セキュリティ、クラッキング関連の本を集めてみました。 ご自由に編集下さい。
[ { "title" : "ITセキュリティカフェ 見習いコンサルの事件簿 (情報研シリーズ)", "isbn" : "4621077813", "date" : "2008-12-10T01:38:52.000Z", "publisher" : "丸善", "authors" : "岡田 仁志, 高橋 郁夫, 島田 秋雄, 須川 賢洋", "categories" : "", "score" : "", "comment" : "" }, { "title" : "国際セキュリティマネジメント標準 ISO17799がみるみるわかる本―情報システムのセキュリティ対策規格をやさしく解説! (PHPビジネス選書)", "isbn" : "456962345X", "date" : "2008-12-10T01:38:52.000Z", "publisher" : "PHP研究所", "authors" : "エーペックスインターナショナル", "categories" : "", "score" : "", "comment" : "" }, { "title" : "国際セキュリティ標準ISO15408がみるみるわかる本―情報システムの開発・運用から認証まで徹底解説! (PHPビジネス選書)", "isbn" : "4569621023", "date" : "2008-12-10T01:38:52.000Z", "publisher" : "PHP研究所", "authors" : "田渕 治樹", "categories" : "", "score" : "", "comment" : "" }, { "title" : "SASセキュリティ・ハンドブック", "isbn" : "456202917X", "date" : "2008-12-10T01:38:52.000Z", "publisher" : "原書房", "authors" : "アンドルー ケイン, ネイル ハンソン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "対訳 ISO/IEC27001:2005(JIS Q 27001:2006)情報セキュリティマネジメントシステム ポケット版 (Management System ISO SERIES)", "isbn" : "4542402282", "date" : "2008-12-10T01:38:53.000Z", "publisher" : "日本規格協会", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "JISハンドブック 情報処理―セキュリティ技術・データ通信・文書通信編 (1997)", "isbn" : "4542128873", "date" : "2008-12-10T01:38:53.000Z", "publisher" : "日本規格協会", "authors" : "日本規格協会", "categories" : "", "score" : "", "comment" : "" }, { "title" : "図解でわかるインターネットのすべて―TCP/IP\u0026セキュリティ", "isbn" : "4534031270", "date" : "2008-12-10T01:38:53.000Z", "publisher" : "日本実業出版社", "authors" : "小泉 修", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報処理技術者試験 情報セキュリティアドミニストレータ標準教本〈2006年版〉", "isbn" : "4532403839", "date" : "2008-12-10T01:38:53.000Z", "publisher" : "日本経済新聞社", "authors" : "岸本 了造", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報処理技術者試験 よく出るよく分かる情報セキュリティアドミニストレータ午後問題集〈2006年版〉", "isbn" : "4532403812", "date" : "2008-12-10T01:38:53.000Z", "publisher" : "日本経済新聞社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報処理技術者試験 よく出るよく分かる情報セキュリティアドミニストレータ午前問題集〈2006年版〉", "isbn" : "4532403804", "date" : "2008-12-10T01:38:53.000Z", "publisher" : "日本経済新聞社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "らくらく初級シスアド図解教本 2005秋 別冊ふろく 特訓!セキュリティ問題集", "isbn" : "4532403448", "date" : "2008-12-10T01:38:53.000Z", "publisher" : "日本経済新聞社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "初級シスアド徹底研究 2005秋 特別ふろく 情報セキュリティにも対応した最速攻略168問", "isbn" : "453240343X", "date" : "2008-12-10T01:38:53.000Z", "publisher" : "日本経済新聞社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "よく出るよく分かる情報セキュリティアドミニストレータ(午後)問題集〈2004年版〉―情報処理技術者試験", "isbn" : "4532403065", "date" : "2008-12-10T01:38:54.000Z", "publisher" : "日本経済新聞社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "よく出るよく分かる情報セキュリティアドミニストレータ(午前)問題集〈2004年版〉―情報処理技術者試験", "isbn" : "4532403057", "date" : "2008-12-10T01:38:54.000Z", "publisher" : "日本経済新聞社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータ標準教本〈2004年版〉―情報処理技術者試験", "isbn" : "4532403049", "date" : "2008-12-10T01:38:54.000Z", "publisher" : "日本経済新聞社", "authors" : "岸本 了造", "categories" : "", "score" : "", "comment" : "" }, { "title" : "図解 よくわかる企業セキュリティ入門―事業継続(BCM)とSOX法", "isbn" : "4526056111", "date" : "2008-12-10T01:38:54.000Z", "publisher" : "日刊工業新聞社", "authors" : "小林 偉昭, 金野 千里, 織茂 昌之", "categories" : "", "score" : "", "comment" : "" }, { "title" : "免疫系ネットワークセキュリティ―人間の生物的特徴を用いた", "isbn" : "4526053678", "date" : "2008-12-10T01:38:54.000Z", "publisher" : "日刊工業新聞社", "authors" : "溝口 文雄, 平石 広典, 西山 裕之", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティ監査制度―管理態勢の構築と監査の実施", "isbn" : "4502585904", "date" : "2008-12-10T01:38:54.000Z", "publisher" : "中央経済社", "authors" : "KPMGビジネスアシュアランス", "categories" : "", "score" : "", "comment" : "" }, { "title" : "テクニカルエンジニア情報セキュリティ午前 精選予想600題試験問題集", "isbn" : "4501540206", "date" : "2008-12-10T01:38:54.000Z", "publisher" : "東京電機大学出版局", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ISO15408情報セキュリティ入門", "isbn" : "4501531509", "date" : "2008-12-10T01:38:55.000Z", "publisher" : "東京電機大学出版局", "authors" : "内山 政人", "categories" : "", "score" : "", "comment" : "" }, { "title" : "電子透かし技術―ディジタルコンテンツのセキュリティ", "isbn" : "4501323205", "date" : "2008-12-10T01:38:55.000Z", "publisher" : "東京電機大学出版局", "authors" : "小松 尚久", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ウェブ時代の暗号―ネットセキュリティの挑戦 (ちくま新書)", "isbn" : "4480064028", "date" : "2008-12-10T01:38:55.000Z", "publisher" : "筑摩書房", "authors" : "熊谷 直樹", "categories" : "", "score" : "", "comment" : "" }, { "title" : "「知の共有」と情報セキュリティマネジメント", "isbn" : "4478420475", "date" : "2008-12-10T01:38:55.000Z", "publisher" : "ダイヤモンド社", "authors" : "船木 春仁, 峰岸 和弘", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティ読本―IT時代の危機管理入門", "isbn" : "440731298X", "date" : "2008-12-10T01:38:55.000Z", "publisher" : "実教出版", "authors" : "情報処理推進機構", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティ対策の要点―実務と理論", "isbn" : "4339024066", "date" : "2008-12-10T01:38:55.000Z", "publisher" : "コロナ社", "authors" : "持田 敏之, 舩曳 信生", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗証番号はなぜ4桁なのか? セキュリティを本質から理解する (光文社新書)", "isbn" : "4334033237", "date" : "2008-12-10T01:38:55.000Z", "publisher" : "光文社", "authors" : "岡嶋 裕史", "categories" : "", "score" : "", "comment" : "" }, { "title" : "無線LANセキュリティ―次世代技術IEEE 802.11iとWPAの実際", "isbn" : "4320097424", "date" : "2008-12-10T01:38:55.000Z", "publisher" : "構造計画研究所", "authors" : "Jon Edney, William A. Arbaugh", "categories" : "", "score" : "", "comment" : "" }, { "title" : "インターネット時代の情報セキュリティ―暗号と電子透かし", "isbn" : "4320029917", "date" : "2008-12-10T01:38:56.000Z", "publisher" : "共立出版", "authors" : "佐々木 良一, 手塚 悟, 吉浦 裕, 三島 久典", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ISMS構築のための情報セキュリティポリシーとリスク管理", "isbn" : "4274946754", "date" : "2008-12-10T01:38:56.000Z", "publisher" : "オーム社", "authors" : "田渕 治樹", "categories" : "", "score" : "", "comment" : "" }, { "title" : "テクニカルエンジニア 情報セキュリティ試験合格対策 (なるほどナットク!)", "isbn" : "4274201813", "date" : "2008-12-10T01:38:56.000Z", "publisher" : "オーム社", "authors" : "奥田 孝之, 山野 浩, 水口 圭三", "categories" : "", "score" : "", "comment" : "" }, { "title" : "実践 情報セキュリティ―人・運用・技術", "isbn" : "4274200310", "date" : "2008-12-10T01:38:56.000Z", "publisher" : "オーム社", "authors" : "Amanda Andress", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータ完全攻略 (なるほどナットク!)", "isbn" : "4274166260", "date" : "2008-12-10T01:38:56.000Z", "publisher" : "オーム社", "authors" : "岩田 儀一, 成田 佳応", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティ (IT Text)", "isbn" : "4274132846", "date" : "2008-12-10T01:38:56.000Z", "publisher" : "オーム社", "authors" : "宮地 充子, 菊池 浩明", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ネット情報セキュリティ", "isbn" : "4274079473", "date" : "2008-12-10T01:38:56.000Z", "publisher" : "オーム社", "authors" : "Dorothy E. Denning", "categories" : "", "score" : "", "comment" : "" }, { "title" : "図解 ネットワークセキュリティ―攻撃と防御のメカニズム", "isbn" : "4274066118", "date" : "2008-12-10T01:38:57.000Z", "publisher" : "オーム社", "authors" : "谷口 功", "categories" : "", "score" : "", "comment" : "" }, { "title" : "基礎からわかるTCP/IPセキュリティ実験―Linux/FreeBSDの対応", "isbn" : "4274063828", "date" : "2008-12-10T01:38:57.000Z", "publisher" : "オーム社", "authors" : "寺田 真敏, 萱島 信", "categories" : "", "score" : "", "comment" : "" }, { "title" : "E‐Mailセキュリティ", "isbn" : "4274061175", "date" : "2008-12-10T01:38:57.000Z", "publisher" : "オーム社", "authors" : "Bruce Schneier, ブルース・シュナイアー", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号―ポストモダンの情報セキュリティ (講談社選書メチエ)", "isbn" : "406258073X", "date" : "2008-12-10T01:38:57.000Z", "publisher" : "講談社", "authors" : "辻井 重男", "categories" : "", "score" : "", "comment" : "" }, { "title" : "セキュリティはなぜ破られるのか―10年使える「セキュリティの考え方」 (ブルーバックス)", "isbn" : "4062575248", "date" : "2008-12-10T01:38:58.000Z", "publisher" : "講談社", "authors" : "岡嶋 裕史", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティの科学―マジック・プロトコルへの招待 (ブルーバックス)", "isbn" : "4062570556", "date" : "2008-12-10T01:38:58.000Z", "publisher" : "講談社", "authors" : "太田 和夫, 渡辺 治, 黒沢 馨", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ブロードバンド時代のインターネットセキュリティ (岩波科学ライブラリー (85))", "isbn" : "4000065858", "date" : "2008-12-10T01:38:58.000Z", "publisher" : "岩波書店", "authors" : "山口 英", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティ プロフェッショナル総合教科書", "isbn" : "479800880X", "date" : "2008-12-10T01:39:10.000Z", "publisher" : "秀和システム", "authors" : "特定非営利活動法人日本ネットワークセキュリティ協会教育部会スキルマップ作成ワーキンググループ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "インターネットセキュリティ逆引き大全 333の極意", "isbn" : "4798007536", "date" : "2008-12-10T01:39:10.000Z", "publisher" : "秀和システム", "authors" : "古庄 潤, 古賀 士裕, 高橋 ヒロユキ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "図解入門 よくわかる最新 情報セキュリティ技術の基本と仕組み―情報セキュリティエンジニアリングの基礎 (How‐nual Visual Guide Book)", "isbn" : "479800541X", "date" : "2008-12-10T01:39:10.000Z", "publisher" : "秀和システム", "authors" : "相戸 浩志", "categories" : "", "score" : "", "comment" : "" }, { "title" : "OpenSSHセキュリティ管理ガイド―for Solaris/FreeBSD/Linux", "isbn" : "4798001295", "date" : "2008-12-10T01:39:10.000Z", "publisher" : "秀和システム", "authors" : "新山 祐介, 春山 征吾", "categories" : "", "score" : "", "comment" : "" }, { "title" : "システム管理者のためのネットワークセキュリティ導入ガイド", "isbn" : "4798001090", "date" : "2008-12-10T01:39:10.000Z", "publisher" : "秀和システム", "authors" : "田中 紀治", "categories" : "", "score" : "", "comment" : "" }, { "title" : "UNIXネットワークセキュリティ導入・運用ガイド―Linux/FreeBSD/Solaris対応", "isbn" : "479800104X", "date" : "2008-12-10T01:39:11.000Z", "publisher" : "秀和システム", "authors" : "高町 健一郎", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Linuxサーバ セキュリティのポイントと対策", "isbn" : "4797337036", "date" : "2008-12-10T01:39:11.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "阿部 ひろき", "categories" : "", "score" : "", "comment" : "" }, { "title" : "sendmailセキュリティ (Security Professional Series)", "isbn" : "4797324252", "date" : "2008-12-10T01:39:11.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "久米原 栄", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータ―情報処理技術者試験 (情報処理テキスト)", "isbn" : "4797320710", "date" : "2008-12-10T01:39:11.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "加藤 忠宏", "categories" : "", "score" : "", "comment" : "" }, { "title" : "UNIX Network セキュリティ管理", "isbn" : "479731687X", "date" : "2008-12-10T01:39:12.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "久米原 栄", "categories" : "", "score" : "", "comment" : "" }, { "title" : "セキュリティポリシーの作成と運用 (「インターネットセキュリティ」シリーズ)", "isbn" : "4797314680", "date" : "2008-12-10T01:39:12.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "トーマス・R. ペルティア", "categories" : "", "score" : "", "comment" : "" }, { "title" : "TCP/IPセキュリティ―システムアタックを防御するネットワークの構築と管理 (Network Professional Series)", "isbn" : "4797313749", "date" : "2008-12-10T01:39:12.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "久米原 栄", "categories" : "", "score" : "", "comment" : "" }, { "title" : "セキュリティ術自分で守るパソコン―のぞかせない!侵入させない!", "isbn" : "4791611020", "date" : "2008-12-10T01:39:13.000Z", "publisher" : "西東社", "authors" : "森谷 健一", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号と情報セキュリティ", "isbn" : "4785630752", "date" : "2008-12-10T01:39:13.000Z", "publisher" : "昭晃堂", "authors" : "辻井 重男, 笠原 正雄", "categories" : "", "score" : "", "comment" : "" }, { "title" : "うかるぞ情報セキュリティアドミニストレータ 年度別過去問〈2006年版〉", "isbn" : "4784807713", "date" : "2008-12-10T01:39:13.000Z", "publisher" : "週刊住宅新聞社", "authors" : "小倉 美香", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ネットワークセキュリティ Expert 4 SoftwareDesign特別編集", "isbn" : "4774127892", "date" : "2008-12-10T01:39:13.000Z", "publisher" : "技術評論社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータ合格教本〈平成18年度〉 (情報処理技術者試験)", "isbn" : "4774126829", "date" : "2008-12-10T01:39:14.000Z", "publisher" : "技術評論社", "authors" : "岡嶋 裕史", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ネットワークセキュリティ Expert 2 Software Design 特別編集", "isbn" : "4774123935", "date" : "2008-12-10T01:39:14.000Z", "publisher" : "技術評論社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ネットワークセキュリティExpert―今すぐ使える!定番セキュリティツール完全ガイド2005", "isbn" : "4774122408", "date" : "2008-12-10T01:39:14.000Z", "publisher" : "技術評論社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータ合格教本〈平成16年度〉 (情報処理技術者試験)", "isbn" : "4774120162", "date" : "2008-12-10T01:39:14.000Z", "publisher" : "技術評論社", "authors" : "岡嶋 裕史", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータ パーフェクトラーニング過去問題集〈平成15年度〉 (情報処理技術者試験)", "isbn" : "4774117838", "date" : "2008-12-10T01:39:14.000Z", "publisher" : "技術評論社", "authors" : "NRIラーニングネットワーク", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータ合格教本〈平成15年度〉 (情報処理技術者試験)", "isbn" : "4774117234", "date" : "2008-12-10T01:39:14.000Z", "publisher" : "技術評論社", "authors" : "向山 隆行", "categories" : "", "score" : "", "comment" : "" }, { "title" : "技術者のためのプログラミングによるセキュリティ強化ガイド", "isbn" : "4774116335", "date" : "2008-12-10T01:39:14.000Z", "publisher" : "技術評論社", "authors" : "宮前 竜也", "categories" : "", "score" : "", "comment" : "" }, { "title" : "技術者のためのWindows2000 Serverセキュリティ完全対策", "isbn" : "4774115800", "date" : "2008-12-10T01:39:14.000Z", "publisher" : "技術評論社", "authors" : "小林 林広, 山後 正孝, 好田 崇志, 大塚 慎太郎", "categories" : "", "score" : "", "comment" : "" }, { "title" : "インターネットセキュリティ500の技 (オールラウンドプログラミング)", "isbn" : "477411443X", "date" : "2008-12-10T01:39:15.000Z", "publisher" : "技術評論社", "authors" : "Windowsプログラミング愛好会", "categories" : "", "score" : "", "comment" : "" }, { "title" : "まるごと図解 最新インターネットセキュリティがわかる (まるごと図解)", "isbn" : "4774109452", "date" : "2008-12-10T01:39:15.000Z", "publisher" : "技術評論社", "authors" : "セキュリティ研究会", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Honeypots―ネットワーク・セキュリティのおとりシステム", "isbn" : "4766410866", "date" : "2008-12-10T01:39:15.000Z", "publisher" : "慶應義塾大学出版会", "authors" : "ランス スピッツナー", "categories" : "", "score" : "", "comment" : "" }, { "title" : "はいぱぁセキュリティーズ2 公式ガイド", "isbn" : "4757180063", "date" : "2008-12-10T01:39:15.000Z", "publisher" : "NTT出版", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "サイバーセキュリティの法と政策", "isbn" : "4757101228", "date" : "2008-12-10T01:39:16.000Z", "publisher" : "NTT出版", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "セキュリティポリシーでネットビジネスに勝つ", "isbn" : "4757100345", "date" : "2008-12-10T01:39:16.000Z", "publisher" : "NTT出版", "authors" : "三輪 信雄", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Windowsネットワーク\u0026サーバセキュリティ -Server 2003 R2/Vista対応- (アスキームック)", "isbn" : "4756148468", "date" : "2008-12-10T01:39:16.000Z", "publisher" : "アスキー", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "すっきりわかった!セキュリティ (NETWORK MAGAZINE BOOKS)", "isbn" : "4756146325", "date" : "2008-12-10T01:39:16.000Z", "publisher" : "アスキー", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "実践 セキュリティー-頼れるファイアウォールを作る UNIX MAGAZINE LIBRARY", "isbn" : "4756142966", "date" : "2008-12-10T01:39:17.000Z", "publisher" : "アスキー", "authors" : "白崎 博生", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Linuxセキュリティ入門―ipchains/xinetd/SSHなどの設定と運用 (Linux magazine books)", "isbn" : "4756138217", "date" : "2008-12-10T01:39:17.000Z", "publisher" : "アスキー", "authors" : "清水 正人", "categories" : "", "score" : "", "comment" : "" }, { "title" : "コンピュータセキュリティの基礎 (Nutshell handbooks)", "isbn" : "4756102999", "date" : "2008-12-10T01:39:17.000Z", "publisher" : "アスキー", "authors" : "Deborah Russell, G.T.Gangemi Sr.", "categories" : "", "score" : "", "comment" : "" }, { "title" : "UNIXセキュリティ (NUTSHELL HANDBOOKS)", "isbn" : "4756102743", "date" : "2008-12-10T01:39:17.000Z", "publisher" : "アスキー", "authors" : "シンプソン ガーフィンクル, ジーン スパフォード", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティの理論と技術 - 暗号理論からICカードの耐タンパー技術まで", "isbn" : "4627829515", "date" : "2008-12-10T01:39:17.000Z", "publisher" : "森北出版株式会社", "authors" : "神永 正博, 渡邊 高志", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報ハイディングの基礎―ユビキタス社会の情報セキュリティ技術", "isbn" : "4627828314", "date" : "2008-12-10T01:39:17.000Z", "publisher" : "森北出版", "authors" : "松井 甲子雄, 岩切 宗利", "categories" : "", "score" : "", "comment" : "" }, { "title" : "2006 情報セキュリティアドミニストレータ 「専門知識+記述式問題」重点対策 (情報処理技術者試験対策書)", "isbn" : "4872685385", "date" : "2008-12-10T01:39:24.000Z", "publisher" : "アイテック", "authors" : "アイテック情報技術教育研究所", "categories" : "", "score" : "", "comment" : "" }, { "title" : "2006 情報セキュリティアドミニストレータ 予想問題集 (情報処理技術者試験対策書)", "isbn" : "4872685377", "date" : "2008-12-10T01:39:24.000Z", "publisher" : "アイテック", "authors" : "アイテック情報技術教育研究所", "categories" : "", "score" : "", "comment" : "" }, { "title" : "テクニカルエンジニア 情報セキュリティ予想問題集〈2006〉 (情報処理技術者試験対策書)", "isbn" : "4872685059", "date" : "2008-12-10T01:39:25.000Z", "publisher" : "アイテック", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "PHPの薬箱―エラー・トラブル回避のテクニックとセキュリティ対策", "isbn" : "486167140X", "date" : "2008-12-10T01:39:25.000Z", "publisher" : "九天社", "authors" : "佐久嶋 ひろみ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "知らないと絶対損をするセキュリティの話―デジタル時代の護身術", "isbn" : "486130024X", "date" : "2008-12-10T01:39:25.000Z", "publisher" : "日経BP企画", "authors" : "武藤 佳恭", "categories" : "", "score" : "", "comment" : "" }, { "title" : "コンピュータフォレンジックス入門―不正アクセス、情報漏洩に対する調査と分析 (トムソンセキュリティシリーズ)", "isbn" : "4861001854", "date" : "2008-12-10T01:39:25.000Z", "publisher" : "ビー・エヌ・エヌ新社", "authors" : "Bill Nelson, Frank Enfinger, Ameria Phillips, Cgris Steuart", "categories" : "", "score" : "", "comment" : "" }, { "title" : "インターネットセキュリティ―システム管理者のためのリスクマネージメント (インターネット・エキサイティングテクノロジーシリーズ)", "isbn" : "4844349163", "date" : "2008-12-10T01:39:26.000Z", "publisher" : "インプレス", "authors" : "Larry J,Jr. Hughes", "categories" : "", "score" : "", "comment" : "" }, { "title" : "個人情報保護法対策セキュリティ実践マニュアル", "isbn" : "4844318586", "date" : "2008-12-10T01:39:26.000Z", "publisher" : "インプレスネットビジネスカンパニー", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "プロフェッショナルJava〈下〉JDBC、XML、分散オブジェクト、セキュリティ、チューニング編 (Wroxシリーズ)", "isbn" : "4844315641", "date" : "2008-12-10T01:39:26.000Z", "publisher" : "インプレス", "authors" : "ブレット スペル", "categories" : "", "score" : "", "comment" : "" }, { "title" : "実践Linuxセキュリティー (iNTERNET magazine BOOKS)", "isbn" : "4844314041", "date" : "2008-12-10T01:39:26.000Z", "publisher" : "インプレス", "authors" : "すずき ひろのぶ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Windows2000セキュリティBlack Book (Black Bookシリーズ)", "isbn" : "4844313916", "date" : "2008-12-10T01:39:26.000Z", "publisher" : "インプレス", "authors" : "イアン マクリーン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Linuxセキュリティビギナーズバイブル―Fedora Core 3で学ぶセキュリティの基礎 (MYCOM UNIX Books)", "isbn" : "4839917981", "date" : "2008-12-10T01:39:26.000Z", "publisher" : "毎日コミュニケーションズ", "authors" : "まえだ ひさこ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "セキュリティはなぜやぶられたのか", "isbn" : "4822283100", "date" : "2008-12-10T01:39:27.000Z", "publisher" : "日経BP社", "authors" : "ブルース・シュナイアー", "categories" : "", "score" : "", "comment" : "" }, { "title" : "3週間完全マスター 情報セキュリティアドミニストレータ 2006年版", "isbn" : "4822282740", "date" : "2008-12-10T01:39:27.000Z", "publisher" : "日経BP社", "authors" : "芦屋 広太, 矢野 龍王, 岡嶋 裕史, 克元 亮", "categories" : "", "score" : "", "comment" : "" }, { "title" : "誰でもわかるセキュリティ設計―すぐに役立つ5つの業務別セキュリティ構築ガイド", "isbn" : "4822281663", "date" : "2008-12-10T01:39:27.000Z", "publisher" : "日経BP社", "authors" : "須加 力, 工藤 勇治", "categories" : "", "score" : "", "comment" : "" }, { "title" : "企業を守るセキュリティポリシーとリスク 第2版―情報セキュリティマネジメントシステムの構築と運用", "isbn" : "4822281647", "date" : "2008-12-10T01:39:28.000Z", "publisher" : "日経BP社", "authors" : "塚田 孝則", "categories" : "", "score" : "", "comment" : "" }, { "title" : "インターネット・セキュリティとは何か―暗号、認証、ウイルス、セキュア通信からセキュリティ・ポリシーまで", "isbn" : "4822281248", "date" : "2008-12-10T01:39:28.000Z", "publisher" : "日経BP社", "authors" : "板倉 正俊", "categories" : "", "score" : "", "comment" : "" }, { "title" : "プロが教えるWindowsセキュリティの特効薬 (日経BPムック)", "isbn" : "4822234029", "date" : "2008-12-10T01:39:28.000Z", "publisher" : "日経BP社", "authors" : "日経Windowsプロ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Webアプリケーションのセキュリティ完全対策―不正アクセスや情報漏洩を防ぐ", "isbn" : "4822229718", "date" : "2008-12-10T01:39:29.000Z", "publisher" : "日経BP社", "authors" : "徳丸 浩, 田畑 拓, 三好 雅貴, 園田 健太郎", "categories" : "", "score" : "", "comment" : "" }, { "title" : "日経ネットワークセキュリティ/プロが薦める!最強ツール", "isbn" : "4822223922", "date" : "2008-12-10T01:39:29.000Z", "publisher" : "日経BP社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Windowsセキュリティ対策大全―ウイルス・不正アクセス・情報漏えい完全対策", "isbn" : "4822223485", "date" : "2008-12-10T01:39:29.000Z", "publisher" : "日経BP社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "誰も教えてくれなかった インターネット・セキュリティのしくみ (日経インターネットテクノロジー)", "isbn" : "482222306X", "date" : "2008-12-10T01:39:29.000Z", "publisher" : "日経BP社", "authors" : "熊谷 誠治", "categories" : "", "score" : "", "comment" : "" }, { "title" : "絶対わかる!情報セキュリティ超入門 (日経BPムック―ネットワーク基礎シリーズ)", "isbn" : "4822212823", "date" : "2008-12-10T01:39:29.000Z", "publisher" : "日経BP社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "日経ネットワークセキュリティ (〔5〕) (日経BPムック)", "isbn" : "4822209482", "date" : "2008-12-10T01:39:29.000Z", "publisher" : "日経BP社", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "教師のための情報セキュリティ入門―よくわかる個人情報保護の基礎と実践", "isbn" : "4820803697", "date" : "2008-12-10T01:39:30.000Z", "publisher" : "日本標準", "authors" : "新藤 茂, 加藤 直樹", "categories" : "", "score" : "", "comment" : "" }, { "title" : "審査員が教えるISMS(情報セキュリティマネジメントシステム)実践導入マニュアル―個人情報保護法対応", "isbn" : "4820742787", "date" : "2008-12-10T01:39:30.000Z", "publisher" : "日本能率協会マネジメントセンター", "authors" : "日本能率協会審査登録センター", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティ監査制度の解説と実務対応―ITガバナンスの構築に役立つ監査制度の要点 (情報セキュリティライブラリ)", "isbn" : "4817161515", "date" : "2008-12-10T01:39:30.000Z", "publisher" : "日科技連出版社", "authors" : "島田 裕次, 五井 孝, 本田 実", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ISMS認証基準と適合性評価の解説―ベストプラクティスに学ぶ情報セキュリティマネジメントの要点 (情報セキュリティライブラリ)", "isbn" : "4817161000", "date" : "2008-12-10T01:39:30.000Z", "publisher" : "日科技連出版社", "authors" : "島田 裕次, 山本 直樹, 内山 公雄, 榎木 千昭, 五井 孝", "categories" : "", "score" : "", "comment" : "" }, { "title" : "コンピュータ犯罪のメカニズム―コンピュータ・セキュリティへの対応", "isbn" : "4817160179", "date" : "2008-12-10T01:39:30.000Z", "publisher" : "日科技連出版社", "authors" : "菅野 文友", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報処理教科書 テクニカルエンジニア[情報セキュリティ]2007年度版", "isbn" : "4798112356", "date" : "2008-12-10T01:39:30.000Z", "publisher" : "翔泳社", "authors" : "上原 孝之", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報処理教科書 情報セキュリティアドミニストレータ 平成16年度 (情報処理教科書)", "isbn" : "4798106542", "date" : "2008-12-10T01:39:31.000Z", "publisher" : "翔泳社", "authors" : "上原 孝之", "categories" : "", "score" : "", "comment" : "" }, { "title" : "強いWindowsの基本 まじめにセキュリティを考えた サーバー構築の原則 (達人の道)", "isbn" : "4798105104", "date" : "2008-12-10T01:39:31.000Z", "publisher" : "翔泳社", "authors" : "伊原 秀明", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータ 平成15年度 情報処理教科書", "isbn" : "4798104515", "date" : "2008-12-10T01:39:31.000Z", "publisher" : "翔泳社", "authors" : "上原 孝之", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報処理教科書 情報セキュリティアドミニストレータ午前〈平成15年度〉 (情報処理教科書)", "isbn" : "4798103993", "date" : "2008-12-10T01:39:31.000Z", "publisher" : "翔泳社", "authors" : "上原 孝之, 清水 順夫", "categories" : "", "score" : "", "comment" : "" }, { "title" : "クラッキング防衛大全 Linux編―Linuxへの攻撃手段とセキュリティ対策", "isbn" : "4798103179", "date" : "2008-12-10T01:39:32.000Z", "publisher" : "翔泳社", "authors" : "Brian Hatch, George Kurtz, James Lee", "categories" : "", "score" : "", "comment" : "" }, { "title" : "クラッキング防衛大全 第3版 ネットワーク攻撃の手口とセキュリティ対策", "isbn" : "4798102814", "date" : "2008-12-10T01:39:32.000Z", "publisher" : "翔泳社", "authors" : "Stuart McClure, スチュアート マックル, George Kurtz, ジョージ クルツ, Joel Scambray, ジョエル スキャンベリー", "categories" : "", "score" : "", "comment" : "" }, { "title" : "53のキーワードから学ぶ最新ネットワークセキュリティ", "isbn" : "4798102598", "date" : "2008-12-10T01:39:32.000Z", "publisher" : "翔泳社", "authors" : "上原 孝之, 宮西 靖", "categories" : "", "score" : "", "comment" : "" }, { "title" : "RSAセキュリティオフシャルガイド暗号化 (RSA press)", "isbn" : "4798101982", "date" : "2008-12-10T01:39:32.000Z", "publisher" : "翔泳社", "authors" : "スティーブ バーネット, ステファン ペイン, セキュリティダイナミック社=", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータ スーパー合格本〈2008〉", "isbn" : "4798018643", "date" : "2008-12-10T01:39:32.000Z", "publisher" : "秀和システム", "authors" : "村中 直樹", "categories" : "", "score" : "", "comment" : "" }, { "title" : "図解入門 よくわかる最新情報セキュリティの基本と仕組み―基礎から学ぶセキュリティリテラシー (How‐nual Visual Guide Book)", "isbn" : "4798015881", "date" : "2008-12-10T01:39:33.000Z", "publisher" : "秀和システム", "authors" : "相戸 浩志", "categories" : "", "score" : "", "comment" : "" }, { "title" : "過去問CD付 情報セキュリティアドミニストレータスーパー合格本〈2006〉", "isbn" : "4798012432", "date" : "2008-12-10T01:39:33.000Z", "publisher" : "秀和システム", "authors" : "村中 直樹", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Java2セキュリティプログラミング―基礎概念から実装の詳細まで", "isbn" : "4894713373", "date" : "2008-12-10T01:39:38.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "ジェミー ジョウォルスキー, ポール ベローネ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Visual Basicセキュリティプログラミング―暗号の基礎からAPIの活用法まで", "isbn" : "4894712822", "date" : "2008-12-10T01:39:38.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "デイビス チャップマン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "CORBAセキュリティ―オブジェクトを使った安全性の管理法 (Object Technology Series)", "isbn" : "4894712466", "date" : "2008-12-10T01:39:38.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "ボブ ブレークリィ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Java2プラットフォームセキュリティ (The Java Series)", "isbn" : "4894711931", "date" : "2008-12-10T01:39:39.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "リー ゴーン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "クラッカーお断り―UNIXセキュリティ管理の基礎の基礎", "isbn" : "4894711834", "date" : "2008-12-10T01:39:39.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "ドナルド・L. ペプキン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Writing Secure Code第2版〈下〉プログラマのためのセキュリティ対策テクニック", "isbn" : "4891004479", "date" : "2008-12-10T01:39:39.000Z", "publisher" : "日経BPソフトプレス", "authors" : "マイケル ハワード, デイビッド ルブラン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Writing Secure Code第2版〈上〉プログラマのためのセキュリティ対策テクニック (マイクロソフト公式解説書)", "isbn" : "4891004460", "date" : "2008-12-10T01:39:39.000Z", "publisher" : "日経BPソフトプレス", "authors" : "マイケル ハワード, デイビッド ルブラン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "体系的に学び直すネットワーク・セキュリティ (「体系的に学び直す」シリーズ)", "isbn" : "4891003235", "date" : "2008-12-10T01:39:40.000Z", "publisher" : "日経BPソフトプレス", "authors" : "神崎 洋治, 西井 美鷹", "categories" : "", "score" : "", "comment" : "" }, { "title" : "プログラマのためのセキュリティ対策テクニック (マイクロソフト公式解説書)", "isbn" : "4891002913", "date" : "2008-12-10T01:39:40.000Z", "publisher" : "日経BPソフトプレス", "authors" : "Michael Howard, David LeBlanc, ドキュメントシステム", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ファイアウォール―インターネット接続でのセキュリティ管理技術 (ADDISON-WESLEYプロフェッショナルコンピューティングシリーズ)", "isbn" : "4890526722", "date" : "2008-12-10T01:39:40.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "ウィリアム R. チェスウィック, スティーヴン M. ベロヴィン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ネットワーク社会のセキュリティ―パソコン通信の現状から見た21世紀ビジネスの危機管理 (SOFTBANK BOOKS)", "isbn" : "4890524061", "date" : "2008-12-10T01:39:40.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "藤原 宏高", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ウェブアプリケーションセキュリティ", "isbn" : "4887189400", "date" : "2008-12-10T01:39:40.000Z", "publisher" : "データ・ハウス", "authors" : "金床", "categories" : "", "score" : "", "comment" : "" }, { "title" : "セキュリティポリシーの考え方 (SCC books)", "isbn" : "4886472273", "date" : "2008-12-10T01:39:40.000Z", "publisher" : "エスシーシー", "authors" : "森 慎一, 新川 晃太郎, 塩谷 幸治", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ユビキタスオフィスのセキュリティ―情報を安全に活用するマネジメント\u0026テクノロジー", "isbn" : "4885498147", "date" : "2008-12-10T01:39:40.000Z", "publisher" : "電気通信協会", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ネットワーク攻撃詳解―攻撃のメカニズムから理解するセキュリティ対策", "isbn" : "4883731618", "date" : "2008-12-10T01:39:40.000Z", "publisher" : "ソフトリサーチセンター", "authors" : "三輪 信雄, 新井 悠", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ネットワークセキュリティとシステム開発", "isbn" : "4883731596", "date" : "2008-12-10T01:39:41.000Z", "publisher" : "ソフト・リサーチ・センター", "authors" : "ラックSNSチーム, 三輪 信雄", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ブロードバンドルーター設定\u0026セキュリティ徹底活用", "isbn" : "4883373037", "date" : "2008-12-10T01:39:41.000Z", "publisher" : "ソシム", "authors" : "川村 博", "categories" : "", "score" : "", "comment" : "" }, { "title" : "UNIXシステムセキュリティツール (UNIX Toolsシリーズ)", "isbn" : "4881359150", "date" : "2008-12-10T01:39:41.000Z", "publisher" : "翔泳社", "authors" : "セス ロス", "categories" : "", "score" : "", "comment" : "" }, { "title" : "図解 そこが知りたい!IT時代の経営者とシステム管理者のためのネットワーク危機管理入門―情報資産を守るための基礎知識からビジネスの新常識「セキュリティポリシー」まで (Tech \u0026 Bizシリーズ)", "isbn" : "4881359142", "date" : "2008-12-10T01:39:41.000Z", "publisher" : "翔泳社", "authors" : "上原 孝之", "categories" : "", "score" : "", "comment" : "" }, { "title" : "フリーソフトでつくるファイアウォール―「Windows」「Linux」「FreeBSD」ではじめるネットワーク・セキュリティ (I・O BOOKS)", "isbn" : "4875934343", "date" : "2008-12-10T01:39:41.000Z", "publisher" : "工学社", "authors" : "一条 博", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Ajaxアプリケーション \u0026 Webセキュリティ", "isbn" : "487311358X", "date" : "2008-12-10T01:39:41.000Z", "publisher" : "オライリー・ジャパン", "authors" : "Christopher Wells", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ネットワークセキュリティHacks 第2版 ―プロが使うテクニック \u0026 ツール 100+", "isbn" : "487311327X", "date" : "2008-12-10T01:39:41.000Z", "publisher" : "オライリー・ジャパン", "authors" : "Andrew Lockhart", "categories" : "", "score" : "", "comment" : "" }, { "title" : "入門PHPセキュリティ", "isbn" : "4873112869", "date" : "2008-12-10T01:39:42.000Z", "publisher" : "オライリージャパン", "authors" : "Chris Shiflett", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Apacheセキュリティ", "isbn" : "4873112567", "date" : "2008-12-10T01:39:42.000Z", "publisher" : "オライリージャパン", "authors" : "Ivan Ristic", "categories" : "", "score" : "", "comment" : "" }, { "title" : "C/C++セキュアプログラミングクックブック VOLUME 3 ―公開鍵暗号の実装とネットワークセキュリティ", "isbn" : "4873112249", "date" : "2008-12-10T01:39:42.000Z", "publisher" : "オライリージャパン", "authors" : "John Viega, Matt Messier", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ネットワークセキュリティHacks―プロが使うテクニック\u0026ツール100選", "isbn" : "4873112060", "date" : "2008-12-10T01:39:42.000Z", "publisher" : "オライリージャパン", "authors" : "アンドリュー ロックハート", "categories" : "", "score" : "", "comment" : "" }, { "title" : "実践ネットワークセキュリティ監査―リスク評価と危機管理", "isbn" : "4873112044", "date" : "2008-12-10T01:39:43.000Z", "publisher" : "オライリージャパン", "authors" : "クリス マクナブ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "セキュリティウォリア―敵を知り己を知れば百戦危うからず", "isbn" : "4873111986", "date" : "2008-12-10T01:39:43.000Z", "publisher" : "オライリージャパン", "authors" : "サイレス パイカリ, アントン チュバキン", "categories" : "", "score" : "", "comment" : "" }, { "title":null,"isbn" : "4873111595", "date" : "2008-12-10T01:39:43.000Z", "publisher":null,"authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Linuxサーバセキュリティ", "isbn" : "4873111498", "date" : "2008-12-10T01:39:43.000Z", "publisher" : "オライリージャパン", "authors" : "マイケル・D. バウアー", "categories" : "", "score" : "", "comment" : "" }, { "title" : "802.11セキュリティ", "isbn" : "4873111285", "date" : "2008-12-10T01:39:43.000Z", "publisher" : "オライリー・ジャパン", "authors" : "Bruce Potter, Bob Fleck", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Webセキュリティ、プライバシー\u0026コマース 下 第2版 システム管理者・コンテンツ提供者編", "isbn" : "4873111102", "date" : "2008-12-10T01:39:43.000Z", "publisher" : "オライリージャパン", "authors" : "シムソン ガーフィンケル, ジーン スパフォード", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Webセキュリティ、プライバシー\u0026コマース 上 第2版 ユーザー編", "isbn" : "4873111099", "date" : "2008-12-10T01:39:43.000Z", "publisher" : "オライリージャパン", "authors" : "シムソン ガーフィンケル, ジーン スパフォード", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Javaセキュリティ", "isbn" : "4873110645", "date" : "2008-12-10T01:39:44.000Z", "publisher" : "オライリー・ジャパン", "authors" : "スコット オークス", "categories" : "", "score" : "", "comment" : "" }, { "title" : "WindowsNT/2000 Server インターネットセキュリティ", "isbn" : "4873110475", "date" : "2008-12-10T01:39:44.000Z", "publisher" : "オライリー・ジャパン", "authors" : "ステファン ノーバーグ, 吉井 孝彦", "categories" : "", "score" : "", "comment" : "" }, { "title" : "追跡!ネットワークセキュリティ24時 第二巻", "isbn" : "4872805593", "date" : "2008-12-10T01:39:44.000Z", "publisher" : "IDGジャパン", "authors" : "山羽 六", "categories" : "", "score" : "", "comment" : "" }, { "title" : "追跡!ネットワークセキュリティ24時 (IDGムックシリーズ)", "isbn" : "4872802500", "date" : "2008-12-10T01:39:44.000Z", "publisher" : "IDGジャパン", "authors" : "山羽六", "categories" : "", "score" : "", "comment" : "" }, { "title" : "2007 情報セキュリティアドミニストレータ「専門知識+記述式問題」重点対策", "isbn" : "4872686195", "date" : "2008-12-10T01:39:44.000Z", "publisher" : "アイテック", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "2007 テクニカルエンジニア情報セキュリティ記述式・事例解析の重点対策 (情報処理技術者試験対策書)", "isbn" : "4872685733", "date" : "2008-12-10T01:39:44.000Z", "publisher" : "アイテック", "authors" : "長谷 和幸", "categories" : "", "score" : "", "comment" : "" }, { "title" : "2007 テクニカルエンジニア情報セキュリティ予想問題集 (情報処理技術者試験対策書)", "isbn" : "4872685725", "date" : "2008-12-10T01:39:44.000Z", "publisher" : "アイテック", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータのためのセキュリティ技術 (専門分野シリーズ)", "isbn" : "4872685415", "date" : "2008-12-10T01:39:44.000Z", "publisher" : "アイテック", "authors" : "三好 康之", "categories" : "", "score" : "", "comment" : "" }, { "title" : "2006-2007 合格への総まとめ 情報セキュリティアドミニストレータ めざせスコア+100 (情報処理技術者試験対策書)", "isbn" : "4872685407", "date" : "2008-12-10T01:39:44.000Z", "publisher" : "アイテック", "authors" : "三好 康之", "categories" : "", "score" : "", "comment" : "" }, { "title" : "2006 徹底解説 情報セキュリティアドミニストレータ 本試験問題 (情報処理技術者試験対策書)", "isbn" : "4872685393", "date" : "2008-12-10T01:39:45.000Z", "publisher" : "アイテック", "authors" : "アイテック情報技術教育研究所", "categories" : "", "score" : "", "comment" : "" }, { "title" : "フード・セキュリティー―だれが世界を養うのか", "isbn" : "4948754226", "date" : "2008-12-10T01:39:53.000Z", "publisher" : "ワールドウォッチジャパン", "authors" : "レスター ブラウン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "はじめてのインターネットサーバセキュリティ UNIX", "isbn" : "4947752181", "date" : "2008-12-10T01:39:53.000Z", "publisher" : "ラピュータ", "authors" : "毛馬内 洋典", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ファイアウォール構築ガイド 第2版―フリーソフトでできるネットワークセキュリティ", "isbn" : "4924998419", "date" : "2008-12-10T01:39:53.000Z", "publisher" : "テクノプレス", "authors" : "一條 博", "categories" : "", "score" : "", "comment" : "" }, { "title" : "UNIX\u0026インターネットセキュリティ", "isbn" : "4900900389", "date" : "2008-12-10T01:39:53.000Z", "publisher" : "オライリー・ジャパン", "authors" : "シムソン ガーフィンケル, ジーン スパフォード", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ファイアウォール構築―インターネット・セキュリティ", "isbn" : "4900900036", "date" : "2008-12-10T01:39:54.000Z", "publisher" : "オライリー・ジャパン", "authors" : "D.ブレント チャップマン, エリザベス・D. ツイッキー", "categories" : "", "score" : "", "comment" : "" }, { "title" : "これで作れる情報セキュリティポリシー―情報セキュリティポリシー策定の為の座右の書", "isbn" : "4898142249", "date" : "2008-12-10T01:39:54.000Z", "publisher" : "ローカス", "authors" : "オーエスケイITコンサルタント課, 大塚商会", "categories" : "", "score" : "", "comment" : "" }, { "title" : "セキュリティ入門for Linux (イントラネットシリーズ)", "isbn" : "4898140343", "date" : "2008-12-10T01:39:54.000Z", "publisher" : "ローカス", "authors" : "高橋 克己, トップマネジメントサービス", "categories" : "", "score" : "", "comment" : "" }, { "title" : "情報セキュリティアドミニストレータコンパクトブック", "isbn" : "4897977568", "date" : "2008-12-10T01:39:54.000Z", "publisher" : "リックテレコム", "authors" : "情報処理技術者試験研究会", "categories" : "", "score" : "", "comment" : "" }, { "title" : "これでできる無線LAN電話工事―置局設計の要点とセキュリティ設定 (ネットワークSE通信SEハンドブック)", "isbn" : "4897976758", "date" : "2008-12-10T01:39:55.000Z", "publisher" : "リックテレコム", "authors" : "小林 佳和", "categories" : "", "score" : "", "comment" : "" }, { "title" : "実際にあった46の情報セキュリティ事件", "isbn" : "4897976618", "date" : "2008-12-10T01:39:55.000Z", "publisher" : "リックテレコム", "authors" : "広口 正之", "categories" : "", "score" : "", "comment" : "" }, { "title" : "テクニカルエンジニア 情報セキュリティコンパクトブック―情報処理技術者試験", "isbn" : "4897976391", "date" : "2008-12-10T01:39:55.000Z", "publisher" : "リックテレコム", "authors" : "竹下 恵", "categories" : "", "score" : "", "comment" : "" }, { "title" : "インターネットでNorton Personal Firewall 2001を使いこなすコツと設定―クラッカーの不正アクセス、個人情報の流出を防ぐセキュリティのテクニック (e titles)", "isbn" : "4896271084", "date" : "2008-12-10T01:39:55.000Z", "publisher" : "メディアテック出版", "authors" : "飯島 弘文", "categories" : "", "score" : "", "comment" : "" }, { "title" : "C言語によるTCP/IPセキュリティプログラミング", "isbn" : "4894717409", "date" : "2008-12-10T01:39:55.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "小俣 光之", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Solaris 8セキュリティ設計", "isbn" : "4894715635", "date" : "2008-12-10T01:39:55.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "エドガー ダニーリャン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ディジタル署名と暗号技術 第2版―安全な電子商取引のためのPKI(公開鍵基盤)、セキュリティシステム、法律基盤", "isbn" : "4894715120", "date" : "2008-12-10T01:39:55.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "ウォーウィック フォード, マイケル バウム", "categories" : "", "score" : "", "comment" : "" }, { "title" : "企業・ユーザーのための情報セキュリティ戦略 (Hewlett‐Packard Professional Books)", "isbn" : "4894715104", "date" : "2008-12-10T01:39:56.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "ドナルド ペプキン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Linuxセキュリティトータルガイド―ファイアウォール・暗号化・侵入検知", "isbn" : "4894714701", "date" : "2008-12-10T01:39:56.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "アロン シャオ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "オープンソース電子メールセキュリティ―安全な電子メールシステムの構築技法", "isbn" : "4894714167", "date" : "2008-12-10T01:39:56.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "リチャード ブルム", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号とネットワークセキュリティ―理論と実際", "isbn" : "4894713675", "date" : "2008-12-10T01:39:56.000Z", "publisher" : "ピアソンエデュケーション", "authors" : "ウィリアム スターリングス", "categories" : "", "score" : "", "comment" : "" }, { "title" : "MCA教科書 Security (MCA教科書)", "isbn" : "4798107794", "date" : "2008-12-10T01:43:55.000Z", "publisher" : "翔泳社", "authors" : "NRIラーニングネットワーク", "categories" : "", "score" : "", "comment" : "" }, { "title" : "The Chief Information Security Officer's Toolkit: Security Program Metrics", "isbn" : "1878109359", "date" : "2008-12-10T01:43:56.000Z", "publisher" : "Asp Pr", "authors" : "Fred Cohen", "categories" : "", "score" : "", "comment" : "" }, { "title" : "The Chief Information Security Officer's Toolkit: Governance Guidebook", "isbn" : "1878109340", "date" : "2008-12-10T01:43:56.000Z", "publisher" : "Asp Pr", "authors" : "Fred Cohen", "categories" : "", "score" : "", "comment" : "" }, { "title" : "RFID Security", "isbn" : "1597490474", "date" : "2008-12-10T01:43:56.000Z", "publisher" : "Syngress", "authors" : "Frank Thornton, Chris Lanthem", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Smart Women Finish Rich: 7 Steps To Achieving Financial Security And Funding Your Dreams", "isbn" : "1593975902", "date" : "2008-12-10T01:43:56.000Z", "publisher" : "MacMillan Audio", "authors" : "David Bach", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Practical Unix and Internet Security (Computer Security (Sebastopol, Calif.).)", "isbn" : "1565921488", "date" : "2008-12-10T01:43:56.000Z", "publisher" : "Oreilly \u0026 Associates Inc", "authors" : "Simson Garfinkel, Gene Spafford", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Actually Useful Internet Security Techniques", "isbn" : "1562055089", "date" : "2008-12-10T01:43:57.000Z", "publisher" : "New Riders Pub", "authors" : "Larry J. Hughes", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Intrusion Detection in Distributed Systems: An Abstraction-Based Approach (Advances in Information Security)", "isbn" : "140207624X", "date" : "2008-12-10T01:43:57.000Z", "publisher" : "Springer", "authors" : "Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Php: Architect's Guide To PHP Security", "isbn" : "0973862106", "date" : "2008-12-10T01:43:57.000Z", "publisher" : "Marco Tabini \u0026 Associates", "authors" : "Ilia Alshanetsky", "categories" : "", "score" : "", "comment" : "" }, { "title" : "In the Name of National Security: Hitchcock, Homophobia, and the Political Construction of Gender in Postwar America (New Americanists)", "isbn" : "0822313863", "date" : "2008-12-10T01:43:57.000Z", "publisher" : "Duke Univ Pr (Tx)", "authors" : "Robert J. Corber", "categories" : "", "score" : "", "comment" : "" }, { "title" : "The Meaning of the Nuclear Revolution: Statecraft and the Prospect of Armageddon (Cornell Studies in Security Affairs)", "isbn" : "0801495652", "date" : "2008-12-10T01:43:57.000Z", "publisher" : "Cornell Univ Pr", "authors" : "Robert Jervis", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Bombing to Win: Air Power and Coercion in War (Cornell Studies in Security Affairs)", "isbn" : "0801483115", "date" : "2008-12-10T01:43:58.000Z", "publisher" : "Cornell Univ Pr", "authors" : "Robert Pape", "categories" : "", "score" : "", "comment" : "" }, { "title" : "The Art of Deception: Controlling the Human Element of Security", "isbn" : "076454280X", "date" : "2008-12-10T01:43:58.000Z", "publisher" : "Wiley", "authors" : "Kevin D. Mitnick, William L. Simon", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Investigative Data Mining for Security and Criminal Detection", "isbn" : "0750676132", "date" : "2008-12-10T01:43:58.000Z", "publisher" : "Butterworth-Heinemann", "authors" : "Jesus Mena", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Hunting Security Bugs", "isbn" : "073562187X", "date" : "2008-12-10T01:43:58.000Z", "publisher" : "Microsoft Press", "authors" : "Tom Gallagher, Bryan Jeffries", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Principles of Information Security", "isbn" : "0619063181", "date" : "2008-12-10T01:43:58.000Z", "publisher" : "Course Technology Ptr (Sd)", "authors" : "Michael E. Whitman, Herbert J. Mattord", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Security And Usability: Designing Secure Systems That People Can Use", "isbn" : "0596008279", "date" : "2008-12-10T01:43:59.000Z", "publisher" : "Oreilly \u0026 Associates Inc", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Essential PHP Security", "isbn" : "059600656X", "date" : "2008-12-10T01:43:59.000Z", "publisher" : "Oreilly \u0026 Associates Inc", "authors" : "Chris Shiflett", "categories" : "", "score" : "", "comment" : "" }, { "title" : "The Myth of Homeland Security", "isbn" : "0471458791", "date" : "2008-12-10T01:43:59.000Z", "publisher" : "Wiley", "authors" : "Marcus Ranum", "categories" : "", "score" : "", "comment" : "" }, { "title":null,"isbn" : "0471453803", "date" : "2008-12-10T01:43:59.000Z", "publisher":null,"authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "The CISSP Prep Guide: Mastering the Ten Domains of Computer Security", "isbn" : "0471413569", "date" : "2008-12-10T01:44:00.000Z", "publisher" : "Wiley", "authors" : "Ronald L. Krutz, Russell Dean Vines", "categories" : "", "score" : "", "comment" : "" }, { "title" : "The Art of Deception: Controlling the Human Element of Security", "isbn" : "0471237124", "date" : "2008-12-10T01:44:00.000Z", "publisher" : "Wiley", "authors" : "Kevin D. Mitnick, William L. Simon", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Mission-Critical Security Planner: When Hackers Won't Take No for an Answer", "isbn" : "0471211656", "date" : "2008-12-10T01:44:00.000Z", "publisher" : "John Wiley \u0026 Sons", "authors" : "Eric Greenberg", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Building Open Source Network Security Tools: Components and Techniques", "isbn" : "0471205443", "date" : "2008-12-10T01:44:00.000Z", "publisher" : "Wiley", "authors" : "Mike Schiffman", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Computer Insecurity", "isbn" : "0412223104", "date" : "2008-12-10T01:44:00.000Z", "publisher" : "Chap.\u0026 H.", "authors" : "Adrian Norman", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Intrusion Detection and Correlation: Challenges and Solutions (Advances in Information Security)", "isbn" : "0387233989", "date" : "2008-12-10T01:44:01.000Z", "publisher" : "Springer", "authors" : "Christopher Kruegel, Fredrik Valeur, Giovanni Vigna", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Beyond Fear: Thinking Sensibly About Security in an Uncertain World", "isbn" : "0387026207", "date" : "2008-12-10T01:44:01.000Z", "publisher" : "Springer", "authors" : "Bruce Schneier", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Applied Security Visualization", "isbn" : "0321510100", "date" : "2008-12-10T01:44:01.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Raffael Marty", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Software Security: Building Security In (Addison-Wesley Software Security Series)", "isbn" : "0321356705", "date" : "2008-12-10T01:44:01.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Gary McGraw", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Extrusion Detection: Security Monitoring for Internal Intrusions", "isbn" : "0321349962", "date" : "2008-12-10T01:44:01.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Richard Bejtlich", "categories" : "", "score" : "", "comment" : "" }, { "title" : "The Tao of Network Security Monitoring: Beyond Intrusion Detection", "isbn" : "0321246772", "date" : "2008-12-10T01:44:01.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Richard Bejtlich", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Real Digital Forensics: Computer Security and Incident Response", "isbn" : "0321240693", "date" : "2008-12-10T01:44:02.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Keith J. Jones, Richard Bejtlich, Curtis W. Rose", "categories" : "", "score" : "", "comment" : "" }, { "title" : "America's Achilles' Heel: Nuclear, Biological, and Chemical Terrorism and Covert Attack (Belfer Center Studies in International Security)", "isbn" : "0262561182", "date" : "2008-12-10T01:44:02.000Z", "publisher" : "The MIT Press", "authors" : "Richard A Falkenrath, Robert D Newman, Bradley A Thayer", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Bare Branches: The Security Implications of Asia's Surplus Male Population (Belfer Center Studies in International Security)", "isbn" : "0262083256", "date" : "2008-12-10T01:44:02.000Z", "publisher" : "The MIT Press", "authors" : "Valerie M. Hudson, Andrea M. Den Boer", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Inside Java(TM) 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition) (Java Series)", "isbn" : "0201787911", "date" : "2008-12-10T01:44:03.000Z", "publisher" : "Prentice Hall PTR", "authors" : "Li Gong, Gary Ellison, Mary Dageforde", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Building Secure Software: How to Avoid Security Problems the Right Way (Addison-Wesley Professional Computing Series)", "isbn" : "020172152X", "date" : "2008-12-10T01:44:03.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "John McGraw, Gary Viega", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Quality Web Systems: Performance, Security, and Usability", "isbn" : "0201719363", "date" : "2008-12-10T01:44:03.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Elfriede Dustin, Jeff Rashka, Douglas McDiarmid", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Information Warfare and Security (ACM Press)", "isbn" : "0201433036", "date" : "2008-12-10T01:44:03.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Dorothy E. Denning", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Internet Denial of Service: Attack and Defense Mechanisms (Radia Perlman Series in Computer Networking and Security)", "isbn" : "0131475738", "date" : "2008-12-10T01:44:03.000Z", "publisher" : "Prentice Hall", "authors" : "Jelena Mirkovic, Sven Dietrich, David Dittrich, Peter Reiher", "categories" : "", "score" : "", "comment" : "" }, { "title" : "CGIハッカーズ・プログラミング―サンプルプログラムでわかる「監視・選別・追跡・対話」のテクニック", "isbn" : "4896271688", "date" : "2008-12-10T02:03:37.000Z", "publisher" : "メディアテック出版", "authors" : "佐藤 信正", "categories" : "", "score" : "", "comment" : "" }, { "title" : "欺術(ぎじゅつ)―史上最強のハッカーが明かす禁断の技法", "isbn" : "479732158X", "date" : "2008-12-10T02:03:37.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "ケビン・ミトニック, ウィリアム・サイモン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ハッカーvs.不正アクセス禁止法", "isbn" : "4535512361", "date" : "2008-12-10T02:03:38.000Z", "publisher" : "日本評論社", "authors" : "園田 寿, 山川 健, 野村 隆昌", "categories" : "", "score" : "", "comment" : "" }, { "title" : "スーパーハッカー入門―超黒客入門", "isbn" : "4887185243", "date" : "2008-12-10T02:03:38.000Z", "publisher" : "データハウス", "authors" : "Vladimir", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ハッカーの教科書", "isbn" : "4887186347", "date" : "2008-12-10T02:03:38.000Z", "publisher" : "データハウス", "authors" : "IPUSIRON", "categories" : "", "score" : "", "comment" : "" }, { "title" : "リアル・ハッカーズ―1993‐1995 サイバースペースに何が起こったか (Eye‐com books)", "isbn" : "4756112137", "date" : "2008-12-10T02:03:38.000Z", "publisher" : "アスキー", "authors" : "橋本 典明", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ハッカー・プログラミング大全", "isbn" : "4887186339", "date" : "2008-12-10T02:03:38.000Z", "publisher" : "データハウス", "authors" : "UNYUN", "categories" : "", "score" : "", "comment" : "" }, { "title" : "テイクダウン―若き天才日本人学者vs超大物ハッカー〈下〉", "isbn" : "4198605025", "date" : "2008-12-10T02:03:39.000Z", "publisher" : "徳間書店", "authors" : "下村 努, ジョン マーコフ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "大人のCGIスクリプト (ハッカージャパンBOOKS)", "isbn" : "4893677020", "date" : "2008-12-10T02:03:39.000Z", "publisher" : "白夜書房", "authors" : "橋本 和明", "categories" : "", "score" : "", "comment" : "" }, { "title" : "FBIが恐れた伝説のハッカー〈下〉", "isbn" : "4794207271", "date" : "2008-12-10T02:03:39.000Z", "publisher" : "草思社", "authors" : "ジョナサン リットマン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Linux版 クラッカー迎撃完全ガイド―本物のハッカーが語るクラッキングの手口と対策", "isbn" : "4844313606", "date" : "2008-12-10T02:03:39.000Z", "publisher" : "インプレス", "authors" : "アノニマス, Anonymous", "categories" : "", "score" : "", "comment" : "" }, { "title" : "天才ハッカー「闇のダンテ」の伝説", "isbn" : "4163535403", "date" : "2008-12-10T02:03:39.000Z", "publisher" : "文藝春秋", "authors" : "ジョナサン リットマン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "VBScriptハッカーズ・プログラミング", "isbn" : "4896272838", "date" : "2008-12-10T02:03:39.000Z", "publisher" : "メディアテック出版", "authors" : "佐藤 信正", "categories" : "", "score" : "", "comment" : "" }, { "title" : "10分でわかるマンガハッカー入門", "isbn" : "4887186940", "date" : "2008-12-10T02:03:40.000Z", "publisher" : "データハウス", "authors" : "Saint, 藤森 異端", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ハッキング非公式ガイド―天才ハッカーから学ぶ攻撃と防御", "isbn" : "4861005302", "date" : "2008-12-10T02:03:40.000Z", "publisher" : "ビー・エヌ・エヌ新社", "authors" : "アンキット・ファディア", "categories" : "", "score" : "", "comment" : "" }, { "title" : "FBIが恐れた伝説のハッカー〈上〉", "isbn" : "4794207263", "date" : "2008-12-10T02:03:40.000Z", "publisher" : "草思社", "authors" : "ジョナサン リットマン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ハッカーの教科書 完全版", "isbn" : "4887188161", "date" : "2008-12-10T02:03:40.000Z", "publisher" : "データハウス", "authors" : "IPUSIRON", "categories" : "", "score" : "", "comment" : "" }, { "title" : "19の罠~ハッカーの挑戦 2", "isbn" : "4798104256", "date" : "2008-12-10T02:03:40.000Z", "publisher" : "翔泳社", "authors" : "マイク・シフマン, アダム・オドネル, ビル・ペニントン, デビッド・ポリーノ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "電脳・ネット犯罪撃退マニュアル―アダルトWeb、アイドルコラージュからハッカー、ウイルスまで", "isbn" : "4810375706", "date" : "2008-12-10T02:03:40.000Z", "publisher" : "同文書院", "authors" : "藤田 悟", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ハッカージャパン21 VOL.5 (白夜ムック Vol. 107)", "isbn" : "4893677209", "date" : "2008-12-10T02:03:40.000Z", "publisher" : "白夜書房", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ハッカー・プログラミング大全 攻撃編", "isbn" : "4887188676", "date" : "2008-12-10T02:03:40.000Z", "publisher" : "データハウス", "authors" : "愛甲 健二", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ハッカーズ その侵入の手口 奴らは常識の斜め上を行く", "isbn" : "4844323164", "date" : "2008-12-10T02:03:41.000Z", "publisher" : "インプレスジャパン", "authors" : "ケビン・ミトニック, ウィリアム・サイモン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ハッカーの挑戦―20のシナリオで学ぶ不正侵入の手口と対策", "isbn" : "4798103616", "date" : "2008-12-10T02:03:41.000Z", "publisher" : "翔泳社", "authors" : "マイク シフマン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Puzzles for Hackers:スクリプトキディから大人のハッカーへ (IT Architects' Archive 知の連環)", "isbn" : "479811135X", "date" : "2008-12-10T02:03:41.000Z", "publisher" : "翔泳社", "authors" : "イワン・スクリャロフ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ゼロから始めるハッカー養成講座 (白夜ムック (211))", "isbn" : "4861910773", "date" : "2008-12-10T02:03:41.000Z", "publisher" : "白夜書房", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "世界ハッカー犯罪白書 (文春文庫)", "isbn" : "4167136260", "date" : "2008-12-10T02:03:41.000Z", "publisher" : "文藝春秋", "authors" : "セルジュ ル・ドラン, フィリップ ロゼ", "categories" : "", "score" : "", "comment" : "" }, { "title" : "シークレット・オブ・スーパーハッカー―あなたのコンピュータも狙われている", "isbn" : "4820711334", "date" : "2008-12-10T02:03:41.000Z", "publisher" : "日本能率協会マネジメントセンター", "authors" : "ナイトメア", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号・ゼロ知識証明・数論", "isbn" : "432002740X", "date" : "2008-12-10T04:37:02.000Z", "publisher" : "共立出版", "authors" : "", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号の秘密とウソ", "isbn" : "4881359967", "date" : "2008-12-10T04:37:18.000Z", "publisher" : "翔泳社", "authors" : "Bruce Schneier, ブルース・シュナイアー", "categories" : "", "score" : "", "comment" : "" }, { "title" : "PGP―暗号メールと電子署名", "isbn" : "4900900028", "date" : "2008-12-10T04:37:32.000Z", "publisher" : "オライリー・ジャパン", "authors" : "シムソン ガーフィンケル", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号解読〈上〉 (新潮文庫)", "isbn" : "410215972X", "date" : "2008-12-10T04:37:48.000Z", "publisher" : "新潮社", "authors" : "サイモン シン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号解読 下巻 (新潮文庫 シ 37-3)", "isbn" : "4102159738", "date" : "2008-12-10T04:37:59.000Z", "publisher" : "新潮社", "authors" : "サイモン シン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号技術大全", "isbn" : "4797319119", "date" : "2008-12-10T04:38:12.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "ブルース・シュナイアー, 山形 浩生, Bruce Schneier", "categories" : "", "score" : "", "comment" : "" }, { "title" : "OpenSSLによるSSLサーバの構築―暗号技術とSSL", "isbn" : "4871938115", "date" : "2008-12-10T04:38:25.000Z", "publisher" : "エーアイ出版", "authors" : "永田 弘康", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号化 プライバシーを救った反乱者たち", "isbn" : "4314009071", "date" : "2008-12-10T04:38:49.000Z", "publisher" : "紀伊國屋書店", "authors" : "スティーブン・レビー", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号技術入門-秘密の国のアリス", "isbn" : "4797322977", "date" : "2008-12-10T04:39:04.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "結城 浩", "categories" : "", "score" : "", "comment" : "" }, { "title" : "現代暗号の基礎数理 (電子情報通信レクチャーシリーズ)", "isbn" : "4339018686", "date" : "2008-12-10T04:39:24.000Z", "publisher" : "コロナ社", "authors" : "黒沢 馨, 尾形 わかは", "categories" : "", "score" : "", "comment" : "" }, { "title" : "暗号理論入門―暗号アルゴリズム、署名と認証、その数学的基礎", "isbn" : "4431708669", "date" : "2008-12-10T04:39:46.000Z", "publisher" : "シュプリンガー・フェアラーク東京", "authors" : "ヨハネス ブーフマン", "categories" : "", "score" : "", "comment" : "" }, { "title" : "これならわかる不正アクセス対策 入門の入門", "isbn" : "479810938X", "date" : "2008-12-10T04:57:39.000Z", "publisher" : "翔泳社", "authors" : "山田 祥寛", "categories" : "", "score" : "", "comment" : "" }, { "title" : "ネットワーク侵入検知―不正侵入の検出と対策", "isbn" : "479731253X", "date" : "2008-12-10T04:57:55.000Z", "publisher" : "ソフトバンククリエイティブ", "authors" : "武田 圭史, 磯崎 宏", "categories" : "", "score" : "", "comment" : "" }, { "title" : "インシデントレスポンス―不正アクセスの発見と対策", "isbn" : "4798102954", "date" : "2008-12-10T04:58:13.000Z", "publisher" : "翔泳社", "authors" : "ケビン マンディア, クリス プロサイス, 坂井 順行", "categories" : "", "score" : "", "comment" : "" }, { "title" : "サイバー監視社会―ユビキタス時代のプライバシー論", "isbn" : "4807604589", "date" : "2008-12-10T05:00:00.000Z", "publisher" : "電気通信振興会", "authors" : "青柳 武彦", "categories" : "", "score" : "", "comment" : "" }, { "title" : "クラッキング防衛大全―不正アクセス手法の傾向とその対策", "isbn" : "4881358812", "date" : "2008-12-10T05:02:27.000Z", "publisher" : "翔泳社", "authors" : "スチュアート マックルー, ジョージ クルツ, ジョエル スキャンベリー", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Buffer Overflow Attacks: Detect, Exploit, Prevent", "isbn" : "1932266674", "date" : "2008-12-10T05:02:54.000Z", "publisher" : "Syngress", "authors" : "Jason Deckard", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Web Hacking: Attacks and Defense", "isbn" : "0201761769", "date" : "2008-12-10T05:03:16.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Stuart McClure, Saumil Shah, Shreeraj Shah", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Intrusion Detection (MTP)", "isbn" : "1578701856", "date" : "2008-12-10T05:03:38.000Z", "publisher" : "Sams", "authors" : "Rebecca Gurley Bace", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Art of Computer Virus Research and Defense, The (Symantec Press)", "isbn" : "0321304543", "date" : "2008-12-10T05:03:51.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Peter Szor", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Honeypots: Tracking Hackers", "isbn" : "0321108957", "date" : "2008-12-10T05:04:12.000Z", "publisher" : "Addison-Wesley Professional", "authors" : "Lance Spitzner", "categories" : "", "score" : "", "comment" : "" }, { "title" : "Snort Intrusion Detection 2.0", "isbn" : "1931836744", "date" : "2008-12-10T05:04:32.000Z", "publisher" : "Syngress", "authors" : "Syngress", "categories" : "", "score" : "", "comment" : "" } ]