Free Delivery Over $100
10034 books were found.
This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume... Read More >>
The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties... Read More >>
Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar... Read More >>
This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information... Read More >>
Led by members of the Microsoft Forefront team, you'll get the focused, scenario-based guidance you need to plan... Read More >>
Decisions on the limits of privacy intrusions – or privacy protection, for that matter – are ultimately political... Read More >>
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Fundamentals of Information... Read More >>
BTEC and Heinemann have joined forces to provide BTEC’s own resources to accompany the new BTEC Level 3 National... Read More >>
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using... Read More >>
Read More >>
Reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network.... Read More >>
Dr. Tom Shinder s ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous... Read More >>
Get complete coverage of all the objectives included on CompTIA Security+ exam inside this completely updated, comprehensive... Read More >>
One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which... Read More >>
This book details current trends and advances in information assurance and security, as well as explores emerging... Read More >>
Rev. ed. of: 2010 CCS coding exam review / Carol J. Buck, Cynthia Stahl. Read More >>
Contains over 30 contributions showing the directions of computer science research, and analyzing such areas of... Read More >>