Free Delivery Over $100
10034 books were found.
Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware... Read More >>
The papers address all current topics in computer security, including network security, authentication, malware,... Read More >>
A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S.... Read More >>
Today's networks are required to support an increasing array of real-time communication methods. Video chat, real-time... Read More >>
Read More >>
This book offers practical advice on how to make your life, home, and travel more secure. Inside you will learn... Read More >>
Want to learn Ethical Hacking from Scratch. From Computer safety to wi-fi protection, everything is included in... Read More >>
"""Security Policies and Implementation Issues offers a comprehensive view of information security policies and... Read More >>
This book constitutes the refereed proceedings of the 11th IFIP TC 9 International Conference on Human Choice and... Read More >>
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues... Read More >>
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution:... Read More >>
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the... Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital... Read More >>
This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in... Read More >>
This book constitutes the proceedings of the 5th International Conference on Interactive Theorem Proving, ITP 2014,... Read More >>
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Revised and updated with... Read More >>
The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother... Read More >>
This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management,... Read More >>
In some cases, certain coherent structures can exist in stochastic dynamic systems almost in every particular realization... Read More >>