Free Delivery Over $100
10034 books were found.
A secure cyberspace is critical to our prosperity. We use the Internet and other online environments to increase... Read More >>
The papers cover the following topics: mobile security, cyberspace attacks and defense, security application adn... Read More >>
This book not only brings together current sources of information on spyware and adware but also looks at the future... Read More >>
Role-based access control (RBAC) is a widely used technology to control information flows as well as control flows... Read More >>
Read More >>
Dieses Buch beschaftigt sich mit dem Sicherheitsmanagement von Netzwerken beziehungsweise der Verletzbarkeit der... Read More >>
This is a comprehensive, up-to-date revision of the market-leading CISSP training resource from the #1 name in IT... Read More >>
This book constitutes the refereed proceedings of the 10th Asian Symposium on Programming Languages and Systems,... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security,... Read More >>
Das Buch bietet einen umfassenden Überblick über die Grundlagen moderner kryptographischer Verfahren und ihre programmtechnische... Read More >>
Ein wichtiges Anwendungsfeld des Ubiquitous Computing ist das Wearable Computing: Miniaturisierte elektronische... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on... Read More >>
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together.... Read More >>
Should this be true, we would have created our own nightmare: a global village combining the worst of conventional... Read More >>
Security of Data and Transaction Processing brings together in one place important contributions and up-to-date... Read More >>
ISO/IEC 20000 is an important international standard for IT service providers. Implementation and certification... Read More >>
Can't remember your passwords? Tired of resetting your passwords? myJot is a convenient tool for jotting down important... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security,... Read More >>
This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory... Read More >>
This book introduces readers to the key concepts of data mining that can be used to identify Skype traffic using... Read More >>
Suitable for readers who want to help organizations protect critical information assets and secure their systems... Read More >>