Free Delivery Over $100
10027 books were found.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
Protect yourself and your business against embezzlement, identity theft, and online hackers. Learn how the bad guys... Read More >>
This book focuses on the combined cyber and physical security issues in advanced electric smart grids. Future defenses... Read More >>
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In... Read More >>
This book is a guide on how to do network penetration testing. The first part of the book guides you on how to penetrate... Read More >>
An urgently needed examination of the current cyber revolution that draws on case studies to develop conceptual... Read More >>
150 Things You Should Know about Security, Second Edition covers the essential tips and techniques for the latest... Read More >>
The classic guide to network and Internet security has been thoroughly updated for today's latest security threats.... Read More >>
In The Secret Life, the essayist and novelist Andrew O'Hagan explores how we no longer question the reality of online... Read More >>
The slippery online ecosystem is the perfect breeding ground for identities: true, false, and in between. The Internet... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference... Read More >>
This book is an excellent guide for you on how to use Nmap 7. The first part of the book guides you on how to get... Read More >>
In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker’s toolkit,... Read More >>
Read More >>
This book constitutes the proceedings of the 15th International Conference on Smart Homes and Health Telematics,... Read More >>
The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium... Read More >>
Understanding the Fundamentals of InfoSec in Theory and Practice gives you clear-non-technical explanations of how... Read More >>
The second edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S.... Read More >>
Do you or someone in your house: have a computer, an iPad, or a smartphone? browse the internet, use e-mail... Read More >>
Using Cisco Secure Access Architecture and Cisco Identity Services Engine, you can secure and gain control of access... Read More >>