Processing ......
FreeComputerBooks.com
Free Computer, Mathematics, Technical Books and Lecture Notes, etc.
 
Computer and Information Security
GIS Visualizer: You provide the data, we visualize them on 30+ maps - 100% Free!
:
Cryptography Books Unix/Linux Security Books
Information Security White Papers Java Security Books
Cryptography and Security in Computing ©2012 (Jaydip Sen)
Security Enhanced Applications for Information Systems ©2012 (Christos Kalloniatis)
Identity Management on a Shoestring ©2011 (Ganesh Prasad, Umesh Rajbhandari)
Applied Cryptography and Network Security ©2012 (Jaydip Sen)
Web Application Security Guide ©2011 (Jan Schejbal)
Internet Safety: Keeping your Computer Safe on the Internet ©2011 (Leo Notenboom)
Security+ Essentials ©2010 (Neil Smyth) ©2010 Information Security Certification Guide
ISC2 CISSP (Certified Information Systems Security Professional) Practice Exam
SY0-201 CompTIA Security+ Special Edition Practice Exam and Study Guide
A Guide to Claims-Based Identity and Access Control ©2010 (Dominick Baier, et al)
O'Reilly® Beautiful Security: Leading Security Experts Explain How They Think ©2009 (Andy Oram, et al)
Nmap Network Scanning: The Official Nmap Guide to Network Discovery and Security Scanning 2009
Improving Web Services Security: Scenarios and Implementation Guidance for WCF ©2009 (J.D. Meier, et al)
Security Concepts ©2009 (Travis H.) O'Reilly® SpamAssassin ©2004 (Alan Schwartz )
Secrets of Network Cartography: A Comprehensive Guide to Nmap 2008 (James Messer)
Security Engineering: A Guide to Building Dependable Distributed Systems ©2008 (Ross J. Anderson)
Software Security Models for Service-Oriented Programming (SOP) Platforms ©2008 (Pierre Parrend)
Own Your Space: Keep Yourself and Your Stuff Safe Online ©2006 (Linda McCarthy)
The Developer Highway Code ©2006-2007 (Paul Maher/Alex Mackman) 142 pages
Introduction to Computer Security: The NIST Handbook ©1995-2006 (NIST) [PDF]
Forensic Discovery ©2005 (Dan Farmer, Wietse Venema) 240 pages
Open Source Security Tools: A Practical Guide to Security Applications ©2005 (Tony Howlett)
O'Reilly® Network Security Tools: Writing, Hacking, and Modifying Security Tools ©2005 (Justin Clarke, et al)
O'Reilly® Snort Cookbook ©2005 (Angela Orebaugh, Simon Biles, Jacob Babbin)
The .NET Developer's Guide to Windows Security ©2004 (Keith Brown) Book Review
Intrusion Detection Systems with Snort: Advanced IDS with Snort, Apache, MySQL, PHP, and ACID ©2003 Book Review
Firewalls & VPN's: Firewalls Complete ©2002 (Marcus Goncalves) [1997 Edition]
O'Reilly® Building Internet Firewalls, 2nd Edition ©2000 (Elizabeth D. Zwicky, et al)
O'Reilly® Practical UNIX and Internet Security, Second Edition ©1996 (Simson Garfinkel, Gene Spafford)
Cryptography's Role in Securing the Information Society ©1996 (Kenneth W. Dam, Herbert S. Lin)
Safeguarding Your Technology - Practical Guidelines for Electronic Education Information Security (Tom Szuba)
Security Engineering - A Guide to Building Dependable Distributed Systems ©2001 (Ross Anderson)
Handbook of Information Security Management (Micki Krause/Harold F. Tipton) [Mirror] [Mirror] [Mirror]
The Protection of Information in Computer Systems (J.H. Saltzer and M.D. Schroeder)
The Open Source PKI Book, by Symeon (Simos) Xenitellis [Mirror] [Mirror] [Mirror]
Building Secure ASP.NET Applications: Authentication, Authorization, and Secure Communication
Making Strategy: National Security Processes and Problems ©2002 (Dennis Drew/Donald Snow)
Spam Fighting and Email Security for the 21st Century Computer and Network Security ©2009 (Steve Zdancewic)
IT Security Cookbook ©1996-2003 (Sean Boran) Computer Security in Open Systems [Mirror]
Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information
Adjusting to a New Security Environment: The Defense Technology and Industrial Base Challenge
Building Future Security: Strategies for Restructuring the Defense Technology and Industrial Base
Book Categories
Other Categories
Resources and Links