Free Delivery Over $100
10034 books were found.
While the innovation and phenomenon of social network applications has greatly impacted society, the economy, and... Read More >>
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows... Read More >>
Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance,... Read More >>
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on... Read More >>
Read More >>
Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview... Read More >>
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities... Read More >>
Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal... Read More >>
How can you protect young people from the dangers of the internet, now that they are living increasingly hidden... Read More >>
While wireless technologies continue to provide an array of new challenges and multi-domain applications for business... Read More >>
This new book by a top cybercrime expert and victim's advocate explores horrific real-life crimes with roots in... Read More >>
Introduction to Computational Modeling Using C and Open-Source Tools presents the fundamental principles of computational... Read More >>
Discusses the foundations and theoretical aspects of ICT security. This title covers trends, analytics, assessments... Read More >>
In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise... Read More >>
Who s watching you online? These days, it s hard to be sure. But the recent Edward Snowden revelations of NSA data... Read More >>
Using Information to Develop a Culture of Customer Centricity sets the stage for understanding the holistic marriage... Read More >>
Technological advancements have extracted a vast amount of useful knowledge and information for applications and... Read More >>
Recent advances in technologies have created a need for solving security problems in a systematic way. With this... Read More >>
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Distributed Computing and... Read More >>
New in the Secure Beginner’s Guide series, this is the ideal get-up-and-running guide for IT professionals seeking... Read More >>