Network security books

10034 books were found.

Communications and Multimedia Security Issues of the New Century: IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany

Communications and Multimedia Security Issues of the...

Author: Ralf Steinmetz ,  Jana Dittmann
ISBN: 9781475748116
Format: Paperback
$580.77

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security...  Read More >>

Secure Information Networks: Communications and Multimedia Security IFIP TC6/TC11 Joint Working Conference on Communications and Multimedia Security (CMS’99) September 20–21, 1999, Leuven, Belgium

Secure Information Networks: Communications and Multimedia...

Author: Bart Preneel
ISBN: 9781475764871
Format: Paperback
$580.77

This volume contains papers presented at the fourth working conference on Communications and Multimedia Security...  Read More >>

Cloud Computing Protected: Security Assessment Handbook

Cloud Computing Protected: Security Assessment Handbook...

Author: John Rhoton ,  Jan De Clercq
ISBN: 9780956355621
Format: Paperback
$77.50

Cloud Computing Protected describes the most important security challenges that organizations face by adopting...  Read More >>

Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers

Data Privacy Management and Autonomous Spontaneous Security:...

Author: Roberto Di Pietro ,  Javier Herranz
ISBN: 9783642358890
Format: Paperback
$116.41

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International...  Read More >>

Transactions on Computational Science XVII

Transactions on Computational Science XVII

Author: Marina Gavrilova ,  C.J. Kenneth Tan
ISBN: 9783642358395
Format: Paperback
$145.17

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational...  Read More >>

Selected Areas in Cryptography: 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers

Selected Areas in Cryptography: 19th International Conference,...

Author: Lars R. Knudsen ,  Huapeng Wu
ISBN: 9783642359989
Format: Paperback
$155.22

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on...  Read More >>

Are Your Hacker Proof?

Are Your Hacker Proof?

Author: Gregory D Evans
ISBN: 9780982609125
Format: Paperback
$52.67

In order to catch a thief, it takes a thief. In order to catch a hacker, it takes a hacker. In order to catch an...  Read More >>

Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings

Topics in Cryptology - CT- RSA 2013: The Cryptographer`s...

Author: Ed Dawson
ISBN: 9783642360947
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013,...  Read More >>

Guide to Network Defense and Countermeasures

Guide to Network Defense and Countermeasures

Author: Randy Weaver (Everst College, Arizona) ,  Dawn Weaver
ISBN: 9781133727941
Format: Paperback
$142.29

GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including...  Read More >>

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

The Basics of Cyber Warfare: Understanding the Fundamentals...

Author: Jason Andress (CISSP, ISSAP, CISM, GPEN) ,  Steve Winterfeld ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity and Military Intelligence.)
ISBN: 9780124047372
Format: Paperback
$79.07

Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores...  Read More >>

Guide to Computer Network Security

Guide to Computer Network Security

Author: Joseph Migga Kizza
ISBN: 9781447145424
Format: Hardback
$184.67

This book explores security risks and vulnerabilities of computer networks and networked devices, offering improved...  Read More >>

Darknet: A Beginner's Guide to Staying Anonymous Online

Darknet: A Beginner's Guide to Staying Anonymous Online...

Author: Lance Henderson
ISBN: 9781481931380
Format: Paperback
$29.01

Tired of being spied on? Encrypt yourself online and get free access to thousands of dark web sites, deep web portals,...  Read More >>

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Securing Critical Infrastructures and Critical Control...

Author: Christopher Laing ,  Atta Badii
ISBN: 9781466626591
Format: Hardback
$415.95

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial,...  Read More >>

Electronic Healthcare Information Security

Electronic Healthcare Information Security

Author: Charles A. Shoniregun ,  Kudakwashe Dube
ISBN: 9781461427469
Format: Paperback
$366.96

The adoption of Information and Communication Technologies (ICT) in healthcare is driven by the need to contain...  Read More >>

Police Administration

Police Administration

Author: Gary W Cordner (Eastern Kentucky University) ,  Kathryn E Scarborough
ISBN: 9781455731190
Format: Electronic book text
$93.00

This text examines police administration from multiple perspectives: a systems perspective (emphasizing the interrelatedness...  Read More >>

UTM Security with Fortinet: Mastering FortiOS

UTM Security with Fortinet: Mastering FortiOS

Author: Kenneth Tam (Senior Security Engineer at Fortinet, USA) ,  Ken McAlpine (Senior Consulting Systems Engineer at Fortinet, USA)
ISBN: 9781597497473
Format: Paperback
$145.07

Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on,...  Read More >>

Federated Identity Primer

Federated Identity Primer

Author: Derrick Rountree ((CISSP, CASP, MCSE) has been in the IT field for almost 20 years.)
ISBN: 9780124071896
Format: Paperback
$65.87

Identity authentication and authorization are integral tasks in the digital world. This book describes technology...  Read More >>

Web Application Defender's Cookbook: Battling Hackers and Protecting Users

Web Application Defender's Cookbook: Battling Hackers...

Author: Ryan C. Barnett ,  Jeremiah Grossman (Chief Technology Officer, Whitehat Security, Inc.)
ISBN: 9781118362181
Format: Paperback
$82.95

Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's...  Read More >>

Machine Learning and Systems Engineering

Machine Learning and Systems Engineering

Author: Sio-Iong Ao ,  Burghard B. Rieger
ISBN: 9789400733749
Format: Paperback
$580.77

A large international conference on Advances in Machine Learning and Systems Engineering was held in UC Berkeley,...  Read More >>

E-Business and Telecommunications: International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011. Revised Selected Papers

E-Business and Telecommunications: International Joint...

Author: Mohammad S. Obaidat ,  José L. Sevillano
ISBN: 9783642357541
Format: Paperback
$209.59

This book constitutes the refereed proceedings of the 8th International Joint Conference on E-Business and Telecommunications,...  Read More >>

Preserving Privacy in Data Outsourcing

Preserving Privacy in Data Outsourcing

Author: Sara Foresti
ISBN: 9781461426998
Format: Paperback
$290.37

To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to...  Read More >>

Critical Infrastructure Protection VI: 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers

Critical Infrastructure Protection VI: 6th IFIP WG 11.10...

Author: Jonathan Butts ,  Sujeet Shenoi
ISBN: 9783642357633
Format: Hardback
$181.10

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital...  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List