Free Delivery Over $100
10034 books were found.
This book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement,... Read More >>
Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects... Read More >>
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014,... Read More >>
Read More >>
"""This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments,... Read More >>
The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box... Read More >>
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion... Read More >>
Teaches you how to protect privacy of your data and your identity while surfing, and interacting with others in... Read More >>
An inside look at who's watching you, what they know and why it matters. We are being watched. We see online... Read More >>
Ce livre vous permettra de decouvrir la cyber arnaque (cyber criminalite), tel que vous ne l'auriez jamais imagine.... Read More >>
This book presents a range of cloud computing security challenges and promising solution paths. In Chapter 2, Chen... Read More >>
This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus,... Read More >>
A guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens... Read More >>
The world of Internet law is constantly changing and is difficult to follow, even for those for whom doing so is... Read More >>
The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely... Read More >>
We present a generic model for mobile platform security architectures: the model illustrates commonly used security... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information... Read More >>
The main aspiration of this book is for the readers to grip an inward notion of the secret garden of cyber scammers.... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference... Read More >>
"Traditional intrusion detection and logfile analysis are no longer enough to protect today s complex networks.... Read More >>
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This... Read More >>