HACKING THE FUTURE – PRIVACY, IDENTITY, AND ANONYMITY ON THE WEB

Cole Stryker presents a strong defence of anonymity and explores some of the tools and organisations relating to privacy, identity, and anonymity on the Web, especially as it has evolved with the ubiquity of the Internet. Cogent and compelling, his examination of online identities, both false and real, is an essential read for the social networking age.

Published by: Overlook Press


CORPORATE COMPUTER SECURITY

Raymond R Panko and Randy Boyle provide a strong business focus, along with a solid technical understanding, of tools. This book gives readers the IT skills they need for the workplace. This edition is more business focused and contains additional hands-on projects, coverage of wireless and data , and case studies.

Published by: Prentice Hall


WEB APPLICATION DEFENDER’S COOKBOOK

Ryan C Barnett shows how attackers and hackers identify and attack vulnerable live Web applications. This book shows readers how to defend their applications, detailing defensive methods, and can also be used as courseware for training network personnel, Web server administrators, and consultants. Topics include identifying vulnerabilities, setting hacker traps, defending different access points and enforcing application flows.

Published by: John Wiley & Sons

COMPUTER SECURITY – PRINCIPLES AND PRACTICE

security.jpg" alt="" />William Stallings and Lawrie Brown state that in recent years, the need for education in computer and related topics has grown dramatically, and it is essential for anyone studying computer science or computer engineering. The book provides integrated, comprehensive, up-to-date coverage of the broad range of topics on this subject.

Published by: Prentice Hall