback)
  235. Effective Security Management, Fourth Edition (Effective Security Management) , by Charles Sennewald (Hardcover, February, 2003)
  236. Electronic Day Trading 101 (Wiley Online Trading for a Living) , by Sunny J. Harris (Hardcover, 22 October, 1999)
  237. Electronic Payment Systems for E-Commerce , by Donal O'Mahony , Michael Peirce , Hitesh Tewari , O'Mahony Donal (Hardcover, 15 August, 2001)
  238. Elementary Cryptanalysis : A Mathematical Approach (New Mathematical Library) , by Abraham SInkov (Paperback, August, 1998)
  239. Elliptic Curves in Cryptography , by I. Blake , G. Seroussi , N. Smart , J. W. S. Cassels (Paperback, 15 January, 2000)
  240. EnCase Computer Forensics : The Official EnCE : EnCaseeCertified Examiner Study Guide - Steve Bunting (2006-02-20, Paperback)
  241. Ending Spam : Bayesian Content Filtering and the Art of Statistical Language Classification , by Jonathan A Zdziarski (Paperback, 01 July, 2005)
  242. Enemy at the Water Cooler : Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures , by Brian Contos , Dave Kleiman (Paperback, 23 August, 2006)
  243. Enhanced IP Services for CISCO Networks : A Practical Resource for Deploying Quality of Service, Security, IP Routing, and VPN Services , by Donald C. Lee (Hardcover, 15 October, 1999)
  244. Enterprise Java 2 Security : Building Secure and Robust J2EE Applications , by Marco Pistoia , Nataraj Nagaratnam , Larry Koved , Anthony Nadalin (Paperback, 17 February, 2004)
  245. Enterprise Security , by Robert C. Newman (Hardcover, 26 September, 2002)
  246. Enterprise Security Architecture : A Business-Driven Approach - John Sherwood (2005-11-12, Hardcover)
  247. Essential Check Point FireWall-1 NG : An Installation, Configuration, and Troubleshooting Guide , by Dameon D. Welch-Abernathy (Paperback, 21 January, 2004)
  248. Essential Computer Security : Everyone's Guide to Email, Internet, and Wireless Security , by Tony Bradley , Harlan Carvey (Paperback, 01 October, 2006)
  249. Essential Mac OS X Panther Server Administration , by Michael Bartosh , Ryan J Faas (Paperback, 01 May, 2005)
  250. Essential PHP Security , by Chris Shiflett (Paperback, 13 October, 2005)
  251. Essential SNMP, Second Edition - Douglas Mauro (2005-09-21, Paperback)
  252. Essential SourceSafe , by Larry C. Whipple , Ted Roche (Paperback, 01 June, 2001)
  253. ExamWise For Security+ Exam SY0-101 (With Online Exam) , by Tcat Houser , Helen O'Boyle (Paperback, 14 December, 2002)
  254. Excel Hacks : Tips & Tools for Streamlining Your Spreadsheets (Hacks) - David Hawley (2007-06-20, Paperback)
  255. Experts' Guide to OS/400 & i5/OS Security , by Carol Woodbury , Patrick Botz (Paperback, May, 2004)
  256. Exploiting Online Games : Cheating Massively Distributed Systems (Addison-Wesley Software Security Series) - Greg Hoglund (2007-07-09, Paperback)
  257. Exploiting Software : How to Break Code (Addison-Wesley Software Security Series) , by Greg Hoglund , Gary McGraw (Paperback, 17 February, 2004)
  258. Extreme Exploits : Advanced Defenses Against Hardcore Hacks , by Victor Oppleman , Oliver Friedrichs , Brett Watson (Paperback, 18 July, 2005)
  259. Extrusion Detection : Security Monitoring for Internal Intrusions , by Richard Bejtlich (Paperback, 08 November, 2005)
  260. File System Forensic Analysis - Brian Carrier (2005-03-17, Paperback)
  261. Financial Engineering and Computation : Principles, Mathematics, and Algorithms , by Yuh-Dauh Lyuu (Hardcover, 12 November, 2001)
  262. Financial Freedom Through Electronic Day Trading - Van K. Tharp (2000-12-18, Hardcover)
  263. Financial Instrument Pricing Using C++ (The Wiley Finance Series) , by Daniel J. Duffy (Hardcover, 27 August, 2004)
  264. Financial Modeling with Crystal Ball and Excel (Wiley Finance) , by John Charnes (Paperback, 30 March, 2007)
  265. Financial Privacy & Electronic Commerce : Who's in My Business , by Benjamin, Iii, Dr. Robinson , Benjamin E., III Robinson (Paperback, October, 2000)
  266. Firefox and Thunderbird Garage (The Garage Series) , by Chris Hofmann , Marcia Knous , John Hedtke (Paperback, 08 April, 2005)
  267. Firefox For Dummies (For Dummies (Computer/Tech)) , by Blake Ross (Paperback, 11 January, 2006)
  268. Firefox Hacks : Tips & Tools for Next-Generation Web Browsing (Hacks) , by Nigel McFarlane (Paperback, 11 March, 2005)
  269. Firefox Secrets : A Need-To-Know Guide , by Cheah Yeow (Paperback, 15 June, 2005)
  270. Firewall Architecture for the Enterprise , by Norbert Pohlmann , Tim Crothers (Paperback, 08 July, 2002)
  271. Firewall Fundamentals , by Wes Noonan , Ido Dubrawsky (Paperback, 02 June, 2006)
  272. Firewalls for Dummies, Second Edition , by Brian Komar , Ronald Beekelaar , Joern Wettern (Paperback, 27 June, 2003)
  273. Fisma Certification & Accreditation Handbook , by Laura Taylor , Matthew Shepherd (Paperback, 12 February, 2007)
  274. Forensic Discovery , by Dan Farmer , Wietse Venema (Hardcover, 31 December, 2004)
  275. Foundations of Cryptography : Volume 2, Basic Applications , by Oded Goldreich (Hardcover, 10 May, 2004)
  276. Foundations of Security : What Every Programmer Needs to Know (Expert's Voice) - Neil Daswani (2007-02-16, Paperback)
  277. From P2P to Web Services and Grids : Peers in a Client/Server World , by Ian J. Taylor (Paperback, 21 October, 2004)
  278. Fundamentals of Computer Security Technology , by Edward G. Amoroso (Paperback, 11 April, 1994)
  279. Fundamentals of Network Security , by Eric Maiwald , Eric Maiwald (Paperback, 07 November, 2003)
  280. Fundamentals of Secure Computer Systems , by Brett C. Tjaden (Paperback, 01 May, 2003)
  281. Fuzzing : Brute Force Vulnerability Discovery - Michael Sutton (2007-06-29, Paperback)
  282. Geek House : 10 Hardware Hacking Projects for Around Home (ExtremeTech) , by Barry Press , Marcia Press (Paperback, 06 May, 2005)
  283. Geeks On Call Security and Privacy : 5-Minute Fixes (Geeks on Call) , by Geeks On Call (Paperback, 19 December, 2005)
  284. Getting Started in Online Day Trading , by Kassandra Bentley (Paperback, 15 January, 2000)
  285. Global Outsourcing with Microsoft Visual Studio 2005 Team System (Networking & Security Series) , by Jamil Azher (Paperback, 04 August, 2006)
  286. Globus Toolkit 4, : Programming Java Services (The Morgan Kaufmann Series in Networking) , by Borja Sotomayor , Lisa Childers (Paperback, 16 December, 2005)
  287. Going Public in Good Times and Bad , by Robert G. Heim , Robert G. Heim (Paperback, 15 January, 2002)
  288. Google Hacking for Penetration Testers, Volume 1 , by Johnny Long , Ed Skoudis , Alrik van Eijkelenborg (Paperback, 06 February, 2005)
  289. Google Hacks (Hacks) , by Tara Calishain , Rael Dornfest (Paperback, 01 December, 2004)
  290. Google Hacks : Tips & Tools for Finding and Using the World's Information (Hacks) - Rael Dornfest (2006-08-03, Paperback)
  291. Gray Hat Hacking : The Ethical Hacker's Handbook - Shon Harris (2004-11-09, Paperback)
  292. Group Policy : Management, Troubleshooting, and Security : For Windows Vista , Windows 2003, Windows XP, and Windows 2000 (Mark Minasi Windows Administrator Library) - Jeremy Moskowitz (2007-04-09, Paperback)
  293. Group Policy, Profiles, and IntelliMirror for Windowse2003, WindowseXP, and Windows 2000 (Mark Minasi Windows Administrator Library) , by Jeremy Moskowitz (Paperback, 21 October, 2005)
  294. Guide to Computer Forensics and Investigations, Second Edition - Amelia Phillips (2005-03-03, Paperback)
  295. Guide to Disaster Recovery - Michael Erbschloe (2003-03-10, Paperback)
  296. Guide to Firewalls and Network Security : Intrusion Detection and VPNs - Greg Holden (2003-04-15, Paperback)
  297. Guide to Linux Networking and Security , by Nick Wells (Paperback, 14 October, 2002)
  298. Guide to Network Defense and Countermeasures - Randy Weaver (2006-01-09, Paperback)
  299. Guide to Operating Systems Security , by Michael Palmer (Paperback, 19 November, 2003)
  300. Guide to Wireless Network Security , by John R. Vacca (Hardcover, 30 May, 2006)
  301. Hack Attacks Denied : A Complete Guide to Network Lockdown for UNIX, Windows, and Linux, Second Edition , by John Chirillo (Paperback, 06 September, 2002)
  302. Hack Attacks Revealed : A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit, Second Edition , by John Chirillo (Paperback, 21 August, 2002)
  303. Hack I.T. : Security Through Penetration Testing , by T. J. Klevinsky , Scott Laliberte , Ajay Gupta (Paperback, ..)
  304. Hack Proofing ColdFusion , by Steve Casco , Rob Rusher , Greg Meyer , Sarge , David Vaccaro , David An (Paperback, April, 2002)
  305. Hack Proofing Linux : A Guide to Open Source Security , by James Stanger , Patrick T. Lane (Paperback, 10 July, 2001)
  306. Hack Proofing Sun Solaris 8 , by Randy Cook , Ido Dubrawsky , F. Williams Lynch , Ed Mitchell , Wyman Miles , F. William Lynch (Paperback, 15 October, 2001)
  307. Hack Proofing Your Network (Second Edition) , by Ryan Russell , Dan Kaminsky , Rain Forest Puppy , Joe Grand , K2 , David Ahmad , Hal Flynn , Ido Dubrawsky , Steve W. Manzuik , Ryan Permeh (Paperback, March, 2002)
  308. Hack the Stack : Using Snort and Ethereal to Master the 8 Layers of an Insecure Network , by Michael Gregg (Paperback, 17 October, 2006)
  309. Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios , by Mike Schiffman (Paperback, 18 October, 2001)
  310. Hacker's Challenge 2 : Test Your Network Security & Forensic Skills , by Mike Schiffman , Bill Pennington , David Pollino , Adam J. O'Donnell (Paperback, 18 December, 2002)
  311. Hacker's Challenge 3 , by David Pollino , Bill Pennington , Tony Bradley , Himanshu Dwivedi (Paperback, 25 April, 2006)
  312. Hacker's Delight - Henry S. Warren Jr. (2002-07-17, Hardcover)
  313. Hacker Cracker : A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace , by David Chanoff , Ejovi Nuwere (Paperback, 16 December, 2003)
  314. Hacker Disassembling Uncovered (Uncovered series) - Kris Kaspersky (2007-02-01, Paperback)
  315. Hacker Proof , by Kris Jamsa (Paperback, 01 February, 2002)
  316. Hackers : Heroes of the Computer Revolution - Steven Levy (2001-01, Paperback)
  317. Hackers and Painters : Big Ideas from the Computer Age - Paul Graham (2004-05, Hardcover)
  318. Hackers Beware : The Ultimate Guide to Network Security , by Eric Cole (Paperback, 13 August, 2001)
  319. Hacking : The Art of Exploitation - Jon Erickson (2003-10, Paperback)
  320. Hacking a Terror Network , by Russ Rogers (Paperback, January, 2005)
  321. Hacking Digital Cameras (ExtremeTech) , by Chieh Cheng , Auri Rahimzadeh (Paperback, 23 September, 2005)
  322. Hacking Exposed 5th Edition (Hacking Exposed) - Stuart McClure (2005-04-19, Paperback)
  323. Hacking Exposed Cisco Networks (Hacking Exposed) , by Andrew Vladimirov , Konstantin Gavrilenko , Andrei Mikhailovsky (Paperback, 15 December, 2005)
  324. Hacking Exposed Computer Forensics (Hacking Exposed) , by Chris Davis , Aaron Philipp , David Cowen (Paperback, 22 November, 2004)
  325. Hacking Exposed VoIP : Voice Over IP Security Secrets & Solutions (Hacking Exposed) , by David Endler , Mark Collier (Paperback, 28 November, 2006)
  326. Hacking Exposed Web Applications, 2nd Ed. (Hacking Exposed) - Joel Scambray (2006-06-05, Paperback)
  327. Hacking Exposed Wireless (Hacking Exposed) - Johnny Cache (2007-03-26, Paperback)
  328. Hacking Firefox : More Than 150 Hacks, Mods, and Customizations (ExtremeTech) , by Mel Reyes (Paperback, 05 August, 2005)
  329. Hacking For Dummies (For Dummies (Computer/Tech)) - Kevin Beaver (2006-10-30, Paperback)
  330. Hacking GMail (ExtremeTech) , by Ben Hammersley (Paperback, 19 December, 2005)
  331. Hacking GPS (ExtremeTech) , by Kathie Kingsley-Hughes (Paperback, 25 March, 2005)
  332. Hacking Movable Type (ExtremeTech) , by Jay Allen (Paperback, 11 July, 2005)
  333. Hacking Photoshop CS2 , by Shangara Singh (Paperback, 21 October, 2005)
  334. Hacking RSS and Atom , by Leslie M. Orchard (Paperback, 09 September, 2005)
  335. Hacking the Code : ASP.NET Web Application Security , by Mark Burnett (Paperback, May, 2004)
  336. Hacking the PSP : Cool Hacks, Mods, and Customizations for the SonyePlayStationePortable (ExtremeTech) , by Auri Rahimzadeh (Paperback, 30 October, 2006)
  337. Hacking the Xbox : An Introduction to Reverse Engineering , by Andrew Huang (Paperback, July, 2003)
  338. Hacking Web Services (Internet Series) , by Shreeraj Shah (Paperback, 02 August, 2006)
  339. Hacking Windows Vista : ExtremeTech - Steve Sinchak (2007-05-29, Paperback)
  340. Hacking Windows XP (ExtremeTech) - Steve Sinchak (2004-08-06, Paperback)
  341. Hacking Wireless Networks For Dummies (For Dummies (Computer/Tech)) - Kevin Beaver (2005-09-13, Paperback)
  342. HackNotes(tm) Network Security Portable Reference , by Michael Horton , Clinton Mugge (Paperback, 25 July, 2003)
  343. HackNotes(tm) Web Security Pocket Reference , by Mike Shema (Paperback, 30 June, 2003)
  344. HackNotes(tm) Windows Security Portable Reference , by Michael O'Dea (Paperback, 04 June, 2003)
  345. Halting the Hacker : A Practical Guide to Computer Security (With CD-ROM) , by Donald L. Pipkin , Jim Schindler , Craig Rubin (Paperback, 26 August, 2002)
  346. Handbook of Applied Cryptography (Crc Press Series on Discrete Mathematics and Its Applications) , by Alfred J. Menezes , Paul C. van Oorschot , Scott A. Vanstone (Hardcover, 16 October, 1996)
  347. Handbook of Computer Crime Investigation : Forensic Tools & Technology , by Eoghan Casey (Paperback, 15 October, 2001)
  348. Hands-On Ethical Hacking and Network Defense - Michael T. Simpson (2005-10-19, Paperback)
  349. Hardening Apache , by Tony Mobily (Paperback, 17 May, 2004)
  350. Hardening Cisco Routers (O'Reilly Networking) , by Thomas Akin (Paperback, February, 2002)
  351. Hardening Linux - James Turnbull (2005-02-01, Paperback)
  352. Hardening Network Infrastructure (Hardening) , by Wes Noonan (Paperback, 07 May, 2004)
  353. Hardening Windows Systems (Hardening) , by Roberta Bragg (Paperback, 11 May, 2004)
  354. Hardware Hacking : Have Fun While Voiding Your Warranty , by Joe Grand , Ryan Russell , Kevin Mitnick (Editor) (Paperback, 01 January, 2004)
  355. Hide Your Assets and Disappear : A Step-by-Step Guide to Vanishing Without a Trace - Edmund Pankau (2000-04-25, Paperback)
  356. High-Tech Crimes Revealed : Cyberwar Stories from the Digital Front , by Steven Branigan (Paperback, 27 August, 2004)
  357. Hijacking .Net Vol 1 : Role Based Security , by Dan Appleman , Daniel Appleman (Digital, 12 April, 2003)
  358. Home Hacking Projects for Geeks (Hacks) , by Tony Northrup , Eric Faulkner (Paperback, 01 December, 2004)
  359. Home Network Security Simplified (Networking Technology) , by Jim Doherty , Neil Anderson (Paperback, 24 July, 2006)
  360. Home Networking Annoyances : How to Fix the Most Annoying Things About Your Home Network (Annoyances) , by Kathy Ivens (Paperback, 25 January, 2005)
  361. Home Networking For Dummies (For Dummies (Computer/Tech)) - Kathy Ivens (2007-03-26, Paperback)
  362. Home Theater Hacks : 100 Industrial-Strength Tips & Tools (Hacks) , by Brett McLaughlin (Paperback, 01 November, 2004)
  363. Homeland Security Techniques and Technologies (Networking Series) , by Jesus Mena (Paperback, 01 May, 2004)
  364. Honeypots : Tracking Hackers , by Lance Spitzner (Paperback, 10 September, 2002)
  365. Honeypots For Windows (The Experts Voice) , by Roger A. Grimes (Paperback, 14 February, 2005)
  366. How I Became a Quant : Insights from 25 of Wall Street's Elite - (2007-07-09, Hardcover)
  367. How I Trade for a Living (Wiley Online Trading for a Living) , by Gary Smith (Hardcover, 26 October, 1999)
  368. How I Trade Options (Wiley Trading) , by Jon Najarian (Hardcover, 15 January, 2000)
  369. How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN , by Lee Barken (Paperback, 29 August, 2003)
  370. How to Be Invisible : The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition) - J.J. Luna (2004-03-18, Hardcover)
  371. How to Break Software Security , by James A. Whittaker , Herbert H. Thompson , Herbert Thompson (Paperback, 09 May, 2003)
  372. How to Break Web Software : Functional and Security Testing of Web Applications and Web Services. Book & CD - Mike Andrews (2006-02-02, Paperback)
  373. How to Build a Multi-Level Money Machine , by Randy Gage (Paperback, December, 2001)
  374. How to Cheat at Configuring Exchange Server 2007 : Including Outlook Web, Mobile, and Voice Access (How to Cheat) (How to Cheat) - Henrik Walther (2007-02-01, Paperback)
  375. How to Cheat at Configuring ISA Server 2004 (How to Cheat) (How to Cheat) , by Dr Thomas Shinder , Debra Littlejohn Shinder (Paperback, 14 February, 2006)
  376. How to Cheat at Managing Information Security , by Mark Osborne , Paul M Summitt (Paperback, 17 July, 2006)
  377. How to Cheat at Managing Windows Server Update Services (How to Cheat) (How to Cheat) , by Tony Piltzecker , Susan Snedaker , Chad Todd , Kirk Vigil , David E Williams , Brian Barber (Paperback, 16 February, 2006)
  378. How to Cheat at Managing Windows Small Business Server , by Susan Snedaker , Daniel Bendell (Paperback, 01 April, 2004)
  379. How to Cheat at Windows System Administration Using Command Line Scripts (How to Cheat) (How to Cheat) , by Pawan K. Bhardwaj , Dave Kleiman , Brian Barber , Kimon Andreou (Paperback, 15 September, 2006)
  380. How to Do Everything to Fight Spam, Viruses, Pop-Ups, and Spyware (How to Do Everything) , by Ken Feinstein (Paperback, 27 July, 2004)
  381. How To Get Started In Electronic Day Trading , by David S. Nassar (Paperback, 01 October, 2001)
  382. How We Got Here : A Slightly Irreverent History of Technology and Markets , by Andy Kessler (Paperback, 14 June, 2005)
  383. HP-UX 11i Security , by Chris Wong (Paperback, 24 September, 2001)
  384. HP NonStop Server Security : A Practical Handbook , by XYPRO Technology Corp (Paperback, 22 September, 2003)
  385. Human Sexuality : Diversity in Contemporary America with SexSource CD-ROM and PowerWeb , by Bryan Strong , Christine DeVault , Barbara Sayad , William Yarber (Paperback, 20 February, 2004)
  386. Hunting Security Bugs , by Tom Gallagher , Lawrence Landauer , Bryan Jeffries (Paperback, 09 June, 2006)
  387. I.T. Wars : Managing the Business-Technology Weave in the New Millennium , by David Scott (Paperback, 27 March, 2006)
  388. Implementing Backup and Recovery : The Readiness Guide for the Enterprise , by David B Little , David A. Chapa (Paperback, 16 May, 2003)
  389. Implementing Biometric Security , by John Chirillo , Scott Blaul , John Chirillo , Scott Blaul (Paperback, 01 April, 2003)
  390. Implementing Database Security and Auditing : Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase , by Ron Ben Natan (Paperback, 18 April, 2005)
  391. Implementing Elliptic Curve Cryptography , by Michael Rosing (Paperback, 01 October, 1998)
  392. Implementing SSH : Strategies for Optimizing the Secure Shell , by Himanshu Dwivedi (Paperback, 17 October, 2003)
  393. Improving Web Application Security : Threats and Countermeasures , by Microsoft Corporation (Paperback, 24 September, 2003)
  394. Incident Response : A Strategic Guide to Handling System and Network Security Breaches , by E. Eugene Schultz , Russell Shumway (Paperback, 15 January, 2002)
  395. Incident Response : Computer Forensics Toolkit , by Douglas Schweitzer (Paperback, ..)
  396. Incident Response and Computer Forensics, Second Edition - Chris Prosise (2003-07-17, Paperback)
  397. Information Assurance : Surviving the Information Environment , by Andrew Blyth , Gerald L. Kovacich (Paperback, 15 September, 2001)
  398. Information Assurance for the Enterprise : A Roadmap to Information Security (McGraw-Hill Information Assurance & Security) , by Corey Schou , Daniel Paul Shoemaker (Paperback, 13 September, 2006)
  399. Information Hiding : Steganography and Watermarking - Attacks and Countermeasures (Advances in Information Security, Volume 1) , by Neil F. Johnson , Zoran Duric , Sushil G. Jajodia (Hardcover, 15 February, 2001)
  400. Information Security : Principles and Practice - Mark Stamp (2005-10-28, Hardcover)
  401. Information Security : Protecting the Global Enterprise , by Donald L. Pipkin , Donald Pipkin (Paperback, ..)
  402. Information Security Best Practices : 205 Basic Rules , by George L. Stefanek (Paperback, 19 March, 2002)
  403. Information Security Illuminated (Jones and Barlett Illuminated) - Michael G. Solomon (2005-04-25, Paperback)
  404. Information Security Management Handbook, Fifth Edition , by Harold F. Tipton , Micki Krause (Hardcover, 30 December, 2003)
  405. Information Security Management Handbook, Fifth Edition, Volume 3 (Information Security Management Handbook) , by CISSP, Harold F. Tipton , CISSP, Micki Krause (Hardcover, 13 January, 2006)
  406. Information Security Management Handbook, Sixth Edition (Isc2 Press) , by Harold F. Tipton , Micki Krause (Hardcover, 14 May, 2007)
  407. Information Security Policies and Procedures : A Practitioner's Reference, Second Edition , by Thomas R. Peltier (Hardcover, 20 May, 2004)
  408. Information Security Policies, Procedures, and Standards : Guidelines for Effective Information Security Management , by Thomas R. Peltier (Paperback, 20 December, 2001)
  409. Information Security Risk Analysis, Second Edition , by Thomas R. Peltier (Hardcover, 26 April, 2005)
  410. Information Technology Control and Audit, Second Edition , by Frederick Gallegos , Daniel P. Manson , Sandra Senft , Carol Gonzales (Hardcover, 26 March, 2004)
  411. Information Warfare & Security - Dorothy E. Denning (1998-12-10, Paperback)
  412. Information Warfare Principles and Operations , by Edward Waltz (Hardcover, 01 August, 1998)
  413. Innocent Code : A Security Wake-Up Call for Web Programmers , by Sverre H. Huseby (Paperback, 27 February, 2004)
  414. Inside Internet Security : What Hackers Don't Want You To Know , by Jeff Crume (Paperback, 25 August, 2000)
  415. Inside Java 2 Platform Security : Architecture, API Design, and Implementation (2nd Edition) , by Li Gong , Gary Ellison , Mary Dageforde (Paperback, 27 May, 2003)
  416. Inside Network Perimeter Security (2nd Edition) (Inside) - Stephen Northcutt (2005-03-04, Paperback)
  417. Inside the Security Mind : Making the Tough Decisions , by Kevin Day (Paperback, 20 February, 2003)
  418. Inside the Spam Cartel : Trade Secrets from the Dark Side , by Spammer-X , Jeffrey Posluns (Editor) , Stu Sjouwerman (Foreword) (Paperback, 09 November, 2004)
  419. Insider Threat , by Eric Cole , Sandra Ring (Paperback, 01 December, 2005)
  420. InsideScoop to Security+ Technology Second Edition Exam SY0-101 (With BFQ CD-ROM Exam) , by Tcat Houser and Helen O'Boyle , Tcat Houser (Paperback, May, 2003)
  421. Instant Messaging Rules : A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication , by Nancy Flynn (Paperback, July, 2004)
  422. International IT Governance : An Executive Guide to ISO 17799/ISO 27001 , by Alan Calder , Steve Watkins (Paperback, 31 August, 2006)
  423. Internet Annoyances : How to Fix the Most Annoying Things about Going Online (Annoyances) , by Preston Gralla (Paperback, 20 January, 2005)
  424. Internet Cryptography , by Richard E. Smith (Paperback, 15 January, 1997)
  425. Internet Denial of Service : Attack and Defense Mechanisms (Radia Perlman Computer Networking and Security) , by Jelena Mirkovic , Sven Dietrich , David Dittrich , Peter Reiher (Paperback, 30 December, 2004)
  426. Internet Forensics , by Robert Jones (Paperback, 01 October, 2005)
  427. Internet Security : A Jumpstart for Systems Administrators and IT Managers , by Tim Speed , Juanita Ellis (Paperback, May, 2003)
  428. Internet Security Made Easy , by Douglas Schweitzer (Paperback, 15 December, 2001)
  429. Internet Underground : The Way of the Hacker , by Mad Macz (Paperback, 01 January, 2002)
  430. Intro to NT/2000 Security Programming with Visual Basic , by Dan Appleman , Daniel Appleman (Digital, 11 January, 2002)
  431. Introduction to Communication Electronic Warfare Systems (Artech House Information Warfare Library) , by Richard Poisel (Hardcover, 01 March, 2002)
  432. Introduction to Computer Security - Matt Bishop (2004-10-26, Hardcover)
  433. Introduction to Financial Technology (Complete Technology Guides for Financial Services) , by Roy S. Freedman (Hardcover, 24 April, 2006)
  434. Introduction to Online Investment Research , by Jan Davis (Hardcover, 15 February, 2004)
  435. Introduction To UNIX/Linux (Networking & Security Series) , by Christopher Diaz (Paperback, 20 June, 2006)
  436. Intrusion Detection with Snort , by Jack Koziol (Paperback, 20 May, 2003)
  437. Intrusion Prevention and Active Response , by Michael Rash , Angela D. Orebaugh , Graham Clark , Becky Pinkard , Jake Babbin (Paperback, 24 February, 2005)
  438. Intrusion Prevention Fundamentals , by Earl Carter , Jonathan Hogue (Paperback, 18 January, 2006)
  439. Intrusion Signatures and Analysis , by Mark Cooper , Stephen Northcutt , Matt Fearnow , Karen Frederick (Paperback, 29 January, 2001)
  440. Investigative Data Mining for Security and Criminal Detection, First Edition , by Jesus Mena (Paperback, 31 January, 2003)
  441. Investing Online for Dummies Quick Reference , by Thomas S. Gray (Plastic Comb, 05 July, 2000)
  442. Invitation to Cryptology , by Thomas H. Barr (Hardcover, 15 January, 2002)
  443. IPSec : The New Security Standard for the Internet, Intranets, and Virtual Private Networks , by Naganand Doraswamy , Dan Harkins (Hardcover, 13 March, 2003)
  444. IPSec VPN Design , by Vijay Bollapragada , Mohamed Khalid , Scott Wainner (Paperback, 29 March, 2005)
  445. IPv6 Essentials - Silvia Hagen (2006-05-17, Paperback)
  446. IRC Hacks , by Paul Mutton (Paperback, 27 July, 2004)
  447. ISP Liability Survival Guide : Strategies for Managing Copyright, Spam, Cache, and Privacy Regulations , by Timothy D. Casey (Paperback, 08 May, 2000)
  448. It's Never Done That Before : A Guide to Troubleshooting Windows XP , by John Ross (Paperback, ..)
  449. IT Auditing : Using Controls to Protect Information Assets , by Chris Davis , Mike Schiller , Kevin Wheeler (Paperback, 22 December, 2006)
  450. IT Investment : Making a Business Case (Computer Weekly Professional Series) , by Dan Remenyi (Paperback, 02 November, 1999)
  451. IT Security : Risking the Corporation , by Linda McCarthy (Paperback, 24 February, 2003)
  452. J2EE Security for Servlets, EJBs, and Web Services , by Pankaj Kumar (Paperback, 29 August, 2003)
  453. Java Cryptography Extensions : Practical Guide for Programmers , by Jason Weiss (Paperback, 27 February, 2004)
  454. Java Enterprise in a Nutshell (In a Nutshell (O'Reilly)) , by Jim Farley , William Crawford , Prakash Malani , John Norman , Justin Gehtland (Paperback, 22 November, 2005)
  455. Java I/O - Elliotte Harold (2006-05-16, Paperback)
  456. Java Messaging (Programming Series) - Eric Bruno (2005-11-07, Paperback)
  457. Java Security (2nd Edition) , by Scott Oaks (Paperback, 17 May, 2001)
  458. Java Security Solutions , by Rich Helton , Johennie Helton (Paperback, 01 May, 2002)
  459. JDK 1.4 Tutorial, eDoc 7 : Using JSSE for Secure Socket Communications , by Gregory Travis (Digital, 13 May, 2002)
  460. Jeff Duntemann's Wi-Fi Guide, Second Edition , by Jeff Duntemann (Paperback, April, 2004)
  461. Keep Your Kids Safe on the Internet , by Simon Johnson (Paperback, 20 August, 2004)
  462. Kerberos : A Network Authentication System , by Brian Tung (Paperback, 04 May, 1999)
  463. Kerberos : The Definitive Guide - Jason Garman (2003-08-26, Paperback)
  464. KISS Guide to Online Investing , by Theresa W. Carey , Edwin A. Finn (Paperback, 01 August, 2001)
  465. Knoppix Hacks : 100 Industrial-Strength Tips and Tools , by Kyle Rankin (Paperback, 25 October, 2004)
  466. Knoppix Pocket Reference , by Kyle Rankin (Paperback, 10 June, 2005)
  467. Know Your Enemy : Learning about Security Threats (2nd Edition) , by Honeynet Project The (Paperback, 17 May, 2004)
  468. Lab Manual For Security + Guide To Network Security Fundamentals - Paul Cretaro (2004-08-19, Paperback)
  469. LDAP in the Solaris Operating Environment : Deploying Secure Directory Services , by Michael Haines , Tom Bialaski (Paperback, 17 September, 2003)
  470. Learning Red Hat Enterprise Linux and Fedora , by Bill McCarty (Paperback, 01 April, 2004)
  471. Leo Laporte's Guide to TiVo , by Leo Laporte , Gareth Branwyn (Paperback, 07 October, 2004)
  472. Let Go to Grow : Escaping the Commodity Trap, First Edition , by Linda S. Sanford , Dave Taylor (Hardcover, December, 2005)
  473. Lifehacker : 88 Tech Tricks to Turbocharge Your Day - Gina Trapani (2006-12-18, Paperback)
  474. Linksys WRT54G Ultimate Hacking - Paul Asadoorian (2007-05-15, Paperback)
  475. Linux Annoyances for Geeks , by Michael Jang (Paperback, 05 April, 2006)
  476. Linux Desktop Hacks , by Nicholas Petreley , Jono Bacon (Paperback, 28 March, 2005)
  477. Linux Firewalls (3rd Edition) (Novell Press) - Steve Suehring (2005-09-14, Paperback)
  478. Linux iptables Pocket Reference - Gregor N. Purdy (2004-11, Paperback)
  479. Linux Network Security (Administrator's Advantage Series) , by Peter G Smith (Paperback, March, 2005)
  480. Linux Pocket Guide - Daniel J. Barrett (2004-03-01, Paperback)
  481. Linux Security (Craig Hunt Linux Library) , by Ramon J. Hontanon (Paperback, 14 June, 2001)
  482. Linux Security , by Shadab Siddiqui (Paperback, 21 October, 2002)
  483. Linux Security Cookbook , by Daniel J. Barrett , Richard E. Silverman , Robert G. Byrnes (Paperback, June, 2003)
  484. Linux Server Hacks : 100 Industrial-Strength Tips and Tools - Rob Flickenger (2003-01, Paperback)
  485. Linux Server Hacks, Volume Two : Tips & Tools for Connecting, Monitoring, and Troubleshooting (Hacks) - William von Hagen (2005-12-22, Paperback)
  486. Linux Server Security , by Michael D Bauer (Paperback, 18 January, 2005)
  487. Linux Troubleshooting Bible , by Christopher Negus , Thomas Weeks (Paperback, 30 July, 2004)
  488. Linux(R) Patch Management : Keeping Linux(R) Systems Up To Date (Bruce Perens Open Source) , by Michael Jang (Paperback, 09 January, 2006)
  489. Load Balancing Servers, Firewalls, * Caches , by Chandra Kopparapu (Hardcover, 25 January, 2002)
  490. Look Both Ways : Help Protect Your Family on the Internet , by Linda Criddle , Nancy Muir (Paperback, 18 October, 2006)
  491. Lotus(R) Notes(R) Developer's Toolbox : Tips for Rapid and Successful Deployment (The developerWorks Series) , by Mark Elliott (Paperback, 10 October, 2006)
  492. Low Voltage Wiring : Security/Fire Alarm Systems , by Terry Kennedy , John E. Traister (Paperback, 27 August, 2001)
  493. Mac OS X Tiger : In a Nutshell (In a Nutshell (O'Reilly)) , by Andy Lester , Chris Stone , Chuck Toporek , Jason McIntosh (Paperback, 01 November, 2005)
  494. Mac OS X Tiger : Missing Manual , by David Pogue (Paperback, 01 August, 2005)
  495. Making the Net Work : Deploying a Secure Portal on Sun Systems (Sun Blueprints) , by Robert L. Baker (Paperback, 25 May, 2004)
  496. Malicious Cryptography : Exposing Cryptovirology , by Adam Young , Moti Yung (Paperback, 27 February, 2004)
  497. Malicious Mobile Code : Virus Protection for Windows (O'Reilly Computer Security) , by Roger A. Grimes (Paperback, August, 2001)
  498. Malware : Fighting Malicious Code - Ed Skoudis (2003-11-09, Paperback)
  499. Management of Information Security , by Michael E. Whitman , Herbert J. Mattord (Paperback, 27 January, 2004)
  500. Management Of Information Security, 2/E - Michael E. Whitman (2007-03-27, Paperback)
  501. Managing A Network Vulnerability Assessment , by Thomas Peltier , Justin Peltier , John A. Blackley (Paperback, 28 May, 2003)
  502. Managing Enterprise Content : A Unified Content Strategy - Ann Rockley (2002-10-17, Paperback)
  503. Managing Information Security Risks : The OCTAVE Approach , by Christopher Alberts , Audrey Dorofee (Hardcover, 09 July, 2002)
  504. Managing Security with Snort and IDS Tools , by Christopher Gerg , Kerry J. Cox (Paperback, August, 2004)
  505. Mapping Hacks : Tips & Tools for Electronic Cartography (Hacks) , by Schuyler Erle , Rich Gibson , Jo Walsh (Paperback, 09 June, 2005)
  506. Mapping Security : The Corporate Security Sourcebook for Today's Global Economy , by Tom Patterson , Scott Gleeson Blue (Paperback, 14 December, 2004)
  507. Mastering FreeBSD and OpenBSD Security , by Yanek Korff , Paco Hope , Bruce Potter (Paperback, December, 2004)
  508. Mastering Mambo : E-Commerce, Templates, Module Development, SEO, Security, and Performance , by Tobias Hauser , Christian Wenz (Paperback, 01 December, 2005)
  509. Mastering Network Security , by Chris Brenton , Cameron Hunt (Paperback, 07 October, 2002)
  510. Mastering SQL Server 2000 Security (Gearhead Press--In the Trenches) , by Mike Young , Curtis W. Young (Paperback, 30 August, 2002)
  511. Mastering the AS/400 : A Practical Hands-On Guide, Third Edition , by Jerry Fottral (Paperback, June, 2000)
  512. Mastering Web Services Security , by Bret Hartman , Donald J. Flinn , Konstantin Beznosov , Shirley Kawamoto , Bret Hartman , Donald J. Flinn , Konstantin Beznosov , Shirley Kawamoto (Paperback, 06 January, 2003)
  513. Mastering Windows Network Forensics and Investigation (Mastering) - Steven Anson (2007-04-02, Paperback)
  514. Maximum Apache Security , by Anonymous (Paperback, 15 June, 2002)
  515. Maximum Mac OS X Security , by John Ray , Will Ray (Paperback, 13 May, 2003)
  516. Maximum PC Guide to Extreme PC Mods (Maximum PC Guide To...) , by Paul Capello , Jon Phillips (Paperback, 21 December, 2004)
  517. MCAD/MCSD Self-Paced Training Kit : Implementing Security for Applications with Microsoft Visual Basic .NET and Microsoft Visual C# .NET (Pro-Certification) , by Anthony Northrup (Hardcover, 08 September, 2004)
  518. MCSA/MCSE : Windows 2000 Network Security Administration Study Guide (70-214) , by Bill English , Russ Kaufman , Russ Kaufmann (Hardcover, 05 May, 2003)
  519. MCSA/MCSE 70-299 Exam Cram 2 : Implementing and Administering Security in a Windows 2003 Network (Exam Cram 2) , by Bill Ferguson , Don Poulton , Diane Barrett (Paperback, 19 May, 2004)
  520. MCSA/MCSE Implementing and Administering Security in a Windows 2000 Network Exam Cram 2 (Exam Cram 70-214) , by Roberta Bragg (Paperback, 19 May, 2003)
  521. MCSA/MCSE Self-Paced Training Kit (Exam 70-299) : Implementing and Administering Security in a Microsoft Windows Server 2003 Network (Pro-Certification) - Tony Northrup (2004-04-21, Hardcover)
  522. MCSA/MCSE Self-Paced Training Kit (Exam 70-350) : Implementing Microsoft Internet Security and Acceleration Server 2004 (Pro-Certification) - Stan Reimer (2005-04-13, Hardcover)
  523. MCSA/MCSE Self-Paced Training Kit : Implementing and Managing Security in a Microsoft Windows 2000 Network Infrastructure, Exam 70-214 , by Microsoft Corporation , Matthew Strebe , Microsoft Corporation (Hardcover, 12 February, 2003)
  524. MCSE : ISA Server 2000 Administration Study Guide : Exam 70 227 with CDROM , by William Heldman (Hardcover, 15 November, 2001)
  525. MCSE : Windows Server 2003 Network Security Design Study Guide (70-298) , by Brian Reisman , Mitch Ruebush , Sybex (Paperback, 19 May, 2004)
  526. MCSE Core Elective Exams in a Nutshell : Covers exams 70-270, 70-297, and 70-298 (In a Nutshell (O'Reilly)) , by Pawan K. Bhardwaj , Roger Grimes (Paperback, 01 November, 2006)
  527. MCSE Designing Security for a Microsoft Windows Server 2003 Network Exam Cram 2 (Exam Cram 70-298) , by Ed Tittel , Bill Ferguson (Paperback, 12 November, 2003)
  528. MCSE Designing Security for a Windows Server 2003 Network : Exam 70-298 , by Elias Khasner , Laura E. Hunter (Hardcover, 01 February, 2004)
  529. MCSE Self-Paced Training Kit (Exam 70-298) : Designing Security for a Microsoft Windows Server 2003 Network (Training Kit) - Roberta Bragg (2004-02-04, Hardcover)
  530. MCSE Training Guide (70-220) : Windows 2000 Network Security Design, Second Edition , by Roberta Bragg (Paperback, 14 October, 2002)
  531. MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network : Study Guide and DVD Training System (Exam 70-214) , by Will Schmied , Thomas W. Shinder (Hardcover, February, 2003)
  532. MESA and Trading Market Cycles : Forecasting and Trading Strategies from the Creator of MESA, 2nd Edition , by John F. Ehlers (Hardcover, 04 January, 2002)
  533. Microsoft Encyclopedia of Security , by Mitch Tulloch (Paperback, 16 July, 2003)
  534. Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant (Pro-Administrator's Pocket Consultant) , by Bud Ratliff , Jason Ballard (Paperback, 11 January, 2006)
  535. Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed , by Michael Noel (Paperback, 24 August, 2005)
  536. Microsoft ISA Configuration and Administration , by Curt Simmons (Paperback, 01 May, 2001)
  537. Microsoft ISA Server 2000 , by Zubair Alexander (Paperback, 05 December, 2001)
  538. Microsoft ISA Server 2006 Unleashed - Michael Noel (2007-12-05, Paperback)
  539. Microsoft Log Parser Toolkit , by Gabriele Giuseppini , Mark Burnett , Jeremy Faircloth , Dave Kleiman (Paperback, 10 February, 2005)
  540. Microsoft Office 2004 for Mac in a Snap (Sams Teach Yourself) - Richard H. Baker (2004-08-12, Paperback)
  541. Microsoft Windows Security Resource Kit, Second Edition (Resource Kit) , by Ben Smith , Brian Komar , The Microsoft Security Team (Paperback, 27 April, 2005)
  542. Microsoft Windows Server 2003 PKI and Certificate Security (Pro - One-Offs) - Brian Komar (2004-07-07, Paperback)
  543. Microsoft Windows XP Networking and Security Inside Out : Also Covers Windows 2000 (Inside Out) - Ed Bott (2005-09-28, Paperback)
  544. Mike Meyers' CISSP(R) Certification Passport - Shon Harris (2002-10-17, Paperback)
  545. Mike Meyers' Security+ Certification Passport (Passport) , by Trevor Kay (Paperback, 06 January, 2003)
  546. Mind Hacks : Tips & Tricks for Using Your Brain (Hacks) - Tom Stafford (2004-11-22, Paperback)
  547. Minoli-Cordovana's Authoritative Computer & Network Security Dictionary , by Daniel Minoli , James Cordovana (Paperback, ..)
  548. Mission-Critical Active Directory : Architecting a Secure and Scalable Infrastructure , by Micky Balladelli , Jan De Clercq (Paperback, 01 March, 2001)
  549. Mission-Critical Security Planner : When Hackers Won't Take No for an Answer , by Eric Greenberg , Eric Greenberg (Paperback, January, 2003)
  550. Modeling Derivatives Applications in Matlab, C++, and Excel - Justin London (2006-12-18, Hardcover)
  551. Modeling Derivatives in C++ (Wiley Finance) , by Justin London (Paperback, 17 September, 2004)
  552. Modeling Maximum Trading Profits with C++ : New Trading and Money Management Concepts (Wiley Trading) , by Valerii Salov (Paperback, 02 February, 2007)
  553. Modern Cryptography : Theory and Practice , by Wenbo Mao (Hardcover, 25 July, 2003)
  554. Multiple Streams of Internet Income , by Robert G. Allen (Hardcover, 15 March, 2001)
  555. Murder in the Sentier- P , by Cara Black (Paperback, April, 2003)
  556. My Job Went to India : 52 Ways to Save Your Job (Pragmatic Programmers) , by Chad Fowler (Paperback, 19 September, 2005)
  557. MySpace Maxed Out : Explode Your Popularity, Buzz Your Band and Secure Your Privacy on MySpace , by Editors of BottleTree Books LLC (Paperback, 14 November, 2006)
  558. Nagios : System and Network Monitoring , by Wolfgang Barth (Paperback, 30 May, 2006)
  559. Necessary But Not Sufficient - Eliyahu M. Goldratt (2000-10, Paperback)
  560. Nessus Network Auditing (Jay Beale's Open Source Security) (Jay Beale's Open Source Security) , by Renaud Deraison , Noam Rathaus , HD Moore , Raven Alder , George Theall , Andy Johnston , Jimmy Alderson (Paperback, 01 September, 2004)
  561. Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security) (Jay Beale's Open Source Security) , by Neil Archibald , Gilbert Ramirez , Noam Rathaus , Josh Burke , Brian Caswell , Renaud Deraison (Paperback, 01 June, 2005)
  562. Network Intrusion Detection (3rd Edition) - Stephen Northcutt (2002-08-27, Paperback)
  563. Network Security : A Beginner's Guide, Second Edition (Beginner's Guide) , by Eric Maiwald (Paperback, 28 May, 2003)
  564. Network Security : A Hacker's Perspective , by Ankit Fadia (Paperback, 18 December, 2002)
  565. Network Security : Private Communication in a Public World, Second Edition - Charlie Kaufman (2002-04-15, Hardcover)
  566. Network Security : The Complete Reference - Mark Rhodes-Ousley (2003-11-17, Paperback)
  567. Network Security 1 and 2 Companion Guide (Cisco Networking Academy Program) (Companion Guide) , by Antoon Rufi (Hardcover, 05 October, 2006)
  568. Network Security Architectures - Sean Convery (2004-04-19, Hardcover)
  569. Network Security Assessment : Know Your Network , by Chris McNab (Paperback, 01 March, 2004)
  570. Network Security Bible , by Eric Cole , Ronald L. Krutz , James Conley (Paperback, 13 January, 2005)
  571. Network Security Essentials : Applications and Standards (3rd Edition) - William Stallings (2006-07-19, Paperback)
  572. Network Security First-Step (First-Step) , by Thomas M. Thomas (Paperback, 21 May, 2004)
  573. Network Security for Dummies - Chey Cobb (2002-10-10, Paperback)
  574. Network Security Foundations , by Matthew Strebe (Paperback, 05 September, 2004)
  575. Network Security Fundamentals , by Gert DeLaet , Gert Schauwers (Paperback, 08 September, 2004)
  576. Network Security Hacks , by Andrew Lockhart (Paperback, 01 April, 2004)
  577. Network Security Hacks : Tips & Tools for Protecting Your Privacy (Hacks) , by Andrew Lockhart (Paperback, 30 October, 2006)
  578. Network Security JumpStart , by Matthew Strebe , Matthew Strebe (Paperback, 15 August, 2002)
  579. Network Security Principles and Practices (CCIE Professional Development) , by Saadat Malik (Hardcover, 15 November, 2002)
  580. Network Security Tools , by Nitesh Dhanjani , Justin Clarke (Paperback, 05 April, 2005)
  581. Network Security with OpenSSL - John Viega (2002-06-15, Paperback)
  582. Network Service Investment Guide : Maximizing ROI in Uncertain Times (Networking Council) , by Mark Gaynor , Mark Gaynor (Paperback, 03 January, 2003)
  583. Network Warrior - Gary Donahue (2007-06-21, Paperback)
  584. Network+ Study Guide & Practice Exams : Exam N10-003 , by Robert J Shimonski , Laura E Hunter , Norris L Johnson (Paperback, ..)
  585. Networks and Netwars : The Future of Terror, Crime, and Militancy - John Arquilla (2002-01-25, Paperback)
  586. Neural Networks in Finance : Gaining Predictive Edge in the Market (Academic Press Advanced Finance Series) , by Paul D. McNelis (Hardcover, 22 December, 2004)
  587. NHibernate in Action , by Pierre Kuate , Christian Bauer , Gavin King (Paperback, 01 July, 2007)
  588. Nokia Network Security Solutions Handbook , by Doug Maxwell (Paperback, October, 2002)
  589. Non-Repudiation in Electronic Commerce , by Jianying Zhou (Hardcover, 15 August, 2001)
  590. Nortel Guide to VPN Routing for Security and VoIP , by James Edwards , Richard Bramante , Al Martin (Hardcover, 14 August, 2006)
  591. Norton All-In-One Desk Reference For Dummies (For Dummies (Computer/Tech)) , by Kate J. Chase (Paperback, 01 April, 2005)
  592. Norton Internet Security For Dummies , by Greg Holden (Paperback, 27 September, 2004)
  593. Novell's BorderManager Administrator's Handbook , by Laura Y. Pan (Paperback, September, 1999)
  594. Official (ISC)2 Guide to the CISSP-ISSEP CBK , by CISSP, Susan Hansche (Hardcover, 01 January, 2005)
  595. Official (ISC)2 Guide to the CISSP CBK ((Isc)2 Press Series) - (2006-11-14, Hardcover)
  596. Official (ISC)2 Guide to the SSCP CBK ((Isc)2 Press) , by Diana-Lynn Contesti , Douglas Andre , Eric Waxvik , Paul A. Henry , Bonnie A. Goins (Hardcover, 27 April, 2007)
  597. Online Investing Hacks : 100 Industrial-Strength Tips & Tools (Hacks) , by Bonnie Biafore (Paperback, 17 June, 2004)
  598. Online Marketing Success Stories : Insider Secrets, from the Experts Who Are Making Millions on the Internet Today - Rene V. Richards (2006-09-12, Paperback)
  599. Open Networks, Closed Regimes : The Impact of the Internet on Authoritarian Rule , by Shanthi Kalathil , Taylor C. Boas (Paperback, 01 January, 2003)
  600. Open Source Security Tools : Practical Guide to Security Applications, A (Bruce Perens Open Source) , by Tony Howlett (Paperback, 29 July, 2004)
  601. OpenVPN : Building and Integrating Virtual Private Networks , by M Feilner (Paperback, 14 February, 2006)
  602. Optimizing and Securing Cisco AVVID Applications , by Kelly McGrew , Kelly McGrew (Paperback, 13 December, 2002)
  603. Options Trading for the Conservative Investor : Increasing Profits Without Increasing Your Risk (Financial Times Prentice Hall Books) - Michael C. Thomsett (2005-05-13, Hardcover)
  604. Oracle Privacy Security Auditing : Includes Federal Law Compliance with HIPAA, Sarbanes Oxley & The Gramm Leach Bliley Act GLB , by Arup Nanda , Donald K. Burleson (Paperback, 01 December, 2003)
  605. Oracle9i DBA Handbook - Kevin Loney (2001-11-28, Paperback)
  606. Oracle9i RMAN Backup & Recovery , by Robert G. Freeman , Matthew Hart (Paperback, 18 October, 2002)
  607. Origins of the Crash : The Great Bubble and Its Undoing - Roger Lowenstein (2004-12-28, Paperback)
  608. OS X for Hackers at Heart , by Bruce Potter , Johnny Long , Ken Caruso , Chris Hurley , Tom Owad (Paperback, 02 December, 2005)
  609. Outsourcing Information Security (Computer Security Series) , by C. Warren Axelrod (Hardcover, 30 September, 2004)
  610. Over-the-Road Wireless For Dummies (For Dummies (Computer/Tech)) , by E. Phil Haley (Paperback, 07 August, 2006)
  611. Own Your Space : Keep Yourself and Your Stuff Safe Online (Symantec Press) , by Linda McCarthy (Paperback, 12 October, 2006)
  612. Palm & Treo Hacks (Hacks) , by Scott MacHaffie (Paperback, 01 September, 2005)
  613. Payment Technologies for E-Commerce , by Weidong Kou (Hardcover, 15 February, 2003)
  614. PC Magazine Fighting Spyware, Viruses, and Malware , by Ed Tittel (Paperback, 31 December, 2004)
  615. PC Magazine Windows XP Security Solutions (PC Magazine) , by Dan DiNicolo (Paperback, 05 December, 2005)
  616. PCI Compliance : Understand and Implement Effective PCI Data Security Standard Compliance - (2007-06-01, Paperback)
  617. Penetration Tester's Open Source Toolkit - Charl Van Der Walt (2005-12-23, Paperback)
  618. Penetration Testing and Network Defense (Networking Technology) , by Andrew Whitaker , Daniel Newman (Paperback, 31 October, 2005)
  619. People Who Care About You : The Support Assets (The Adding Assets Series for Kids) , by Pamela Espeland , Elizabeth Verdick (Paperback, 30 October, 2004)
  620. Perfect Passwords : Selection, Protection, Authentication , by Mark Burnett , Dave Kleiman (Paperback, 03 January, 2006)
  621. PGP & GPG : Email for the Practical Paranoid , by Michael W Lucas (Paperback, 01 April, 2006)
  622. PGP : Pretty Good Privacy , by Simson Garfinkel (Paperback, 01 November, 1994)
  623. Phishing Exposed , by Lance James (Paperback, 10 November, 2005)
  624. php|architect's Guide to PHP Security| , by Ilia Alshanetsky , Rasmus Lerdorf (Paperback, 05 September, 2005)
  625. PKI Security Solutions for the Enterprise : Solving HIPAA, E-Paper Act, and Other Compliance Issues , by Kapil Raina (Paperback, 11 April, 2003)
  626. Planning for PKI : Best Practices Guide for Deploying Public Key Infrastructure , by Russ Housley , Tim Polk , Russ Housley , Tim Polk (Paperback, 13 March, 2001)
  627. Planning for Survivable Networks , by Annlee A. Hines (Paperback, 26 July, 2002)
  628. Podcasting Hacks : Tips and Tools for Blogging Out Loud (Hacks) , by Jack Herrington (Paperback, 19 August, 2005)
  629. Policy-Based Network Management : Solutions for the Next Generation , by John Strassner (Hardcover, 25 August, 2003)
  630. Practical Cryptography - Niels Ferguson (2003-03-28, Paperback)
  631. Practical Intrusion Detection Handbook , by Paul E. Proctor (Hardcover, August, 2000)
  632. Practical Packet Analysis : Using Wireshark to Solve Real-World Network Problems - Chris Sanders (2007-05-23, Paperback)
  633. Practical VoIP Security , by Thomas Porter , Jan Kanclirz Jr. (Paperback, 30 March, 2006)
  634. Preventing Web Attacks with Apache , by Ryan C. Barnett (Paperback, 27 January, 2006)
  635. Pricing Derivative Securities : An Interactive, Dynamic Environment with Maple V and Matlab , by Eliezer Z. Prisman (Hardcover, 15 January, 2001)
  636. Primality Testing and Integer Factorization in Public-Key Cryptography (Advances in Information Security┬Ť, 11) , by Song Y. Yan (Hardcover, 01 January, 2004)
  637. Principles and Practice of Information Security , by Linda Volonino , Stephen R. Robinson (Paperback, 02 September, 2003)
  638. Principles of Computer Security : Security and Beyond - Wm. Arthur Conklin (2004-03-24, Paperback)
  639. Principles of Incident Response and Disaster Recovery , by Michael E. Whitman , Herbert J. Mattord (Paperback, 29 March, 2006)
  640. Principles of Information Security - Michael E. Whitman (2004-11-23, Paperback)
  641. Principles of Secure Network Systems Design , by Sumit Ghosh (Hardcover, 15 December, 2001)
  642. Privacy on the Line : The Politics of Wiretapping and Encryption , by Whitfield Diffie , Susan Landau (Paperback, 26 February, 1999)
  643. Privacy on the Line : The Politics of Wiretapping and Encryption, Updated and Expanded Edition - Whitfield Diffie (2007-05-31, Hardcover)
  644. Pro Apache, Third Edition (Expert's Voice) - Peter Wainwright (2004-01-19, Paperback)
  645. Pro PHP Security , by Chris Snyder , Michael Southwell (Paperback, 29 August, 2005)
  646. Professional ASP.NET 2.0 Security, Membership, and Role Management (Wrox Professional Guides) - Stefan Schackow (2006-01-31, Paperback)
  647. Professional Electronic Trading , by David James Norman , David James Norman (Hardcover, 15 June, 2002)
  648. Professional Pen Testing for Web Applications (Programmer to Programmer) , by Andres Andreu (Paperback, 05 July, 2006)
  649. Professional Rootkits (Programmer to Programmer) , by Ric Vieler (Paperback, 12 March, 2007)
  650. Professional Windows Desktop and Server Hardening (Programmer to Programmer) , by Roger A. Grimes (Paperback, ..)
  651. Programming .NET Components, 2nd Edition - Juval Lowy (2005-07-27, Paperback)
  652. Programming .NET Security , by Adam Freeman , Allen Jones (Paperback, June, 2003)
  653. Programming .NET Web Services , by Alex Ferrara , Matthew MacDonald (Paperback, 15 October, 2002)
  654. Programming Erlang : Software for a Concurrent World - Joe Armstrong (2007-07-11, Paperback)
  655. Programming Windows Security , by Keith Brown (Paperback, 05 July, 2000)
  656. Protect Your Windows Network : From Perimeter to Data (The Addison-Wesley Microsoft Technology Series) , by Jesper M. Johansson , Steve Riley (Paperback, 20 May, 2005)
  657. Protecting Your Library's Digital Sources : The Essential Guide to Planning and Preservation , by Miriam B. Kahn , Miriam Kahn (Paperback, 01 February, 2004)
  658. Protocols for Authentication and Key Establishment , by Colin Boyd , Anish Mathuria (Hardcover, 15 June, 2003)
  659. Pseudorandomness and Cryptographic Applications (Princeton Computer Science Notes) , by Michael George Luby , Michael Luby (Paperback, 08 January, 1996)
  660. Public Key Infrastructure : Building Trusted Applications and Web Services , by John R. Vacca (Paperback, 11 May, 2004)
  661. Public Key Infrastructure and Implementation and Design , by Suranjan Choudhury , Suranijan Choudhury (Paperback, 15 January, 2002)
  662. Puzzles for Hackers , by Ivan Sklyarov (Paperback, 01 July, 2005)
  663. Radius , by Jonathan Hassell (Paperback, 08 October, 2002)
  664. Rails Cookbook (Cookbooks (O'Reilly)) , by Rob Orsini (Paperback, 01 January, 2007)
  665. Rails for Java Developers , by Stuart Halloway , Justin Gehtland (Paperback, 13 February, 2007)
  666. Real 802.11 Security : Wi-Fi Protected Access and 802.11i , by Jon Edney , William A. Arbaugh (Paperback, 15 July, 2003)
  667. Real Digital Forensics : Computer Security and Incident Response - Keith J. Jones (2005-09-23, Paperback)
  668. Real World Linux Security (2nd Edition) , by Bob Toxen (Paperback, 13 November, 2002)
  669. Real World Microsoft Access Database Protection and Security , by Garry Robinson (Paperback, 17 October, 2003)
  670. Red Hat Linux Networking and System Administration , by Terry Collings , Kurt Wall (Paperback, 21 October, 2005)
  671. Reshaping National Intelligence for an Age of Information (RAND Studies in Policy Analysis) , by Gregory F. Treverton (Paperback, 03 March, 2003)
  672. Rethinking Public Key Infrastructures and Digital Certificates : Building in Privacy , by Stefan A. Brands (Hardcover, 28 August, 2000)
  673. RFID : Applications, Security, and Privacy , by Simson Garfinkel , Beth Rosenberg (Hardcover, 06 July, 2005)
  674. RFID Security , by Frank Thornton , Chris Lathem (Paperback, 28 April, 2006)
  675. RFID+ : CompTIA RFID+ Study Guide and Practice Exam (RF0-001) , by Paul Sanghera (Paperback, 26 January, 2007)
  676. Risk Management for Computer Security : Protecting Your Network & Information Assets , by Andy Jones , Debi Ashenden (Paperback, 15 March, 2005)
  677. Role-Based Access Control, Second Edition , by David F. Ferraiolo , Richard D. Kuhn , Ramaswamy Chandramouli (Hardcover, 31 January, 2007)
  678. Rootkits : Subverting the Windows Kernel (Addison-Wesley Software Security Series) - Greg Hoglund (2005-07-22, Paperback)
  679. Rootkits for Dummies (For Dummies (Computer/Tech)) , by Larry Stevenson , Nancy Altholz (Paperback, 30 January, 2007)
  680. Rootkits, Spyware/Adware, Keyloggers and Backdoors : Detection and Neutralization , by Oleg Zaytsev (Paperback, ..)
  681. Rule the Freakin' Markets : How to Profit in Any Market, Bull or Bear , by Michael Parness , Kirstin Peterson (Paperback, 26 August, 2004)
  682. Run Your Own Web Server Using Linux & Apache , by Tony Steidler-Dennison (Paperback, 15 December, 2005)
  683. Running Linux - Matthias Dalheimer (2005-12-22, Paperback)
  684. Safety Net : Protecting Your Business on the Internet , by Kathleen Sindell (Hardcover, 15 March, 2002)
  685. Safeware : System Safety and Computers, SPHIGS Software (Paperback, ..)
  686. Sams Teach Yourself Linux Security Basics in 24 Hours (Sams Teach Yourself in 24 Hours) , by Aron Hsiao (Paperback, 13 April, 2001)
  687. Sams Teach Yourself OpenOffice.org 2, Firefox and Thunderbird for Windows All in One (Sams Teach Yourself) , by Greg Perry (Paperback, 07 July, 2005)
  688. SANS GIAC Certification : Security Essentials Toolkit (GSEC) , by Eric Cole , Mathew Newfield , John M. Millican , Stephen Northcutt (Paperback, 18 March, 2002)
  689. SAP Security : SAP Security Essentials , by Jim Stewart (Paperback, 30 December, 2005)
  690. Sarbanes-Oxley Guide for Finance and Information Technology Professionals - Sanjay Anand (2006-03-24, Hardcover)
  691. Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools , by Christian Lahti , Roderick Peterson , Steve Lanza (Paperback, 01 August, 2005)
  692. Scams & Swindles : Phishing, Spoofing, ID Theft, Nigerian Advance Schemes Investment Frauds : How to Recognize And Avoid Rip-Offs In The Internet Age (Paperback, 30 May, 2006)
  693. Scene of the CybercrimeComputer Forensics Handbook , by Debra Littlejohn Shinder , Ed Tittel (Paperback, 10 August, 2002)
  694. Scripting VMware : Power Tools for Automating Virtual Infrastructure Administration , by Al Muller (Paperback, 31 October, 2006)
  695. Secrets and Lies : Digital Security in a Networked World - Bruce Schneier (2004-01-30, Paperback)
  696. Secrets of Computer Espionage : Tactics and Countermeasures , by Joel McNamara (Paperback, 02 June, 2003)
  697. Secure Architectures with OpenBSD , by Brandon Palmer , Jose Nazario (Paperback, 07 April, 2004)
  698. Secure Coding : Principles and Practices , by Mark G. Graff , Kenneth R. Van Wyk (Paperback, July, 2003)
  699. Secure Coding in C and C++ (SEI Series in Software Engineering) , by Robert C. Seacord (Paperback, 09 September, 2005)
  700. Secure Electronic Commerce : Building the Infrastructure for Digital Signatures and Encryption (2nd Edition) , by Warwick Ford , Michael S. Baum (Paperback, 04 December, 2000)
  701. Secure Messaging with Microsoft Exchange Server 2000 , by Paul Robichaux (Paperback, 05 February, 2003)
  702. Secure Messaging with Microsoft Exchange Server 2003 , by Paul Robichaux (Paperback, 14 April, 2004)
  703. Secure PHP Development : Building 50 Practical Applications , by Mohammed J. Kabir , Mohammed J. Kabir (Paperback, 15 March, 2003)
  704. Secure Programming Cookbook for C and C++ : Recipes for Cryptography, Authentication, Input Validation & More , by John Viega , Matt Messier (Paperback, 14 July, 2003)
  705. Secure Programming with Static Analysis (Addison-Wesley Software Security Series) - Brian Chess (2007-06-29, Paperback)
  706. Secure Shell in the Enterprise , by Jason Reid (Paperback, 12 June, 2003)
  707. Secured Computing : A CISSP Study Guide , by Carl F. Endorf , Chad Johnson (Paperback, 01 August, 2001)
  708. Securing E-Business Systems : A Guide for Managers and Executives , by Timothy Braithwaite (Hardcover, 12 April, 2002)
  709. Securing IM and P2P Applications for the Enterprise , by Paul Piccard , Brian Baskin , George Spillman , Marcus Sachs (Paperback, 30 November, 2005)
  710. Securing Storage : A Practical Guide to SAN and NAS Security , by Himanshu Dwivedi (Hardcover, 11 November, 2005)
  711. Securing Systems with the Solaris Toolkit , by Alex Noordergraaf , Glenn Brunette (Paperback, 27 June, 2003)
  712. Securing the Network from Malicious Code : A Complete Guide to Defending Against Viruses, Worms, and Trojans , by Douglas Schweitzer (Paperback, 19 September, 2002)
  713. Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption , by Jothy Rosenberg , David Remy (Paperback, 12 May, 2004)
  714. Securing Windows NT/2000 Servers for the Internet , by Stefan Norberg (Paperback, November, 2000)
  715. Securing Windows Server 2003 , by Mike Danseglio (Paperback, 12 November, 2004)
  716. Securing Your Business with Cisco ASA and PIX Firewalls (Networking Technology) , by Greg Abelar (Paperback, 27 May, 2005)
  717. Security Administrator Street Smarts : A Real World Guide to CompTIA Security+ Skills , by Michael Gregg , David Miller (Paperback, 05 February, 2007)
  718. Security Analysis , by Sidney Cottle , Roger F. Murray , Frank E. Block (Hardcover, 01 January, 1988)
  719. Security Analysis : The Classic 1934 Edition , by Benjamin Graham , David Dodd (Hardcover, 01 October, 1996)
  720. Security and Usability : Designing Secure Systems That People Can Use , by Lorrie Faith Cranor , Simson Garfinkel (Paperback, 25 August, 2005)
  721. Security Assessment : Case Studies for Implementing the NSA IAM , by Russ Rogers , Greg Miles , Ed Fuller , Ted Dykstra (Paperback, 01 January, 2004)
  722. Security Awareness : Applying Practical Security in Your World - Mark Ciampa (2006-02-07, Paperback)
  723. Security Complete , by Sybex Inc , Sybex Inc (Paperback, 12 September, 2002)
  724. Security Controls for Sarbanes-Oxley Section 404 IT Compliance : Authorization, Authentication, and Access , by Dennis C. Brewer (Paperback, 21 October, 2005)
  725. Security Engineering : A Guide to Building Dependable Distributed Systems - Ross J. Anderson (2001-01-22, Paperback)
  726. Security for Microsoft Visual Basic .NET , by Ed Robinson , Michael James Bond (Paperback, 28 May, 2003)
  727. Security in Computing (4th Edition) - Charles P. Pfleeger (2006-10-13, Hardcover)
  728. Security in Computing, Third Edition , by Charles P. Pfleeger , Shari Lawrence Pfleeger (Hardcover, 02 December, 2002)
  729. Security In Distributed Computing : Did You Lock the Door? , by Glen Bruce , Rob Dempsey (Paperback, 09 October, 1996)
  730. Security Management (It Infrastructure Library Series) , by Jacques A. Cazemier , Paul L. Overbeek , Louk M. Peters (Paperback, March, 2000)
  731. Security Management : An Introduction (2nd Edition) , by P. J. Ortmeier (Paperback, ..)
  732. Security Metrics : Replacing Fear, Uncertainty, and Doubt - Andrew Jaquith (2007-03-26, Paperback)
  733. Security Monitoring with Cisco Security MARS (Networking Technology : Security) - Gary Halleen (2007-07-06, Paperback)
  734. Security Patterns : Integrating Security and Systems Engineering (Wiley Software Patterns Series) , by Markus Schumacher , Eduardo Fernandez-Buglioni , Duane Hybertson , Frank Buschmann , Peter Sommerlad (Hardcover, 10 March, 2006)
  735. Security Policies and Procedures : Principles and Practices (Prentice Hall Security Series) - Sari Greene (2005-07-18, Paperback)
  736. Security Power Tools - Bryan Burns (2007-08-27, Paperback)
  737. Security Sage's Guide to Hardening the Network Infrastructure , by Erik Pace Birkholz , Brian Kenyon , Steven Andres (Paperback, 01 March, 2004)
  738. Security Threat Mitigation and Response : Understanding Cisco Security MARS (Networking Technology) , by Dale Tesch , Greg Abelar (Paperback, 28 September, 2006)
  739. Security Warrior - Cyrus Peikari (2004-02-01, Paperback)
  740. Security, ID Systems and Locks : The Book on Electronic Access Control , by Joel Konicek , Karen Little (Paperback, 17 April, 1997)
  741. Security+ Certification All-in-One Exam Guide - Gregory White (2003-06-27, Hardcover)
  742. Security+ Certification for Dummies , by Lawrence H. Miller , Peter H. Gregory (Paperback, 17 February, 2003)
  743. Security+ Certification Training Kit - Microsoft Corporation (2003-01-29, Hardcover)
  744. Security+ Exam Cram 2 (Exam Cram SYO-101) , by Kirk Hausman , Diane Barrett , Martin Weiss , Ed Tittel (Paperback, 10 April, 2003)
  745. Security+ Guide to Networking Security Fundamentals, Second Edition - Mark Ciampa (2004-10-19, Paperback)
  746. Security+ Practice Questions Exam Cram 2 (Exam SYO-101) (Exam Cram 2) , by Hans B. Sparbel , Ed Tittel (Paperback, 09 March, 2004)
  747. Security+ Prep Guide , by Ronald L. Krutz , Russell Dean Vines (Paperback, 03 March, 2003)
  748. Security+ Study Guide , by Ido Dubrawsky , Jeremy Faircloth , Michael Gregg , Eli Faskha (Paperback, 27 May, 2007)
  749. Security+ Training Guide , by Todd King , Ed Tittel , David Bittlingmeier (Paperback, 27 March, 2003)
  750. Security+Fast Pass , by James Michael Stewart (Paperback, 19 October, 2004)
  751. SELinux : NSA's Open Source Security Enhanced Linux , by Bill McCarty (Paperback, 11 October, 2004)
  752. SELinux by Example : Using Security Enhanced Linux (Prentice Hall Open Source Software Development Series) , by Frank Mayer , Karl MacMillan , David Caplan (Paperback, 27 July, 2006)
  753. sendmail Milters : A Guide for Fighting Spam , by Bryan Costales , Marcia Flynt (Paperback, 24 January, 2005)
  754. Series 7 Securities Licensing Exam Review Exam Cram (Exam Cram 2) - Richard P. Majka (2005-12-20, Paperback)
  755. Series 7 Securities Licensing Review Questions Exam Cram (Exam Cram) , by Richard P. Majka (Paperback, 09 December, 2004)
  756. Silence on the Wire : A Field Guide to Passive Reconnaissance and Indirect Attacks - Michal Zalewski (2005-04-15, Paperback)
  757. Skype Me! : From Single User to Small Enterprise and Beyond , by Michael Gough , Bill Campbell , Joshua Brashars , Dan Douglass (Paperback, 01 July, 2005)
  758. Slamming Spam : A Guide for System Administrators , by Robert Haskins , Dale Nielsen (Paperback, 20 December, 2004)
  759. Smart Home Hacks : Tips & Tools for Automating Your House (Hacks) , by Gordon Meyer (Paperback, 25 October, 2004)
  760. Smarter Trading : Improving Performance in Changing Markets , by Perry Kaufman (Hardcover, 01 January, 1995)
  761. Snort 2.0 Intrusion Detection , by Brian Caswell , Jay Beale , James C. Foster , Jeremy Faircloth (Paperback, February, 2003)
  762. Snort 2.1 Intrusion Detection, Second Edition , by Jay Beale , Caswell (Paperback, May, 2004)
  763. Snort Cookbook , by Angela Orebaugh , Simon Biles , Jacob Babbin (Paperback, 29 March, 2005)
  764. Snort for Dummies , by Charlie Scott , Paul Wolfe , Bert Hayes (Paperback, 09 July, 2004)
  765. Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security) - Brian Caswell (2007-02-01, Paperback)
  766. SOA in Practice : The Art of Distributed System Design (Theory in Practice) - Nicolai M. Josuttis (2007-08-24, Paperback)
  767. Sockets, Shellcode, Porting, & Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals , by James C. Foster , Stuart McClure (Paperback, 12 April, 2005)
  768. Software Security : Building Security In (Addison-Wesley Software Security Series) - Gary McGraw (2006-01-23, Paperback)
  769. Software Security Library Boxed Set, First Edition , by Gary McGraw , Greg Hoglund , John Viega (Paperback, 20 March, 2006)
  770. Software Security Technologies - Richard Sinn (2007-09-07, Paperback)
  771. Spam Kings : The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements , by Brian S. McWilliams (Hardcover, September, 2004)
  772. Spam Wars : Our Last Best Chance to Defeat Spammers, Scammers & Hackers , by Danny Goodman (Paperback, 01 November, 2004)
  773. SpamAssassin , by Alan Schwartz (Paperback, July, 2004)
  774. SpamAssassin : A Practical Guide to Integration and Configuration , by Alistair McDonald (Paperback, 30 September, 2004)
  775. Special Edition Using WordPerfect 12 (Special Edition Using) , by Laura Acklen , Read Gilgen (Paperback, 05 August, 2004)
  776. Spidering Hacks , by Kevin Hemenway , Tara Calishain (Paperback, 01 November, 2003)
  777. Spies Among Us : How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day , by Ira Winkler (Hardcover, 08 April, 2005)
  778. Spring in Action - Craig Walls (2007-08-16, Paperback)
  779. SQL Hacks , by Andrew Cumming , Gordon Russell (Paperback, 21 November, 2006)
  780. SQL Server Security , by David Litchfield (Paperback, 27 August, 2003)
  781. SSCP Study Guide and DVD Training System , by Jeffrey Posulns , Robert J. Shimonski , Jeremy Faircloth (Hardcover, ..)
  782. SSH, The Secure Shell : The Definitive Guide - Daniel J. Barrett (2005-05-10, Paperback)
  783. SSL and TLS : Designing and Building Secure Systems , by Eric Rescorla (Paperback, 13 October, 2000)
  784. Steal This Computer Book 3 : What They Won't Tell You About the Internet , by Wallace Wang (Paperback, May, 2003)
  785. Steal This Computer Book 4.0 : What They Won't Tell You About the Internet - Wallace Wang (2006-04-15, Paperback)
  786. Stealing the Network : How to Own a Continent , by FX , Paul Craig , Joe Grand , Tim Mullen , Fyodor , Ryan Russell , Jay Beale (Paperback, May, 2004)
  787. Stealing the Network : How to Own a Shadow (Stealing the Network) (Stealing the Network) , by Johnny Long , Tim Mullen , Ryan Russell (Paperback, 26 January, 2007)
  788. Stealing the Network : How to Own an Identity (Stealing the Network) , by Raven Alder , Chris Hurley , Tom Parker , Ryan Russell , Jay Beale , Riley Eller , Brian Hatch , Jeff Moss (Paperback, 01 August, 2005)
  789. Stealing the Network : How to Own the Box , by Ryan Russell , Ido Dubrawsky , FX , Joe Grand , Tim Mullen (Paperback, 01 April, 2003)
  790. Stealing Your Life : The Ultimate Identity Theft Prevention Plan - Frank W. Abagnale (2007-04-24, Hardcover)
  791. Storage Security : Protecting, SANs, NAS and DAS , by John Chirillo , Scott Blaul (Paperback, 20 December, 2002)
  792. Strategic Information Security , by John Wylder (Hardcover, 01 November, 2003)
  793. Sun Certified Security Administrator for Solaris 10 Study Guide (Exam CX-XXX) , by John Chirillo , Edgar Danielyan (Paperback, 23 December, 2004)
  794. Super Searchers on Wall Street : Top Investment Professionals Share Their Online Research Secrets , by Amelia Kassel , Reva Basch (Paperback, 15 January, 2000)
  795. Swing Hacks : Tips and Tools for Killer GUIs (Hacks) - Joshua Marinacci (2005-06-30, Paperback)
  796. Teach Yourself Investing Online , by Thomas S. Gray , Claire Mencke (Paperback, 10 January, 2000)
  797. Technical Trading Online (Wiley Online Trading for a Living Series) , by Jerold Roth , Trader X (Hardcover, ..)
  798. Technology and Privacy : The New Landscape , by Philip E. Agre , Marc Rotenberg (Paperback, 03 July, 1998)
  799. Terror on the Internet : The New Arena, the New Challenges , by Gabriel Weimann (Hardcover, March, 2006)
  800. Testing Web Security : Assessing the Security of Web Sites and Applications , by Steven Splaine (Paperback, 11 October, 2002)
  801. The .NET Developer's Guide to Windows Security (Microsoft .NET Development Series) , by Keith Brown (Paperback, 27 September, 2004)
  802. The Art of Computer Virus Research and Defense (Symantec Press) , by Peter Szor (Paperback, 03 February, 2005)
  803. The Art of Deception : Controlling the Human Element of Security - Kevin D. Mitnick (2003-10-17, Paperback)
  804. The Art of Deception : Controlling the Human Element of Security , by Kevin D. Mitnick , William L. Simon , Steve Wozniak (Hardcover, 04 October, 2002)
  805. The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers - Kevin D. Mitnick (2005-12-27, Paperback)
  806. The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , by Kevin D. Mitnick , William L. Simon (Hardcover, 04 March, 2005)
  807. The Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities - Mark Dowd (2006-11-20, Paperback)
  808. The Art of Software Security Testing : Identifying Software Security Flaws (Symantec Press) , by Chris Wysopal , Lucas Nelson , Dino Dai Zovi , Elfriede Dustin (Paperback, 17 November, 2006)
  809. The Best Damn Cisco Internetworking Book Period , by Charles Riley (Paperback, July, 2003)
  810. The Best Damn Firewall Book Period , by Cherie Amon , Thomas W. Shinder , Anne Carasik-Henmi (Paperback, June, 2003)
  811. The Best Damn Windows Server 2003 Book Period (Computer Security) - Susan Snedaker (2004-06-15, Paperback)
  812. The CERT Guide to System and Network Security Practices , by Julia H. Allen (Paperback, 07 June, 2001)
  813. The CISA Prep Guide : Mastering the Certified Information Systems Auditor Exam , by John Kramer , John B. Kramer (Paperback, 07 February, 2003)
  814. The CISM Prep Guide : Mastering the Five Domains of Information Security Management , by Ronald L. Krutz , Russell Dean Vines (Paperback, 30 May, 2003)
  815. The Ciso Handbook : A Practical Guide to Securing Your Company , by Michael Gentile , Ron Collette , Thomas D. August (Hardcover, 24 August, 2005)
  816. The CISSP and CAP Prep Guide : Platinum Edition - Ronald L. Krutz (2006-11-06, Hardcover)
  817. The CISSP Prep Guide : Gold Edition - Ronald L. Krutz (2002-10-31, Hardcover)
  818. The Code Book : The Science of Secrecy from Ancient Egypt to Quantum Cryptography - Simon Singh (2000-08-29, Paperback)
  819. The Compleat Guide to Day Trading Stocks , by Jake Bernstein (Hardcover, 30 August, 2000)
  820. The Complete Book of Electronic Security , by Bill Phillips (Hardcover, 11 October, 2001)
  821. The Complete Cisco VPN Configuration Guide (Networking Technology) - Richard Deal (2005-12-15, Paperback)
  822. The Complete Guide for CPP Examination Preparation , by CPP, James P. Muuss , CPP, David Rabern (Hardcover, 06 June, 2006)
  823. The Complete Guide to Online Stock Market Investing , by Alexander Davidson (Paperback, 01 March, 2007)
  824. The CSS Anthology : 101 Essential Tips, Tricks, and Hacks , by Rachel Andrew (Paperback, 01 November, 2004)
  825. The Cuckoo's Egg : Tracking a Spy Through the Maze of Computer Espionage - Cliff Stoll (2005-09-13, Paperback)
  826. The Database Hacker's Handbook : Defending Database Servers , by David Litchfield , Chris Anley , John Heasman , Bill Grindlay (Paperback, 14 July, 2005)
  827. The Day Trader's Survival Guide : How to Be Consistently Profitable in Short-Term Markets , by Christopher A. Farrell (Hardcover, 01 November, 2000)
  828. The Definitive Guide to Apache mod_rewrite (Definitive Guide) , by Rich Bowen (Hardcover, 08 February, 2006)
  829. The Design of Rijndael : AES - The Advanced Encryption Standard (Information Security and Cryptography) , by Joan Daemen , Vincent Rijmen (Hardcover, 15 February, 2002)
  830. The Digital Person : Technology and Privacy in the Information Age , by Daniel J. Solove (Paperback, 01 September, 2006)
  831. The Electronic Day Trader : Successful Strategies for On-line Trading , by George West (Paperback, 24 August, 2000)
  832. The Executive Guide to Information Security : Threats, Challenges, and Solutions (Symantec Press) , by Mark Egan , Tim Mather (Paperback, 30 November, 2004)
  833. The Expert Guide to PeopleSoft Security , by Jason Carter (Paperback, 14 July, 2004)
  834. The Fix Guide , by FIX Protocol Ltd. (Paperback, 07 January, 2005)
  835. The Fugitive Game : Online with Kevin Mitnick , by Jonathan Littman (Paperback, 01 January, 1997)
  836. The Fundamentals of Network Security , by John E. Canavan (Hardcover, 15 February, 2001)
  837. The Good the Spam and the Ugly , by Steve H. Graham (Paperback, 01 March, 2007)
  838. The GSEC Prep Guide : Mastering SANS GIAC Security Essentials , by Mike Chapple (Paperback, 16 June, 2003)
  839. The Hacker's Handbook : The Strategy Behind Breaking into and Defending Networks , by Susan Young , Dave Aitel (Hardcover, 24 November, 2003)
  840. The Hacker Crackdown : Law And Disorder On The Electronic Frontier , by Bruce Sterling (Mass Market Paperback, 01 November, 1993)
  841. The Hacker Diaries : Confessions of Teenage Hackers , by Dan Verton (Hardcover, 26 March, 2002)
  842. The Information Systems Security Officer's Guide : Establishing and Managing an Information Protection Program, Second Edition , by Gerald L. Kovacich (Paperback, ..)
  843. The Internet Security Guidebook : From Planning to Deployment , by Juanita Ellis , Tim Speed , William P. Crowell (Paperback, 15 February, 2001)
  844. The Joy of SOX : Why Sarbanes-Oxley and Services Oriented Architecture May Be the Best Thing That Ever Happened to You - Hugh Taylor (2006-04-03, Paperback)
  845. The Labyrinth Key , by HOWARD V. HENDRIX (Paperback, 30 March, 2004)
  846. The Little Black Book of Computer Security , by Joel Dubin (Paperback, July, 2005)
  847. The Manager's Handbook for Corporate Security : Establishing and Managing a Successful Assets Protection Program, First Edition , by Gerald L. Kovacich , Edward Halibozek (Hardcover, 30 December, 2002)
  848. The Masters of Deception : Gang That Ruled Cyberspace, The , by Michele Slatalla (Paperback, 10 January, 1996)
  849. The Mezonic Agenda : Hacking the Presidency , by Dr. Herbert Thompson , Spyros Nomikos (Paperback, 30 October, 2004)
  850. The Myth of Homeland Security , by Marcus Ranum (Hardcover, 17 October, 2003)
  851. The Nasdaq Trader's Toolkit , by M. Rogan LaBier (Hardcover, 15 December, 2000)
  852. The New Craft of Intelligence : Personal, Public, & Political--Citizen's Action Handbook for Fighting Terrorism, Genocide, Disease, Toxic Bombs, & Corruption , by Robert David Steele (Hardcover, 08 April, 2002)
  853. The New Hacker's Dictionary - 3rd Edition , by Eric S. Raymond (Paperback, 11 October, 1996)
  854. The OpenBSD PF Packet Filter Book , by Jeremy, C. Reed (Paperback, 18 August, 2006)
  855. The Option Advisor : Wealth-Building Techniques Using Equity & Index Options (A Marketplace Book) , by Bernie Schaeffer (Hardcover, October, 1997)
  856. The Oracle Hacker's Handbook : Hacking and Defending Oracle - David Litchfield (2007-01-30, Paperback)
  857. The Outlook Answer Book : Useful Tips, Tricks, and Hacks for Microsoft Outlook(R) 2003 , by Tom Archer , Brian Delahunty (Paperback, 30 August, 2005)
  858. The Physics of Quantum Information : Quantum Cryptography, Quantum Teleportation, Quantum Computation , by Dirk Bouwmeester , Artur K. Ekert , Anton Zeilinger (Hardcover, 16 June, 2000)
  859. The Practical Guide to HIPAA Privacy and Security Compliance , by Kevin Beaver , Rebecca Herold (Hardcover, 24 November, 2003)
  860. The Practice of Network Security : Deployment Strategies for Production Environments , by Allan Liska (Hardcover, 26 December, 2002)
  861. The Process of Network Security , by Thomas A. Wadlow (Paperback, 02 March, 2000)
  862. The Savage Truth On Money , by Terry Savage (Paperback, 18 May, 2001)
  863. The Security Development Lifecycle , by Michael Howard , Steve Lipner (Paperback, 28 June, 2006)
  864. The Security Risk Assessment Handbook : A Complete Guide for Performing Security Risk Assessments - Douglas J. Landoll (2005-12-12, Hardcover)
  865. The Security+ Exam Guide (Testtaker's Guide Series) , by Christopher A. Crayton (Paperback, 18 February, 2003)
  866. The Shellcoder's Handbook : Discovering and Exploiting Security Holes - Chris Anley (2007-08-20, Paperback)
  867. The Shellcoder's Handbook : Discovering and Exploiting Security Holes , by Jack Koziol , David Litchfield , Dave Aitel , Chris Anley , Sinan noir Eren , Neel Mehta , Riley Hassell (Paperback, 02 April, 2004)
  868. The Software Vulnerability Guide (Programming Series) (Programming Series) , by Herbert H Thompson , Scott G Chase (Paperback, 03 June, 2005)
  869. The SSCP Prep Guide : Mastering the Seven Key Areas of System Security , by Debra S. Isaac , Michael J. Isaac (Paperback, 11 April, 2003)
  870. The Tao of Network Security Monitoring : Beyond Intrusion Detection - Richard Bejtlich (2004-07-12, Paperback)
  871. The Total CISSP Exam Prep Book : Practice Questions, Answers, and Test Taking Tips and Techniques , by Thomas R. Peltier , Patrick D. Howard (Paperback, 20 June, 2002)
  872. The Transnational Dimension of Cyber Crime and Terrorism (Hoover National Security Forum Series) , by Abraham D. Sofaer , Mariano-Florentino Cuellar , Ekaterina A. Drozdova , David D. Elliott , Seymour E. Goodman , Gregory D. Grove , Stephen J. Lukasik , Tonya L. Putnam , Whiteman (Paperback, August, 2001)
  873. The Ultimate Security+ Certification Exam Cram 2 Study Kit (Exam SYO-101) (Exam Cram 2) - Que Certification (2004-03-16, Paperback)
  874. The Unofficial Guide to Ethical Hacking , by Ankit Fadia (Paperback, 02 February, 2002)
  875. The Unofficial Guide to Ethical Hacking, Second Edition , by Ankit Fadia (Paperback, 13 September, 2005)
  876. The VMWare Workstation 5 Handbook (Networking & Security) , by Steven S. Warren (Paperback, June, 2005)
  877. The Watchman : The Twisted Life and Crimes of Serial Hacker Kevin Poulsen , by Jonathan Littman (Hardcover, ..)
  878. The Web of Politics : The Internet's Impact on the American Political System , by Richard Davis (Paperback, February, 1999)
  879. The WiMAX Seminar : Triple-Play, Quadruple Play, IPTV, VoIP, IMS and Mobility for Next Generation Networks , by Frank, D. Ohrtman (Digital, ..)
  880. Threat Modeling (Microsoft Professional) , by Frank Swiderski , Window Snyder (Paperback, 14 July, 2004)
  881. To Catch a Predator : Protecting Your Kids from Online Enemies Already in Your Home - Chris Hansen (2007-03-15, Hardcover)
  882. Tools and Tactics for the Master DayTrader : Battle-Tested Techniques for Day, Swing, and Position Traders - Oliver Velez (2000-06-29, Hardcover)
  883. Trade Options Online (Wiley Online Trading for a Living) , by George A. Fontanills (Hardcover, 27 October, 2000)
  884. Trading on the Edge : Neural, Genetic, and Fuzzy Systems for Chaotic Financial Markets (Wiley Finance) , by Guido J. Deboeck (Hardcover, March, 1994)
  885. Traffic Engineering with MPLS , by Eric Osborne , Ajay Simha (Hardcover, 17 July, 2002)
  886. Transaction Processing : Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems) , by Jim Gray , Andreas Reuter (Hardcover, 1993)
  887. Trojans, Worms, and Spyware : A Computer Security Professional's Guide to Malicious Code , by Michael Erbschloe (Paperback, 16 August, 2004)
  888. Trucos Redes Inalambricas , by Rob Flickenger (Paperback, 15 September, 2003)
  889. Trust and Risk in Internet Commerce , by L. Jean Camp (Hardcover, 18 April, 2000)
  890. Ultimate Internet Outlaw : How Surfers Steal Sex, Software, Cds, Games, And More Top-Secret Stuff On The Information Superhighway , by Robert Merkle (Paperback, May, 1999)
  891. UMTS Security , by Valtteri Niemi , Kaisa Nyberg , Valtteri Niemi , Kaisa Nyberg (Hardcover, 13 March, 2003)
  892. Understanding PKI : Concepts, Standards, and Deployment Considerations, Second Edition , by Carlisle Adams , Steve Lloyd (Hardcover, 06 November, 2002)
  893. Understanding Terror Networks - Marc Sageman (2004-05-01, Hardcover)
  894. Using & Managing PPP , by Andrew Sun (Paperback, March, 1999)
  895. Using the Common Criteria for IT Security Evaluation , by Debra S. Herrmann (Paperback, 23 December, 2002)
  896. Virtual Honeypots : From Botnet Tracking to Intrusion Detection - Niels Provos (2007-07-16, Paperback)
  897. Virtual Office Tools for a High Margin Practice : How Client-Centered Financial Advisors Can Cut Paperwork, Overhead, and Wasted Hours , by David J. Drucker , Joel P. Bruckenstein (Paperback, October, 2002)
  898. Virtual Private Networks for Dummies , by Mark S. Merkow (Paperback, 15 November, 1999)
  899. Virtual Private Networks, 2nd Edition (O'Reilly Nutshell) , by Charlie Scott , Paul Wolfe , Mike Erwin (Paperback, December, 1998)
  900. Virtualization with Microsoft Virtual Server 2005 , by Rogier Dittner , David Rule , Ken Majors , Matthijs Ten Seldam , Twan Grotenhuis (Paperback, 27 September, 2006)
  901. Virtualization with VMware ESX Server - Al Muller (2005-08-09, Paperback)
  902. Virus Hunter : Thirty Years of Battling Hot Viruses Around the World , by C.J. Peters , C. J. Peters (Paperback, 13 April, 1998)
  903. Voice-Enabling the Data Network : H.323, MGCP, SIP, QoS, SLAs, and Security , by James F. Durkin (Hardcover, 25 September, 2002)
  904. Voice & Data Communications Handbook, Fifth Edition (McGraw-Hill Communication Series) - Regis Bud J. Bates (2006-12-13, Hardcover)
  905. Voice over Internet Protocol (VoIP) Security , by PhD, CISM, CISSP, James F. Ransome , PhD, CISM, John Rittinghouse (Paperback, 19 November, 2004)
  906. VPNs : A Beginner's Guide , by John Mairs (Paperback, 14 December, 2001)
  907. Wardriving & Wireless Penetration Testing , by Chris Hurley , Russ Rogers , Frank Thornton , Daniel Connelly , Brian Baker (Paperback, 31 October, 2006)
  908. WarDriving : Drive, Detect, Defend, A Guide to Wireless Security , by Chris Hurley , Michael Puchol , Russ Rogers , Frank Thornton (Paperback, 01 April, 2004)
  909. Web Hacking : Attacks and Defense , by Stuart McClure , Saumil Shah , Shreeraj Shah (Paperback, 08 August, 2002)
  910. Web of Deception : Misinformation on the Internet , by Anne P. Mintz (Paperback, 01 September, 2002)
  911. Web Performance Tuning, 2nd Edition (O'Reilly Internet) , by Patrick Killelea (Paperback, March, 2002)
  912. Web Privacy with P3P , by Lorrie Faith Cranor (Paperback, September, 2002)
  913. Web Security Sourcebook , by Aviel D. Rubin , Daniel Geer , Marcus Ranum (Paperback, 24 June, 1997)
  914. Web Security, Privacy and Commerce, 2nd Edition - Simson Garfinkel (2002-01-15, Paperback)
  915. Web Service Security : Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0 , by Microsoft Corporation (Paperback, 22 March, 2006)
  916. Web Services Security , by Mark O'Neill (Paperback, 31 January, 2003)
  917. Web Services Security in the .NET Platform , by Brian Nantz , Laurence Moroney (Paperback, 18 October, 2004)
  918. Welcome to the Machine : Science, Surveillance, and the Culture of Control , by Derrick Jensen , George Draffan (Paperback, 15 September, 2004)
  919. White-Hat Security Arsenal : Tackling the Threats , by Aviel D. Rubin (Paperback, 21 June, 2001)
  920. Wi-Foo : The Secrets of Wireless Hacking - Andrew Vladimirov (2004-06-28, Paperback)
  921. Windows 2000 (Hacking Exposed) , by Joel Scambray , Stuart McClure (Paperback, 29 August, 2001)
  922. Windows 2000 Security (Landmark (New Riders)) , by Roberta Bragg (Paperback, 12 October, 2000)
  923. Windows 2000 Server Security for Dummies , by Paul Sanna (Paperback, 21 December, 1999)
  924. Windows Forensic Analysis Including DVD Toolkit - Harlan Carvey (2007-04-24, Paperback)
  925. Windows Forensics : The Field Guide for Corporate Computer Investigations - Chad Steel (2006-05-15, Paperback)
  926. Windows Forensics and Incident Recovery (The Addison-Wesley Microsoft Technology Series) , by Harlan Carvey (Paperback, 21 July, 2004)
  927. Windows Forms in Action : Second Edition of Windows Forms Programming with C# (In Action) , by Erik Brown (Paperback, 01 April, 2006)
  928. Windows Server 2003 (Hacking Exposed) , by Joel Scambray , Stuart McClure (Paperback, 27 October, 2006)
  929. Windows Server 2003 Security : A Technical Reference (Microsoft Windows Server System Series) , by Roberta Bragg (Paperback, 26 May, 2005)
  930. Windows Server 2003 Security Bible , by Blair Rampling (Paperback, 15 July, 2002)
  931. Windows Server 2003 Security Cookbook (Cookbooks (O'Reilly)) , by Mike Danseglio , Robbie Allen (Paperback, 01 December, 2005)
  932. Windows Server 2003 Security Infrastructures : Core Security Features , by Jan De Clercq (Paperback, 05 March, 2004)
  933. Windows Server Cookbook for Windows Server 2003 and Windows 2000 , by Robbie Allen (Paperback, 23 March, 2005)
  934. Windows Server Hacks , by Mitch Tulloch (Paperback, 01 March, 2004)
  935. Windows XP Hacks & Mods For Dummies (For Dummies (Computer/Tech)) , by Woody Leonhard (Paperback, 30 September, 2005)
  936. Windows XP Hacks, Second Edition , by Preston Gralla (Paperback, 23 February, 2005)
  937. Windows XP Professional : The Ultimate User's Guide , by Joli Ballew (Paperback, July, 2003)
  938. Wireless Hacking : Projects for Wi-Fi Enthusiasts , by Lee Barken , Eric Bermel , John Eder , Matt Fanady , Alan Koebrick , Michael Mee , Marc Palumbo (Paperback, 01 October, 2004)
  939. Wireless Hacks : Tips & Tools for Building, Extending, and Securing Your Network (Hacks) - Rob Flickenger (2005-11-22, Paperback)
  940. Wireless Network Hacks & Mods For Dummies , by Danny Briere , Pat Hurley (Paperback, 30 September, 2005)
  941. Wireless Security : Models, Threats, and Solutions , by Randall K. Nichols , Panos C. Lekkas (Paperback, 13 December, 2001)
  942. Wireless Security End to End , by Brian Carter , Russell Shumway (Paperback, 15 August, 2002)
  943. Wireless Security Essentials : Defending Mobile Systems from Data Piracy , by Russell Dean Vines , Russell Dean Vines (Paperback, 15 July, 2002)
  944. Wireless# Certification Official Study Guide (Exam PW0-050) , by Tom Carpenter , Planet3 Wireless (Paperback, 20 June, 2006)
  945. Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security) (Jay Beale's Open Source Security) - Angela Orebaugh (2006-11-30, Paperback)
  946. Writing Secure Code for Windows Vista (Pro - Step By Step Developer) , by Michael Howard , David LeBlanc (Paperback, 11 April, 2007)
  947. Writing Secure Code, Second Edition - Michael Howard (2002-12-04, Paperback)
  948. Writing Security Tools and Exploits , by James C. Foster (Paperback, 01 September, 2005)

Link to more stores on our main index page ...