Free Delivery Over $100
10034 books were found.
This book details the SERENITY approach towards providing security and dependability solutions for dynamic, highly-distributed... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability... Read More >>
Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are... Read More >>
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust... Read More >>
This study is the second phase of an initial - tempt to survey and catalog the multitude of emerging organizations... Read More >>
Constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS... Read More >>
Proceedings of the 2010 International Conference on Technology and Security (ITS 2010), December, 2010, in China.... Read More >>
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background... Read More >>
Network participants are required to observe predefined steps called security protocols, whose proof of correctness... Read More >>
Successful business continuity requires the creation of and adherence to a plan that ensures an organisation's critical... Read More >>
Provides a comprehensive collection of knowledge from experts within the field of information security and privacy.... Read More >>
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field,... Read More >>
Data warehousing and data mining provide techniques for collecting information from distributed databases and for... Read More >>
Discusses wireless security issues from physical layer to application layer. This book identifies important vulnerabilities... Read More >>
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC... Read More >>
In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems... Read More >>
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional... Read More >>
Company network administrators are compelled today to aggressively pursue a robust network security regime. This... Read More >>
Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e.,... Read More >>
Read More >>
Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting... Read More >>
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference... Read More >>
It has been established that TNF receptor associated factors (TRAFs) are critical signaling mediators for not only... Read More >>
This volume contains the proceedings of the IFIPTM 2007, the Joint iTrust and PST Conferences on Privacy, Trust... Read More >>