Free Delivery Over $100
10034 books were found.
The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems... Read More >>
2016 Revision! Your complete resource to protect you, your family, and your community from digital crime Every day,... Read More >>
It is estimated that 97 percent of teens ages 12 to 17 play video games. And often these games are played online,... Read More >>
This guide to privacy for Facebook helps readers navigate the settings on their accounts, what to share, what not... Read More >>
Read More >>
An informational guide to being safe and secure while doing business on the internet. Read More >>
This practical, professional book provides a scenario-based guide to the industry's #1 digital forensics tool, EnCase... Read More >>
More than 1 billion online usernames and passwords have been stolen by cybercriminals. Chances are that some of... Read More >>
What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments,... Read More >>
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security... Read More >>
This book constitutes the refereed proceedings of the 11th International Conference on Applied Cryptography and... Read More >>
Trying to keep up with todays technology can be Read More >>
"""This book provides a discussion on the latest research achievements in wireless networks and broadband technology,... Read More >>
Explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic... Read More >>
Examines methods of developing and regulating compatibility standards in the ICT industry, assisting organisations... Read More >>
Provides empirical research on the engineering of social network infrastructures, the development of novel applications,... Read More >>
Die Normreihe ISO 27000 und der IT-Grundschutz werden immer wichtiger für Unternehmen und Behörden, die ein IT-Sicherheitsmanagement... Read More >>