Network security books

9862 books were found.

Enterprise Cloud Security and Governance

Enterprise Cloud Security and Governance

Author: Adrian Pruteanu ,  Zeal Vora
ISBN: 9781788299558
Format: Undefined
$93.12

Modern day businesses and enterprises are moving to cloud simply to improve efficiency and speed, achieve flexibility...  Read More >>

A Proactive Network Surveillance Framework

A Proactive Network Surveillance Framework

Author: Maninder Singh
ISBN: 9782534887944
Format: Paperback
$116.16

Network security paradigm should be the one that permeates the enterprise, including people, processes and technology....  Read More >>

Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11–13, 2022, Revised Selected Papers

Information Security and Cryptology: 18th International...

Author: Yi Deng ,  Moti Yung
ISBN: 9783031265525
Format: Paperback
$181.10

This book constitutes the refereed proceedings of the 18th International Conference on Information Security and...  Read More >>

Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers

Computer Security. ESORICS 2022 International Workshops:...

Author: Sokratis Katsikas ,  Frédéric Cuppens
ISBN: 9783031254598
Format: Paperback
$194.04

This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with...  Read More >>

Privacy, Security And Forensics in The Internet of Things (IoT)

Privacy, Security And Forensics in The Internet of Things...

Author: Reza Montasari ,  Fiona Carroll
ISBN: 9783030912208
Format: Paperback
$388.10

This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This ...  Read More >>

Windows APT Warfare: Identify and prevent Windows APT attacks effectively

Windows APT Warfare: Identify and prevent Windows APT...

Author: Sheng-Hao Ma ,  Ziv Chang
ISBN: 9781804618110
Format: Paperback
$118.77

Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks....  Read More >>

Advanced Communication and Intelligent Systems: First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers

Advanced Communication and Intelligent Systems: First...

Author: Rabindra Nath Shaw ,  Marcin Paprzycki
ISBN: 9783031250873
Format: Paperback
$284.60

This book constitutes selected papers presented at the First International Conference on Advanced Communication...  Read More >>

Content Distribution for Mobile Internet: A Cloud-based Approach

Content Distribution for Mobile Internet: A Cloud-based...

Author: Zhenhua Li ,  Yafei Dai
ISBN: 9789811969812
Format: Hardback
$388.10

Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the...  Read More >>

Cost Estimating Framework for U.S. Marine Corps Joint Cyber Weapons

Cost Estimating Framework for U.S. Marine Corps Joint...

Author: Bradley Wilson ,  Thomas Goughnour
ISBN: 9781977410207
Format: Paperback
$66.00

To help improve leadership decisionmaking related to the costs of offensive cyber operations acquisition, the authors...  Read More >>

Decision and Game Theory for Security: 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022, Proceedings

Decision and Game Theory for Security: 13th International...

Author: Fei Fang ,  Haifeng Xu
ISBN: 9783031263682
Format: Paperback
$168.16

This book constitutes the refereed proceedings of the 13th International Conference on Decision and Game Theory...  Read More >>

Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization

Cybersecurity Blue Team Strategies: Uncover the secrets...

Author: Kunal Sehgal ,  Nikolaos Thymianis
ISBN: 9781801072472
Format: Paperback
$92.37

This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn...  Read More >>

Power Systems Cybersecurity: Methods, Concepts, and Best Practices

Power Systems Cybersecurity: Methods, Concepts, and...

Author: Hassan Haes Alhelou ,  Nikos Hatziargyriou
ISBN: 9783031203596
Format: Hardback
$388.10

This book covers power systems cybersecurity. In order to enhance overall stability and security in wide-area cyber-physical...  Read More >>

The Gentrification of the Internet: How to Reclaim Our Digital Freedom

The Gentrification of the Internet: How to Reclaim Our...

Author: Jessa Lingel
ISBN: 9780520395565
Format: Paperback
$27.95

How we lost control of the internet—and how to win it back. The internet has become a battleground. Although it...  Read More >>

Fusion of Machine Learning Paradigms: Theory and Applications

Fusion of Machine Learning Paradigms: Theory and Applications...

Author: Ioannis K. Hatzilygeroudis ,  George A. Tsihrintzis
ISBN: 9783031223709
Format: Hardback
$336.35

This book aims at updating the relevant computer science-related research communities, including professors, researchers,...  Read More >>

Access Control Models and Architectures For IoT and Cyber Physical Systems

Access Control Models and Architectures For IoT and...

Author: Maanak Gupta ,  Smriti Bhatt
ISBN: 9783030810917
Format: Paperback
$336.35

This was developed by the authors to provide an overall broader perspective and grounded approach to solve access...  Read More >>

Information Security Applications: 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24–26, 2022, Revised Selected Papers

Information Security Applications: 23rd International...

Author: Ilsun You ,  Taek-Young Youn
ISBN: 9783031256585
Format: Paperback
$168.16

This book constitutes the revised selected papers from the 23rd International Conference on Information Security...  Read More >>

Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings

Security and Privacy in Communication Networks: 18th...

Author: Fengjun Li ,  Kaitai Liang
ISBN: 9783031255373
Format: Paperback
$284.60

They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain,...  Read More >>

Hacking With Kali Linux: The Complete Beginner's Guide about Kali Linux for Beginners (Step by Step Guide to Learn Kali Linux for Hackers)

Hacking With Kali Linux: The Complete Beginner's Guide...

Author: Michael Lee
ISBN: 9781998901869
Format: Paperback
$52.67

Are you interested in finding new and effective ways to keep your system safe and secure? Do you want to make sure...  Read More >>

Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level

Microsoft Defender for Endpoint in Depth: Take any organization's...

Author: Paul Huijbregts ,  Joe Anich
ISBN: 9781804615461
Format: Paperback
$131.97

Gain an in-depth understanding of Microsoft Defender 365, explore its features, and learn successful implementation...  Read More >>

Triangle Mesh Watermarking and Steganography

Triangle Mesh Watermarking and Steganography

Author: Hang Zhou ,  Kejiang Chen
ISBN: 9789811977190
Format: Hardback
$388.10

 Read More >>

Emerging Technologies for Authorization and Authentication: 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers

Emerging Technologies for Authorization and Authentication:...

Author: Andrea Saracino ,  Paolo Mori
ISBN: 9783031254666
Format: Paperback
$129.35

This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for...  Read More >>

Threats: What Every Engineer Should Learn from Star Wars

Threats: What Every Engineer Should Learn from Star...

Author: Adam Shostack ,  Joe Hempel
ISBN: 9798212514637
Format: Audio
$65.97

In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack...  Read More >>

Threats: What Every Engineer Should Learn From Star Wars

Threats: What Every Engineer Should Learn From Star...

Author: Adam Shostack
ISBN: 9781119895169
Format: Paperback
$41.95

Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn...  Read More >>

Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List