Network security books

10034 books were found.

National Strategy for Trusted Identities in Cyberspace: Enhancing Online Choice, Efficiency, Security, and Privacy: April 2011

National Strategy for Trusted Identities in Cyberspace:...

Author: The White House ,  Executive Office of the P United States
ISBN: 9781481208291
Format: Paperback
$47.49

A secure cyberspace is critical to our prosperity. We use the Internet and other online environments to increase...  Read More >>

Cyberspace Safety and Security: 4th International Symposium, CSS 2012, Melbourne, Australia, December 12-13, 2012, Proceedings

Cyberspace Safety and Security: 4th International Symposium,...

Author: Yang Xiang ,  Javier Lopez
ISBN: 9783642353611
Format: Paperback
$165.57

The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn...  Read More >>

Spyware and Adware

Spyware and Adware

Author: John Aycock
ISBN: 9781461426837
Format: Paperback
$290.37

This book not only brings together current sources of information on spyware and adware but also looks at the future...  Read More >>

Information Flow Based Security Control Beyond RBAC: How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

Information Flow Based Security Control Beyond RBAC:...

Author: Klaus-Peter Fischer-Hellmann ,  Rainer Bischoff
ISBN: 9783834826176
Format: Paperback
$116.41

Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows...  Read More >>

IT-Sicherheit 1.5: Internetprotokolle, Webprogrammierung, Systemsicherheit

IT-Sicherheit 1.5: Internetprotokolle, Webprogrammierung,...

Author: Gilbert Brands
ISBN: 9781481119276
Format: Paperback
$57.82

Dieses Buch beschaftigt sich mit dem Sicherheitsmanagement von Netzwerken beziehungsweise der Verletzbarkeit der...  Read More >>

CISSP All-in-One Exam Guide

CISSP All-in-One Exam Guide

Author: Shon Harris
ISBN: 9780071781749
Format: Mixed media product
$211.20

This is a comprehensive, up-to-date revision of the market-leading CISSP training resource from the #1 name in IT...  Read More >>

Programming Languages and Systems: 10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012, Proceedings

Programming Languages and Systems: 10th Asian Symposium,...

Author: Ranjit Jhala ,  Atsushi Igarashi
ISBN: 9783642351815
Format: Paperback
$126.76

This book constitutes the refereed proceedings of the 10th Asian Symposium on Programming Languages and Systems,...  Read More >>

Information Systems Security: 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012, Proceedings

Information Systems Security: 8th International Conference,...

Author: Venkat Venkatakrishnan ,  Diganta Goswami
ISBN: 9783642351297
Format: Paperback
$116.41

This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security,...  Read More >>

Kryptographie in C und C++: Zahlentheoretische Grundlagen, Computer-Arithmetik mit großen Zahlen, kryptographische Tools

Kryptographie in C und C++: Zahlentheoretische Grundlagen,...

Author: Michael Welschenbach
ISBN: 9783642626463
Format: Paperback
$103.47

Das Buch bietet einen umfassenden Überblick über die Grundlagen moderner kryptographischer Verfahren und ihre programmtechnische...  Read More >>

Datenschutz bei Wearable Computing: Eine juristische Analyse am Beispiel von Schutzanzügen

Datenschutz bei Wearable Computing: Eine juristische...

Author: Alexander Roßnagel ,  Silke Jandt
ISBN: 9783834825544
Format: Paperback
$184.77

Ein wichtiges Anwendungsfeld des Ubiquitous Computing ist das Wearable Computing: Miniaturisierte elektronische...  Read More >>

Information Security and Cryptology: 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers

Information Security and Cryptology: 7th International...

Author: Chuan-Kun Wu ,  Moti Yung
ISBN: 9783642347030
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on...  Read More >>

Insider Threats in Cyber Security

Insider Threats in Cyber Security

Author: Christian W. Probst ,  Jeffrey Hunker
ISBN: 9781461426387
Format: Paperback
$290.37

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together....  Read More >>

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

Privacy and Anonymity in Information Management Systems:...

Author: Jordi Nin ,  Javier Herranz
ISBN: 9781447125792
Format: Paperback
$448.77

Should this be true, we would have created our own nightmare: a global village combining the worst of conventional...  Read More >>

Security of Data and Transaction Processing: A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000)

Security of Data and Transaction Processing: A Special...

Author: Vijay Atluri ,  Pierangela Samarati
ISBN: 9781461370093
Format: Paperback
$290.37

Security of Data and Transaction Processing brings together in one place important contributions and up-to-date...  Read More >>

Implementing Service Quality Based on ISO/IEC 20000, 2nd Edition

Implementing Service Quality Based on ISO/IEC 20000,...

Author: Michael Kunas
ISBN: 9781849284028
Format: Paperback
$65.87

ISO/IEC 20000 is an important international standard for IT service providers. Implementation and certification...  Read More >>

Myjot

Myjot

Author: Lisa Hunter ,  Chris Hunter
ISBN: 9780615718057
Format: Paperback
$13.17

Can't remember your passwords? Tired of resetting your passwords? myJot is a convenient tool for jotting down important...  Read More >>

Network and System Security: 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings

Network and System Security: 6th International Conference,...

Author: Li Xu ,  Elisa Bertino
ISBN: 9783642346002
Format: Paperback
$165.57

This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security,...  Read More >>

Research in Cryptology: 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers

Research in Cryptology: 4th Western European Workshop,...

Author: Frederik Armknecht ,  Stefan Lucks
ISBN: 9783642341588
Format: Paperback
$131.97

This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC...  Read More >>

Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings

Decision and Game Theory for Security: Third International...

Author: Jens Grossklags ,  Jean Walrand
ISBN: 9783642342653
Format: Paperback
$116.41

This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory...  Read More >>

Data Mining for Skype Forensics

Data Mining for Skype Forensics

Author: Ahmad Azab
ISBN: 9781480189089
Format: Paperback
$261.36

This book introduces readers to the key concepts of data mining that can be used to identify Skype traffic using...  Read More >>

Guide to Network Security, International Edition

Guide to Network Security, International Edition

Author: Michael Whitman (Institute for Cybersecurity Workforce Development, Kennesaw State University) ,  Herbert Mattord (Michael J. Coles College of Business, Kennesaw State University)
ISBN: 9781133279075
Format: Paperback
$162.99

Suitable for readers who want to help organizations protect critical information assets and secure their systems...  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List