Free Delivery Over $100
10034 books were found.
Protecting Our Future, Volume 1, brings together cybersecurity experts to assess operational challenges and workforce... Read More >>
At the network level, RFID security means that RFID information should be shared with authorized parties only, while... Read More >>
Die Enthüllungen von Edward Snowden über die Bespitzelung europäischer Bürger und Regierungen durch die NSA und... Read More >>
Password Keeper Never lose a password again. Keep track of them in this password organizer. It's a sleek and has... Read More >>
Password KeeperKeep track of your password with the retro comic password organizer. It's a sleek and cool password... Read More >>
(ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles,... Read More >>
Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>
Password KeeperEnd your lost password frustrations with this bitty-sized password organizer. It's a sleek and classic... Read More >>
Computer viruses can be confusing. They can also be fascinating. This book is about a notorious computer virus Stuxnet.... Read More >>
This book provides robust and useful information for improving the security of enterprise and service provider networks... Read More >>
Die Diskussion um die „Vorratsdatenspeicherung“ spiegelt das Spannungsverhältnis zwischen Freiheits- und Sicherheitsinteressen.... Read More >>
The National Security Agency(NSA) seems to be crumbling under the weight of the allegations made by their former... Read More >>
Around the globe, nations face the problem of protecting their Critical Information Infrastructure, normally referred... Read More >>
The Information Technology Security Specialist Passbook (R) prepares you for your test by allowing you to take practice... Read More >>
"""This book presents theoretical frameworks and the latest research findings in network security technologies while... Read More >>
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital... Read More >>
This is a practical and fast-paced guide that gives you all the information you need to start implementing secure... Read More >>
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business... Read More >>