Network security books

10034 books were found.

Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers

Digital-Forensics and Watermarking: 12th International...

Author: Yun Qing Shi ,  Hyoung-Joong Kim
ISBN: 9783662438855
Format: Paperback
$116.41

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics...  Read More >>

Advances in Cryptology -- CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I

Advances in Cryptology -- CRYPTO 2014: 34th Annual Cryptology...

Author: Juan A. Garay ,  Rosario Gennaro
ISBN: 9783662443705
Format: Paperback
$181.10

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International...  Read More >>

Risk Assessment and Risk-Driven Testing: First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers

Risk Assessment and Risk-Driven Testing: First International...

Author: Thomas Bauer ,  Jürgen Großmann
ISBN: 9783319070759
Format: Paperback
$90.54

This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk...  Read More >>

Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers

Fast Software Encryption: 20th International Workshop,...

Author: Shiho Moriai
ISBN: 9783662439326
Format: Paperback
$145.17

 Read More >>

Cyberspace and Cybersecurity: Chinese translation

Cyberspace and Cybersecurity: Chinese translation

Author: Dr George K Kostopoulos ,  Riley Repko
ISBN: 9781477669617
Format: Paperback
$145.20

 Read More >>

Slandered and Helpless: In Defense of Your Reputation Online & Offline

Slandered and Helpless: In Defense of Your Reputation...

Author: Treat Preston
ISBN: 9781500985950
Format: Paperback
$26.06

Reputation Management: Slandered and Helpless - In Defense of Your Reputation Online & Offline is an eye-opening...  Read More >>

Architecting User-Centric Privacy-as-a-Set-of-Services: Digital Identity-Related Privacy Framework

Architecting User-Centric Privacy-as-a-Set-of-Services:...

Author: Ghazi Ben Ayed
ISBN: 9783319082301
Format: Hardback
$284.60

The framework is intended to distill privacy-related digital identity requirements (business interoperability) into...  Read More >>

Trustworthy Computing and Services: International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers

Trustworthy Computing and Services: International Conference,...

Author: Yuyu Yuan ,  Xu Wu
ISBN: 9783662439074
Format: Paperback
$168.16

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed...  Read More >>

Pervasive Wireless Environments: Detecting and Localizing User Spoofing

Pervasive Wireless Environments: Detecting and Localizing...

Author: Jie Yang ,  Yingying Chen
ISBN: 9783319073552
Format: Paperback
$116.41

This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated...  Read More >>

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

The Basics of Information Security: Understanding the...

Author: Jason Andress (CISSP, ISSAP, CISM, GPEN) ,  Jason Andress (CISSP, ISSAP, CISM, GPEN)
ISBN: 9780128007440
Format: Paperback
$92.27

Provides you with fundamental knowledge of information security in both theoretical and practical aspects. This...  Read More >>

Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings

Information Security and Privacy: 19th Australasian...

Author: Willy Susilo ,  Yi Mu
ISBN: 9783319083438
Format: Paperback
$145.17

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security...  Read More >>

Information Security Theory and Practice. Securing the Internet of Things: 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings

Information Security Theory and Practice. Securing the...

Author: David Naccache ,  Damien Sauveron
ISBN: 9783662438251
Format: Paperback
$142.29

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security...  Read More >>

Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings

Monitoring and Securing Virtualized Networks and Services:...

Author: Anna Sperotto ,  Guillaume Doyen
ISBN: 9783662438619
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 8th IFIP WG 6.6 International Conference on Monitoring and...  Read More >>

Corporate Computer Security

Corporate Computer Security

Author: Randall Boyle ,  Raymond Panko
ISBN: 9780133545197
Format: Hardback
$580.77

For introductory courses in IT Security.   A strong business focus through a solid technical presentation of...  Read More >>

Legal Issues In Information Security

Legal Issues In Information Security

Author: Joanna Lyn Grama
ISBN: 9781284054743
Format: Paperback
$199.50

Part of the Jones & Bartlett Learning Information Systems Security and Assurance Series Revised and updated to...  Read More >>

Applied Cryptography and Network Security: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings

Applied Cryptography and Network Security: 12th International...

Author: Ioana Boureanu ,  Philippe Owesarski
ISBN: 9783319075358
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and...  Read More >>

Hackers Underground Knowledge: Quick and easy way to learn secret hacker techniques

Hackers Underground Knowledge: Quick and easy way to...

Author: Martin Kohler
ISBN: 9781500719821
Format: Paperback
$19.40

This practical guide to penetration security-systems, writen by ethical hackers, IT professionals, and security...  Read More >>

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers

Trust Extension as a Mechanism for Secure Code Execution...

Author: Bryan Jeffrey Parno
ISBN: 9781627054775
Format: Paperback
$158.27

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections....  Read More >>

Network Topology in Command and Control: Organization, Operation, and Evolution

Network Topology in Command and Control: Organization,...

Author: T. J. Grant ,  R. H. P. Janssen
ISBN: 9781466660588
Format: Hardback
$559.95

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive...  Read More >>

Game Theory Applications in Network Design

Game Theory Applications in Network Design

Author: Sungwook Kim ,  Dr Kim, Chong, Melissa Elizabeth Melissa Melissa Melissa Melissa Richard Richard Elizabeth Sangduk Sangduk Sangduk Yoonji
ISBN: 9781466660502
Format: Hardback
$584.95

The use of game theoretic techniques is playing an increasingly important role in the network design domain. Understanding...  Read More >>

iRules: What Every Tech-Healthy Family Needs to Know about Selfies, Sexting, Gaming, and Growing Up

iRules: What Every Tech-Healthy Family Needs to Know...

Author: Janell Hofmann ,  Carrington MacDuffie
ISBN: 9781467684330
Format: Pre-recorded MP3 player
$171.57

 Read More >>

Lab Manual To Accompany Auditing IT Infrastructure For Compliance

Lab Manual To Accompany Auditing IT Infrastructure For...

Author: Martin Weiss
ISBN: 9781284059182
Format: Paperback
$77.90

The Laboratory Manual to Accompany Auditing IT Infrastructure for Compliance is the lab companion to Weiss' Auditing...  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List