Encryption Software and Books Encryption Software and Books
 
   Home >  Encryption, Security Software  >  Books


Windows Utilities

Strong File(Folder) Encryption Decryption Utility: easily encrypt and decrypt your files and folders.

Encryption Software - Service Edition with Scheduling: allows you easily and quickly to run scheduled encryption and decryption sessions as a service process.

Auto FTP Premium: save time and money with automated ftp client software. Upload and download encrypted files and folders.


Bestselling and bargain books
* Search bestsellers
* Search bargain books
* Other books




   


Books > Security, Encryption

  • Hardening Cisco Routers (O'Reilly Networking) by Akin, Thomas
  • Security Engineering: A Guide to Building Dependable Distributed Systems by Anderson, Ross J.
  • SSH, The Secure Shell: The Definitive Guide by Barrett, Daniel J.
  • Hacking for Dummies by Beaver, Kevin
  • Computer Security Handbook by Bosworth, Seymour (Editor)
  • RSA Security's Official Guide to Cryptography by Burnett, Steve
  • Implementing Biometric Security by Chirillo, John
  • Storage Security: Protecting, SANs, NAS and DAS by Chirillo, John
  • Cryptography for Dummies by Cobb, Chey
  • Network Security for Dummies by Cobb, Chey
  • Hiding in Plain Sight : Steganography and the Art of Covert Communication by Cole, Eric
  • The Design of Rijndael: AES - The Advanced Encryption Standard (Information Security and Cryptography) by Daemen, Joan
  • Practical Cryptography by Ferguson, Niels
  • Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption (2nd Edition) by Ford, Warwick
  • Programming .NET Security by Freeman, Adam
  • Practical Unix and Internet Security, 3rd Edition by Garfinkel, Simson
  • E-Commerce Security : Weak Links, Best Defenses by Ghosh, Anup K.
  • Foundations of Cryptography: Volume 1, Basic Tools by Goldreich, Oded
  • Computer Security by Gollmann, Dieter
  • Secure Coding: Principles and Practices by Graff, Mark G.
  • Mastering Web Services Security by Hartman, Bret
  • Writing Secure Code, Second Edition by Howard, Michael
  • The SSCP Prep Guide: Mastering the Seven Key Areas of System Security by Isaac, Debra S.
  • Red Hat Linux Security and Optimization by Kabir, Mohammed J.
  • Java Cryptography (Java Series (O'Reilly and Associates).) by Knudsen, Jonathan
  • Cryptography: A Primer by Konheim, Alan G.
  • The Information Systems Security Officer's Guide: Establishing and Managing an Information Protection Program by Kovacich, Gerald
  • Advanced CISSP Prep Guide: Exam QandA by Krutz, Ronald L.
  • The CISSP Prep Guide: Gold Edition by Krutz, Ronald L.
  • The CISSP Prep Guide: Mastering the Ten Domains of Computer Security by Krutz, Ronald L.
  • Hackers: Heroes of the Computer Revolution by Levy, Steven
  • Implementing Backup and Recovery: The Readiness Guide for the Enterprise by Little, David B
  • Red Hat Linux Firewalls by McCarty, Bill
  • Securing Java: Getting Down to Business with Mobile Code, 2nd Edition by McGraw, Gary
  • Secrets of Computer Espionage: Tactics and Countermeasures by McNamara, Joel
  • CISSP for Dummies by Miller, Lawrence C.
  • Security+ Certification for Dummies by Miller, Lawrence H.
  • The Art of Deception: Controlling the Human Element of Security by Mitnick, Kevin D.
  • Securing Windows NT/2000 Servers for the Internet by Norberg, Stefan
  • Java Security (2nd Edition) by Oaks, Scott
  • Security Warrior by Peikari, Cyrus
  • Cisco(r) Security Bible by Rajesh, K. S.
  • Windows Server 2003 Security Bible by Rampling, Blair
  • Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption by Rosenberg, Jothy
  • Computer Security Basics by Russell, Debby
  • Cryptography and Public Key Infrastructure on the Internet by Schmeh, Klaus
  • Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition by Schneier, Bruce
  • Secrets and Lies: Digital Security in a Networked World by Schneier, Bruce
  • Incident Response: Computer Forensics Toolkit by Schweitzer, Douglas
  • Hacking Windows XP (ExtremeTech) by Sinchak, Steve
  • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by SINGH, SIMON
  • Cryptography and Network Security: Principles and Practice (3rd Edition) by Stallings, William
  • SSL and TLS Essentials: Securing the Web by Thomas, Stephen A.
  • Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) by Vacca, John R.
  • Secure Programming Cookbook for C and C++ by Viega, John
  • Malicious Cryptography: Exposing Cryptovirology by Young, Adam
  • Building Internet Firewalls (2nd Edition) by Zwicky, Elizabeth D.






  • Copyright © 1996-2005 PrimaSoft PC, Inc. All rights reserved.