Network security books

10034 books were found.

Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure

Windows 2012 Server Network Security: Securing Your...

Author: Derrick Rountree ((CISSP, CASP, MCSE) has been in the IT field for almost 20 years.)
ISBN: 9781597499583
Format: Paperback
$131.87

Provides the guide to deploying and maintaining a secure Windows network. This book drills down into all the features...  Read More >>

Read Me First: Android Game Development for Kids and Adults (Free Game and Source Code Included)

Read Me First: Android Game Development for Kids and...

Author: Newton Lee
ISBN: 9781489580344
Format: Paperback
$34.29

To code, or not to code? Bill Gates, Mark Zuckerberg, will.i.am, and other luminaries appeared in a 2013 YouTube...  Read More >>

Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013, Proceedings

Network and System Security: 7th International Conference,...

Author: Javier Lopez ,  Xinyi Huang
ISBN: 9783642386305
Format: Paperback
$221.23

This book constitutes the proceedings of the 7th International Conference on Network and System Security, NSS 2013,...  Read More >>

Understanding Cyber Warfare and its Implications for Indian Armed Forces

Understanding Cyber Warfare and its Implications for...

Author: R. K. Tyagi
ISBN: 9789382652090
Format: Hardback
$90.54

The book is divided into two parts. Part 1 deals with cyber warfare in general bringing out the unique characteristics...  Read More >>

Untangling the Web: The Nsa's Guide to Gathering Information on Google

Untangling the Web: The Nsa's Guide to Gathering Information...

Author: Nsa
ISBN: 9780984284498
Format: Paperback
$105.57

 Read More >>

The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend

The Four Pillars of Endpoint Security: Safeguarding...

Author: Dan Griffin
ISBN: 9781475232707
Format: Paperback
$52.77

Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime...  Read More >>

Internet Privacy: Options for adequate realisation

Internet Privacy: Options for adequate realisation

Author: Johannes Buchmann
ISBN: 9783642379123
Format: Paperback
$194.04

"A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume...  Read More >>

Iris Biometric Model for Secured Network Access

Iris Biometric Model for Secured Network Access

Author: Franjieh El Khoury (Université Claude Bernard, Villeurbanne, France)
ISBN: 9781466502130
Format: Hardback
$315.00

This book proposes a new model—the IrisCryptoAgentSystem (ICAS)—based on a biometric method for authentication using...  Read More >>

A Fierce Domain: Conflict in Cyberspace, 1986 to 2012

A Fierce Domain: Conflict in Cyberspace, 1986 to 2012...

Author: Jason Healey (Atlantic Council of the United States Washington D C) ,  Karl Grindal
ISBN: 9780989327411
Format: Hardback
$92.40

"A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history...  Read More >>

Privacy for Location-based Services

Privacy for Location-based Services

Author: Gabriel Ghinita
ISBN: 9783031012082
Format: Paperback
$64.66

Sharing of location data enables numerous exciting applications, such as location-based queries, location-based...  Read More >>

Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedings

Policies and Research in Identity Management: Third...

Author: Simone Fischer-Hübner ,  Elisabeth de Leeuw
ISBN: 9783642372810
Format: Hardback
$181.10

The papers have been organized into topical sections on privacy and identity management, anonymous credentials,...  Read More >>

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

Applied Cyber Security and the Smart Grid: Implementing...

Author: Eric D. Knapp (Director <br>Strategic Alliances for Wurldtech Security Technologies) ,  Raj Samani (VP, CTO for McAfee EMEA; CLAS, CISSP, CEH, MCSE, CCSA, CCSE-NG, CCA, CCNA)
ISBN: 9781597499989
Format: Paperback
$158.27

Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just...  Read More >>

International Journal of Risk and Contingency Management, Vol 2 ISS 1

International Journal of Risk and Contingency Management,...

Author: Strang
ISBN: 9781466630710
Format: Paperback
$228.95

 Read More >>

Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems: 7th IFIP WG 11.2 International Workshop, WIST 2013, Heraklion, Greece, May 28-30, 2013, Proceedings

Information Security Theory and Practice. Security of...

Author: Lorenzo Cavallaro ,  Dieter Gollmann
ISBN: 9783642385292
Format: Paperback
$142.29

This volume constitutes the refereed proceedings of the 7th IFIP WG 11.2 International Workshop on Information Security...  Read More >>

Information Security Practice and Experience: 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013, Proceedings

Information Security Practice and Experience: 9th International...

Author: Robert H. Deng ,  Tao Feng
ISBN: 9783642380327
Format: Paperback
$142.29

This book constitutes the refereed proceedings of the 9th International Conference on Information Security Practice...  Read More >>

Security and Trust Management: 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

Security and Trust Management: 8th International Workshop,...

Author: Audun Jøsang ,  Pierangela Samarati
ISBN: 9783642380037
Format: Paperback
$116.41

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security...  Read More >>

Information Security and Cryptology -- ICISC 2012: 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers

Information Security and Cryptology -- ICISC 2012: 15th...

Author: Taekyoung Kwon ,  Mun-Kyu Lee
ISBN: 9783642376818
Format: Paperback
$155.22

This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on...  Read More >>

The Zealots Guide To Computer Security 2013

The Zealots Guide To Computer Security 2013

Author: Professor of Political Science Brian Taylor (Ulster University UK)
ISBN: 9781484977248
Format: Paperback
$52.77

Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering...  Read More >>

Smart Grid Security: First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers

Smart Grid Security: First International Workshop, SmartGridSec...

Author: Jorge Cuellar
ISBN: 9783642380297
Format: Paperback
$131.97

The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus...  Read More >>

Read Me First: Sex, Lies, and Online Dating

Read Me First: Sex, Lies, and Online Dating

Author: Newton Lee
ISBN: 9781490462387
Format: Paperback
$21.09

From the author of Facebook Nation In Amy Webb's 2013 TED talk titled How I hacked online dating, she said that...  Read More >>

Advanced DPA Theory and Practice: Towards the Security Limits of Secure Embedded Circuits

Advanced DPA Theory and Practice: Towards the Security...

Author: Eric Peeters
ISBN: 9781461467823
Format: Hardback
$290.37

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely...  Read More >>

America is Under Cyber Attack: Why Urgent Action is Needed

America is Under Cyber Attack: Why Urgent Action is...

Author: Investigation Subcommittee on Oversight
ISBN: 9781484826157
Format: Paperback
$44.75

The purpose of our hearing is to examine the evolving computer hacking threats from nation-states and hacker groups...  Read More >>

Ethical Governance of Emerging Technologies Development

Ethical Governance of Emerging Technologies Development...

Author: Fernand Doridot ,  Penny Duquenoy
ISBN: 9781466636705
Format: Hardback
$415.95

The more integrated technology becomes in our everyday lives and businesses, the more vital it grows that its applications...  Read More >>

Security for Wireless Implantable Medical Devices

Security for Wireless Implantable Medical Devices

Author: Xiali Hei ,  Xiaojiang Du
ISBN: 9781461471523
Format: Paperback
$145.17

 Read More >>

Enterprise Identity Management: Towards an Investment Decision Support Approach

Enterprise Identity Management: Towards an Investment...

Author: Denis Royer
ISBN: 9783642350399
Format: Hardback
$258.72

​The introduction of Enterprise Identity Management Systems (EIdMS) in organizations even beyond the purely technological...  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List