Free Delivery Over $100
10034 books were found.
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics... Read More >>
The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International... Read More >>
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk... Read More >>
Read More >>
Reputation Management: Slandered and Helpless - In Defense of Your Reputation Online & Offline is an eye-opening... Read More >>
The framework is intended to distill privacy-related digital identity requirements (business interoperability) into... Read More >>
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed... Read More >>
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated... Read More >>
Provides you with fundamental knowledge of information security in both theoretical and practical aspects. This... Read More >>
This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security... Read More >>
This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security... Read More >>
This book constitutes the refereed proceedings of the 8th IFIP WG 6.6 International Conference on Monitoring and... Read More >>
For introductory courses in IT Security. A strong business focus through a solid technical presentation of... Read More >>
Part of the Jones & Bartlett Learning Information Systems Security and Assurance Series Revised and updated to... Read More >>
This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and... Read More >>
This practical guide to penetration security-systems, writen by ethical hackers, IT professionals, and security... Read More >>
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections.... Read More >>
Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive... Read More >>
The use of game theoretic techniques is playing an increasingly important role in the network design domain. Understanding... Read More >>
The Laboratory Manual to Accompany Auditing IT Infrastructure for Compliance is the lab companion to Weiss' Auditing... Read More >>