Network security books

10034 books were found.

Passive and Active Measurement: 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings

Passive and Active Measurement: 15th International Conference,...

Author: Michalis Faloutsos ,  Aleksandar Kuzmanovic
ISBN: 9783319049175
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 15th International Conference on Passive and Active Measurement,...  Read More >>

Intrusion Detection in Wireless Ad-Hoc Networks

Intrusion Detection in Wireless Ad-Hoc Networks

Author: Nabendu Chaki (University of Calcutta, Kolkata, West Bengal, India) ,  Rituparna Chaki (University of Calcutta, Kolkata, West Bengal, India)
ISBN: 9781466515659
Format: Hardback
$200.00

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects...  Read More >>

Topics in Cryptology -- CT-RSA 2014: The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings

Topics in Cryptology -- CT-RSA 2014: The Cryptographer's...

Author: Josh Benaloh
ISBN: 9783319048512
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2014, CT-RSA 2014,...  Read More >>

Information Security Leakage and Wikileaks

Information Security Leakage and Wikileaks

Author: Aijaz Ahmad Bhat
ISBN: 9781495377716
Format: Paperback
$15.84

 Read More >>

Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency: Is Hollywood's blueprint for Chaos coming true

Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency:...

Author: Mark Osborne
ISBN: 9781493581283
Format: Paperback
$79.20

 Read More >>

Analyzing Security, Trust, and Crime in the Digital World

Analyzing Security, Trust, and Crime in the Digital...

Author: Hamid R. Nemati
ISBN: 9781466648562
Format: Hardback
$415.95

"""This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments,...  Read More >>

Theory of Cryptography: 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings

Theory of Cryptography: 11th International Conference,...

Author: Yehuda Lindell
ISBN: 9783642542411
Format: Paperback
$145.17

The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box...  Read More >>

The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection...

Author: Al-Sakib Khan Pathan (International Islamic University Malaysia, Kuala Lumpur)
ISBN: 9781482203516
Format: Hardback
$323.44

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion...  Read More >>

The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online

The Basics of Digital Privacy: Simple Tools to Protect...

Author: Denny Cherry ((MCSA, MCDBA, MCTS, MCITP, MCM) has been working with Microsoft technology for over 15 years starting with Windows 3.51 and SQL Server 6.5.)
ISBN: 9780128000113
Format: Paperback
$79.07

Teaches you how to protect privacy of your data and your identity while surfing, and interacting with others in...  Read More >>

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

Dragnet Nation: A Quest for Privacy, Security, and Freedom...

Author: Julia Angwin
ISBN: 9780805098075
Format: Hardback
$73.92

An inside look at who's watching you, what they know and why it matters. We are being watched. We see online...  Read More >>

Cyber Escroquerie: L`art Spectaculaire De FOUR-ONE-NINE

Cyber Escroquerie: L`art Spectaculaire De FOUR-ONE-NINE...

Author: Jules Fonba
ISBN: 9781495437601
Format: Paperback
$52.80

Ce livre vous permettra de decouvrir la cyber arnaque (cyber criminalite), tel que vous ne l'auriez jamais imagine....  Read More >>

Secure Cloud Computing

Secure Cloud Computing

Author: Sushil Jajodia ,  Krishna Kant
ISBN: 9781461492771
Format: Hardback
$290.37

This book presents a range of cloud computing security challenges and promising solution paths. In Chapter 2, Chen...  Read More >>

Privacy Technologies and Policy: First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers

Privacy Technologies and Policy: First Annual Privacy...

Author: Bart Preneel ,  Demosthenes Ikonomou
ISBN: 9783642540684
Format: Paperback
$131.97

This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus,...  Read More >>

Anonymizing Health Data

Anonymizing Health Data

Author: Khaled El Emam ,  Luk Arbuckle
ISBN: 9781449363079
Format: Paperback
$92.37

 Read More >>

Applied Network Security Monitoring: Collection, Detection, and Analysis

Applied Network Security Monitoring: Collection, Detection,...

Author: Chris Sanders (Senior Information Security Analyst at the DoD, Trainer, and Author) ,  Jason Smith
ISBN: 9780124172081
Format: Paperback
$131.87

A guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens...  Read More >>

Internet and the Law: Technology, Society, and Compromises

Internet and the Law: Technology, Society, and Compromises...

Author: Aaron Schwabach
ISBN: 9781610693493
Format: Hardback
$190.00

The world of Internet law is constantly changing and is difficult to follow, even for those for whom doing so is...  Read More >>

RTFM: Red Team Field Manual

RTFM: Red Team Field Manual

Author: Ben Clark
ISBN: 9781494295509
Format: Paperback
$26.40

The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely...  Read More >>

Mobile Platform Security

Mobile Platform Security

Author: N. Asokan ,  Lucas Davi
ISBN: 9783031012136
Format: Paperback
$100.29

We present a generic model for mobile platform security architectures: the model illustrates commonly used security...  Read More >>

Critical Information Infrastructures Security: 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers

Critical Information Infrastructures Security: 8th International...

Author: Eric Luiijf ,  Pieter Hartel
ISBN: 9783319039633
Format: Paperback
$142.29

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information...  Read More >>

419 the Cyberscam Game: Knowing the Hidden Corners of Their Lives

419 the Cyberscam Game: Knowing the Hidden Corners of...

Author: Jules Fonba Fonba Jf
ISBN: 9781495412141
Format: Paperback
$39.60

The main aspiration of this book is for the readers to grip an inward notion of the secret garden of cyber scammers....  Read More >>

Security and Privacy in Communication Networks: 9th International ICST Conference, SecureComm 2013, Revised Selected Papers

Security and Privacy in Communication Networks: 9th...

Author: Tanveer Zia ,  Albert Zomaya
ISBN: 9783319042824
Format: Paperback
$142.29

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference...  Read More >>

Network Security Through Data Analysis: Building Situational Awareness

Network Security Through Data Analysis: Building Situational...

Author: Michael Collins (Oxford College of Further Education)
ISBN: 9781449357887
Format: Undefined
$113.49

"Traditional intrusion detection and logfile analysis are no longer enough to protect today s complex networks....  Read More >>

Applied Network Security Monitoring: Using Open Source Tools

Applied Network Security Monitoring: Using Open Source...

Author: Chris Sanders ,  Jason Smith (Canoe & Kayak UK Magazine Southern Utah University Southern Utah University Southern Utah University Southern Utah University Southern Utah University Southern Utah University)
ISBN: 9781306167833
Format: Electronic book text
$158.24

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This...  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List