Network security books

10031 books were found.

Cyber Warfare: Building the Scientific Foundation

Cyber Warfare: Building the Scientific Foundation

Author: Sushil Jajodia ,  Paulo Shakarian
ISBN: 9783319360072
Format: Paperback
$369.57

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including...  Read More >>

Pattern and Security Requirements: Engineering-Based Establishment of Security Standards

Pattern and Security Requirements: Engineering-Based...

Author: Kristian Beckers
ISBN: 9783319365879
Format: Paperback
$290.37

 Read More >>

Understanding Network Hacks: Attack and Defense with Python

Understanding Network Hacks: Attack and Defense with...

Author: Bastian Ballmann
ISBN: 9783662508626
Format: Paperback
$131.97

 Read More >>

Innovative Security Solutions for Information Technology and Communications: 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers

Innovative Security Solutions for Information Technology...

Author: Ion Bica ,  Reza Reyhanitabar
ISBN: 9783319472379
Format: Paperback
$116.41

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on...  Read More >>

Critical Infrastructure Protection VII: 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers

Critical Infrastructure Protection VII: 7th IFIP WG...

Author: Jonathan Butts ,  Sujeet Shenoi
ISBN: 9783662525432
Format: Paperback
$182.42

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital...  Read More >>

Critical Infrastructure Protection VIII: 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers

Critical Infrastructure Protection VIII: 8th IFIP WG...

Author: Jonathan Butts ,  Sujeet Shenoi
ISBN: 9783662526163
Format: Paperback
$182.42

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital...  Read More >>

Security Solutions for Hyperconnectivity and the Internet of Things

Security Solutions for Hyperconnectivity and the Internet...

Author: Maurice Dawson ,  Mohamed Eltayeb
ISBN: 9781522507413
Format: Hardback
$503.95

Offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect...  Read More >>

Online Banking Security Measures and Data Protection

Online Banking Security Measures and Data Protection...

Author: Shadi A. Aljawarneh
ISBN: 9781522508649
Format: Hardback
$503.95

Presents the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary...  Read More >>

Trusted Cloud Computing

Trusted Cloud Computing

Author: Helmut Krcmar ,  Ralf Reussner
ISBN: 9783319385228
Format: Paperback
$221.23

This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental...  Read More >>

The Hash Function BLAKE

The Hash Function BLAKE

Author: Jean-Philippe Aumasson ,  Willi Meier
ISBN: 9783662525975
Format: Paperback
$197.94

It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using...  Read More >>

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense

Author: Nicholas Antill ,  Michael Simpson
ISBN: 9781285454610
Format: Mixed media product
$715.31

A work from Cengage Learning on hands-on ethical hacking and network defense.  Read More >>

How Privacy Keeps You From Tindering: To swipe or not to swipe!: Privacy and The Law

How Privacy Keeps You From Tindering: To swipe or not...

Author: Sandra Odisho
ISBN: 9781539753223
Format: Paperback
$52.80

What do we mean when we say Privacy? Are any of us actually protected? Does Tinder follow their privacy policy in...  Read More >>

Chaotic Secure Communication: Principles and Technologies

Chaotic Secure Communication: Principles and Technologies...

Author: Kehui Sun ,  Tsinghua University Press
ISBN: 9783110426885
Format: Hardback
$205.83

The monograph begins with a systematic introduction of chaos and chaos synchronization, and then extends to the...  Read More >>

Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect your email, computer, and bank accounts from hackers, malware, and identity theft

Hack-Proof Your Life Now!: The New Cybersecurity Rules:...

Author: Sean M Bailey ,  Kropp Devin
ISBN: 9780997729009
Format: Paperback
$52.67

Smart online security is critical. But guidance for staying safe has been fragmented and confusing-until now. Hack-Proof...  Read More >>

Game Theoretic Analysis of Congestion, Safety and Security: Networks, Air Traffic and Emergency Departments

Game Theoretic Analysis of Congestion, Safety and Security:...

Author: Kjell Hausken ,  Jun Zhuang
ISBN: 9783319366326
Format: Paperback
$258.72

Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments,...  Read More >>

Trusted Computing Platforms: TPM2.0 in Context

Trusted Computing Platforms: TPM2.0 in Context

Author: Graeme Proudler ,  Liqun Chen
ISBN: 9783319356907
Format: Paperback
$206.97

In this book the authors first describe the background of trusted platforms and trusted computing and speculate...  Read More >>

Attribute-based Credentials for Trust: Identity in the Information Society

Attribute-based Credentials for Trust: Identity in the...

Author: Kai Rannenberg ,  Jan Camenisch
ISBN: 9783319381947
Format: Paperback
$302.74

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard,...  Read More >>

Cyber Defense and Situational Awareness

Cyber Defense and Situational Awareness

Author: Alexander Kott ,  Cliff Wang
ISBN: 9783319380261
Format: Paperback
$263.97

 Read More >>

Autonomous Agents and Multiagent Systems: AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016, Revised Selected Papers

Autonomous Agents and Multiagent Systems: AAMAS 2016...

Author: Nardine Osman ,  Carles Sierra
ISBN: 9783319468396
Format: Paperback
$116.41

 Read More >>

Hacking Wireless Networks for Dummies

Hacking Wireless Networks for Dummies

Author: David Easter
ISBN: 9781979670166
Format: Paperback
$63.68

 Read More >>

Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers

Advances in Digital Forensics X: 10th IFIP WG 11.9 International...

Author: Gilbert Peterson ,  Sujeet Shenoi
ISBN: 9783662526088
Format: Paperback
$214.76

This book is the 10th volume in the annual series produced by the International Federation for Information Processing...  Read More >>

Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice

Cyber-Development, Cyber-Democracy and Cyber-Defense:...

Author: Elias G. Carayannis ,  David F. J. Campbell
ISBN: 9781493952915
Format: Paperback
$290.37

By promoting dissemination and sharing of knowledge, cyber-democracy allows a knowledge conversion of the local...  Read More >>

Trusted Computing for Embedded Systems

Trusted Computing for Embedded Systems

Author: Bernard Candaele ,  Dimitrios Soudris
ISBN: 9783319362793
Format: Paperback
$232.85

Trusted Computing for Embedded Systems  Read More >>

Trust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings

Trust Management VIII: 8th IFIP WG 11.11 International...

Author: Jianying Zhou ,  Nurit Gal-Oz
ISBN: 9783662515624
Format: Paperback
$182.42

This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management,...  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List