Free Delivery Over $100
10034 books were found.
Constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December... Read More >>
Constitutes the refereed proceedings of the 12th International Conference on Distributed Computing and Networking,... Read More >>
This book constitutes the refereed proceedings of the 16th EUNICE/IFIP TC 6.6 Workshop on Networked Services and... Read More >>
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure... Read More >>
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory... Read More >>
The book provides a simple and clean explanation of how to effectively utilize the tools and introduces a four-step... Read More >>
Read More >>
Learn how to build a Security Incident Response team with guidance from a leading SIRT from Cisco. With this handbook,... Read More >>
Web applications are used every day by millions of users, which is why they are one of the most popular vectors... Read More >>
Dissertation Universität Regensburg, 2010 Read More >>
The fourth edition of Principles of Information Security explores the field of information security and assurance... Read More >>
<p>This is the first technical book exclusively focused on spyware/adware. It also includes defensive techniques.... Read More >>
Provides broad coverage of technical and socio-economic perspectives for utilizing information and communication... Read More >>
Hacking For Dummies is a fully updated resource that guides you in hacking your own system to protect it-and it... Read More >>
This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec... Read More >>
Deals with the national debate on protecting critical infrastructure. This book covers cyber security policy development... Read More >>
This fully updated bestseller covers the latest web application exploitation techniques and their proven countermeasures.... Read More >>
Mit einem Geleitwort von Klaus Straub, CIO AUDI AG Read More >>
Contains the papers presented at the nineteenth annual Safety-Critical Systems Symposium, held at Southampton, UK,... Read More >>
Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies... Read More >>
To ensure a successful experience for instructors and students alike, this book includes the following sections... Read More >>
International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the... Read More >>
Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but... Read More >>