Information And Network Security

Position
Details
Rating
Readers Count
Controls
#2
Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community
Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community
    01 read
    #3
    Cryptography and Network Security: Principles and Practice
    Cryptography and Network Security: Principles and Practice
    • William Stallings
    51 read
    #4
    Gone with the wind.
    Gone with the wind.
    • Margaret Mitchell
    41 read
    #5
    Hacking Exposed: Network Security Secrets & Solutions
    Hacking Exposed: Network Security Secrets & Solutions
    • Stuart McClure
    44 reads
    #6
    Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
    Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
    • Edward Skoudis
    • Tom Liston
    51 read
    #7
    Network Security Hacks: Tips & Tools for Protecting Your Privacy
    Network Security Hacks: Tips & Tools for Protecting Your Privacy
    • Andrew Lockhart
    41 read
    #8
    Maximum Security
    Maximum Security
    • Anonymous
    32 reads
    #9
    Inside Network Perimeter Security
    Inside Network Perimeter Security
    • Lenny Zeltser
    41 read
    #10
    Wireshark & Ethereal Network Protocol Analyzer Toolkit
    Wireshark & Ethereal Network Protocol Analyzer Toolkit
    • Angela Orebaugh
    • Gilbert Ramirez
    • Jay Beale
    41 read
    #11
    Security Data Visualization: Graphical Techniques for Network Analysis
    Security Data Visualization: Graphical Techniques for Network Analysis
    • Greg Conti
    51 read
    #12
    Network Security: The Complete Reference
    Network Security: The Complete Reference
    • Mark Rhodes-Ousley
    • Roberta Bragg
    • Keith Strassberg
    51 read
    #13
    Secure Computers And Networks - Analysis, Design And Implementation
    Secure Computers And Networks - Analysis, Design And Implementation
    • Fisch White
    • Gregory B. White
    41 read
    #14
    Snort IDS and IPS Toolkit
    Snort IDS and IPS Toolkit
    • Toby Kohlenberg
    • Brian Caswell
    • Jay Beale
    • Andrew R. Baker
    51 read
    #15
    Inside Network Perimeter Security: The Definitive Guide to Firewalls, Vpns, Routers, and Intrusion Detection Systems
    Inside Network Perimeter Security: The Definitive Guide to Firewalls, Vpns, Routers, and Intrusion Detection Systems
    • Lenny Zeltser
    • Scott Winters
    • Karen Kent Frederick
    • Ronald W. Ritchey
    41 read
    #16
    Intrusion Detection
    Intrusion Detection
    • Rebecca Gurley Bace
    41 read
    #17
    Computer System and Network Security
    Computer System and Network Security
    • Gregory B. White
    • Gregory B. White
    41 read
    #18
    Cover 7

    Beyond Fear

    Beyond Fear: Thinking Sensibly About Security in an Uncertain World.
    • Bruce Schneier
    54 reads
    #19
    Applied Cryptography: Protocols, Algorithms, and Source Code in C
    Applied Cryptography: Protocols, Algorithms, and Source Code in C
    • Bruce Schneier
    49 reads
    #20
    Wired for War: The Robotics Revolution and Conflict in the 21st Century
    Wired for War: The Robotics Revolution and Conflict in the 21st Century
    • P.W. Singer
    3.85 reads
    #21
    Introduction to Algorithms
    Introduction to Algorithms
    • Thomas H. Cormen
    • Charles E. Leiserson
    • Ronald L. Rivest
    • Clifford Stein
    4.0830 reads
    #22
    Artificial intelligence
    Artificial intelligence
    • Stuart Russell
    • Peter Norvig
    3.915 reads
    #23
    Cover 8

    Cyberwar

    Cyberwar: The Next Threat to National Security & What to Do About It
    • Richard A. Clarke
    • Robert Knake
    3.255 reads
    #24
    Neuromancer
    Neuromancer
    • William Gibson
    3.81,127 reads
    #25
    Cover 6

    Crypto

    Crypto
    • Steven Levy
    51 read
    #26
    Farewell
    Farewell
    • Sergei Kostin
    • Eric Raynaud
    • Richard V. Allen
    51 read
    #27
    Cover 2

    The Dark Visitor

    The Dark Visitor: Inside the World of Chinese Hackers
    • Scott J. Henderson
    01 read