A Practical Approach to Logical Access Control
Actually Useful Internet Security Techniques: Covers SATAN and Spoofing
Advanced CISSP Prep Guide: Exam Q & A
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline
All-In-One CISSP Certification: Exam Guide
Applied Cryptography: Protocols, Algorithms, and Source Code in C 2nd Ed.
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Authentication Systems for Secure Networks
Building Linux and OpenBSD Firewalls
Building SET Applications for Secure Transactions
Building a Secure Computer System
Cisco IOS Network Security: Documentation from the Cisco IOS™ Reference Library
Complete LAN Security and Control
Computer Communications Security: Principles, Standard Protocols and Techniques
Computer Crime: A Crimefighter's Handbook
Computer Forensics: Incident Response Essentials
Computer Security: Art and Science
Computer Security Reference Book
Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses