Free Delivery Over $100
10034 books were found.
Course360 was created to provide students with an interactive classroom experience in an online format. Read More >>
Designed as a professional book for practitioners and researchers working in the cyber security field, advanced... Read More >>
This thorough update to the most authoritative volume available on network security covers the latest security standards... Read More >>
Read More >>
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and... Read More >>
IT Security Management 100 Success Secrets - 100 Most Asked Questions: The Missing IT Security Management Control,... Read More >>
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on... Read More >>
<p>With artificial neural network research being one of the new directions for new generation computers, current... Read More >>
This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks... Read More >>
This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and... Read More >>
"IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals,... Read More >>
The Certified Ethical Hacker (CEH) is a professional certification provided by the International Council of E-Commerce... Read More >>
CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert... Read More >>
Applying software engineering to Cloud computing is a primary aspect to obtain a systematic approach to the development,... Read More >>
This book constitutes the refereed proceedings of the 31st International Conference on Computer Safety, Reliability,... Read More >>
This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting... Read More >>
Constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2012, the 31st International Conference... Read More >>
Revision with unchanged content. Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities... Read More >>
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases,... Read More >>
This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security... Read More >>