Network security books

10034 books were found.

Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

Voice over IP Security: A Comprehensive Survey of Vulnerabilities...

Author: Angelos D. Keromytis
ISBN: 9781441998651
Format: Paperback
$105.47

Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers,...  Read More >>

Cyber Infrastructure Protection

Cyber Infrastructure Protection

Author: Louis Jordan (Partner Kpmg Mgmt Conslts) ,  Tarek Saadawi
ISBN: 9781470064358
Format: Paperback
$63.33

The Internet, as well as other telecommunication networks and information systems, have become an integrated part...  Read More >>

Network Security Architectures (paperback)

Network Security Architectures (paperback)

Author: Sean Convery
ISBN: 9781587142970
Format: Paperback
$171.60

Network Security Architectures offers a comprehensive how-to guide to understanding and implementing the Cisco security...  Read More >>

Gray Hat Hacking The Ethical Hackers Handbook

Gray Hat Hacking The Ethical Hackers Handbook

Author: Allen Harper ,  Shon Harris
ISBN: 9780071742559
Format: Paperback
$158.40

 Read More >>

Backtrack 4: Assuring Security by Penetration Testing: Master the Art of Penetration Testing with Backtrack

Backtrack 4: Assuring Security by Penetration Testing:...

Author: Shakeel Ali ,  Tedi Heriyanto
ISBN: 9786613376756
Format: Electronic book text
$158.35

Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step...  Read More >>

Kryptographie und IT-Sicherheit: Grundlagen und Anwendungen

Kryptographie und IT-Sicherheit: Grundlagen und Anwendungen...

Author: Stephan Spitz ,  Michael Pramateftakis
ISBN: 9783834814876
Format: Paperback
$77.60

Sie sichern die Abrechnung in Mobilfunknetzen und bilden eine Basis für Sicherheit im Internet und in Endgeräten...  Read More >>

Building Secure Software: How to Avoid Security Problems the Right Way (paperback)

Building Secure Software: How to Avoid Security Problems...

Author: John Viega ,  Gary McGraw
ISBN: 9780321774958
Format: Paperback
$94.24

In the age of e-Business, information security is no longer a minor detail: it's at the heart of every business...  Read More >>

The Lure: The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals

The Lure: The True Story of How the Department of Justice...

Author: Stephen Schroeder (Seattle University) ,  Stephen C Schroeder
ISBN: 9781435457126
Format: Paperback
$65.97

Provides a case study of a large, complex, and highly technical prosecution of two Russian hackers. In this book,...  Read More >>

Stabilization, Safety, and Security of Distributed Systems

Stabilization, Safety, and Security of Distributed Systems...

Author: Shlomi Dolev ,  Jorge Cobb
ISBN: 9783642160240
Format: Paperback
$65.87

Constitutes the refereed proceedings of the 12th International Symposium on Stabilization, Safety, and Security...  Read More >>

Information Security

Information Security

Author: Mike Burmester ,  Gene Tsudik
ISBN: 9783642181795
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 13th International Conference on Information Security, ISC 2010, held...  Read More >>

Information Security Applications

Information Security Applications

Author: Yongwha Chung ,  Moti Yung
ISBN: 9783642179563
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 11th International Workshop on Information Security Applications, WISA...  Read More >>

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks

PKI Uncovered: Certificate-Based Security Solutions...

Author: Andre Karamanian ,  Srinivas Tenneti
ISBN: 9781587059162
Format: Paperback
$171.60

"The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity...  Read More >>

WikiLeaks

WikiLeaks

Author: David Leigh ,  Luke Harding
ISBN: 9781610390613
Format: Paperback
$26.99

A team of journalists with unparalleled inside access provides the first full, in-depth account of WikiLeaks, its...  Read More >>

Pfsense 2 Cookbook: A Practical, Example-Driven Guide to Configure Even the Most Advanced Features of Pfsense 2

Pfsense 2 Cookbook: A Practical, Example-Driven Guide...

Author: Matt Williamson
ISBN: 9786613376800
Format: Electronic book text
$142.51

This book is written in a cookbook style. Each chapter consists of recipes, each of which is composed of step-by-step...  Read More >>

Identitätsdiebstahl und Identitätsmissbrauch im Internet: Rechtliche und technische Aspekte

Identitätsdiebstahl und Identitätsmissbrauch im Internet:...

Author: Georg Borges ,  Jörg Schwenk
ISBN: 9783642158322
Format: Hardback
$287.76

Schwerpunkte der Studie liegen auf der systematischen Darstellung gegenwärtiger Angriffe und der künftigen Entwicklung...  Read More >>

Information Security, Practice and Experience

Information Security, Practice and Experience

Author: Jin Kwak ,  Robert H Deng
ISBN: 9783642128288
Format: Undefined
$65.87

Constitutes the proceedings of the 6th International Conference on Information Security Practice and Experience,...  Read More >>

Public Key Cryptography - Pkc 2010

Public Key Cryptography - Pkc 2010

Author: Phong Q Nguyen ,  David Pointcheval
ISBN: 9783642130144
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography,...  Read More >>

Wired/Wireless Internet Communications

Wired/Wireless Internet Communications

Author: Evgeny Osipov ,  Andreas Kassler
ISBN: 9783642133169
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 8th International Conference on Wired/Wireless Internet Communications,...  Read More >>

Information Security and Cryptology - Icisc 2009

Information Security and Cryptology - Icisc 2009

Author: Donghoon Lee ,  Seokhie Hong
ISBN: 9783642144240
Format: Undefined
$65.87

This book constitutes the proceedings of the 12th International Conference on Information Security and Cryptology,...  Read More >>

Privacy Enhancing Technologies

Privacy Enhancing Technologies

Author: Mikhail Atallah ,  Nicholas Hopper
ISBN: 9783642145285
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in...  Read More >>

Information Security and Cryptology

Information Security and Cryptology

Author: Feng Bao ,  Moti Yung
ISBN: 9783642163432
Format: Undefined
$65.87

Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security...  Read More >>

Public Key Infrastructures, Services and Applications

Public Key Infrastructures, Services and Applications...

Author: Fabio Martinelli ,  Bart Preneel
ISBN: 9783642164422
Format: Undefined
$65.87

Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications...  Read More >>

Advances in Information and Computer Security

Advances in Information and Computer Security

Author: Isao Echizen ,  Noboru Kunihiro
ISBN: 9783642168260
Format: Undefined
$65.87

This book constitutes the refereed proceedings of the 5th International Workshop on Security, IWSEC 2010, held in...  Read More >>

Information Systems Security

Information Systems Security

Author: Somesh Jha ,  Anish Mathuria
ISBN: 9783642177156
Format: Undefined
$65.87

Constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS...  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List