Free Delivery Over $100
10034 books were found.
Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability,... Read More >>
Web services technologies are advancing fast and being extensively deployed in many di?erent application environments.... Read More >>
This book constitutes the proceedings of the First International Conference on Security Standardisation Research,... Read More >>
Read More >>
Not a day goes by where we don't hear about everything from hacked accounts and computers, to viruses, spyware and... Read More >>
In the past four decades, information technology has altered chains of value production, distribution, and information... Read More >>
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security,... Read More >>
The term “risk” is known from many fields, and we are used to references to contractual risk, economic risk, operational... Read More >>
Updated January 13, 2015 Protect your Mac's data in the event of theft with Apple's FileVault!If your Mac were stolen,... Read More >>
This book is intended for security professionals who want to enhance their wireless penetration testing skills and... Read More >>
If you have some experience with Zabbix and wish to take your infrastructure to the next level, then this book is... Read More >>
If you are a system administrator, Linux administrator, cloud developer, cloud administrator, or someone who just... Read More >>
If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your... Read More >>
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the... Read More >>
Die Autoren führen in die Kryptographie aus Sicht der Informatik und Mathematik ein. Die grundlegenden Typen kryptographischer... Read More >>
Use this handy pocket size password reminder to keep track of passwords and login details, or add notes like hints... Read More >>
Network Defense and Countermeasures: Principles and Practices Everything you need to know about modern network attacks... Read More >>
It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this conf-... Read More >>
After an introduction to cryptography and data security, the authors of this book explain the main techniques in... Read More >>
Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact?... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on... Read More >>
This cyber survival guide uses the Zombie Apocalypse to teach novices the basics of computer security, online safety... Read More >>