Secrets and Lies
Secure Computing
Secure Unix
Securing Client/Server Computer Networks
Securing Windows NT/2000 Servers for the Internet
Security and Privacy for E-business
Security Architecture
Security Consulting
Security Engineering
Security in Computing
Security in Distributed Computing
Security Interface Specifications
Security Management
Security Metrics
sed and awk
sed & awk
Seeing What's Next
Sekretess!
Selling Blue Elephants
Selling the Invisible
Selling the Wheel
Selling to the C-Suite
Selling to VITO
sendmail