Free Delivery Over $100
10034 books were found.
Applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect... Read More >>
Read More >>
Here is a comprehensive approach to protecting highly sensitive information stored on systems outside the data owner's... Read More >>
This accessible book examines the physical security of computer hardware, networks, and digital data, introduces... Read More >>
An analysis of the people and groups who have emerged to challenge the increasingly intrusive ways personal information... Read More >>
Internet crime keeps getting worse...but it doesn’t have to be that way. In this book, Internet security pioneer... Read More >>
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together.... Read More >>
Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly... Read More >>
Should this be true, we would have created our own nightmare: a global village combining the worst of conventional... Read More >>
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies... Read More >>
This book covers cloud computing fundamentals, architectures, service delivery approaches, deployment models, software... Read More >>
Explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding.... Read More >>
Covers chapters presented at WEIS 2009. This book features topics that include identity theft, modeling uncertainty's... Read More >>
Covering every angle of the subject, this is a cutting-edge text presenting IT and non-IT facets of insider threats... Read More >>
With a focus on the technical issues related to digital privacy and information management, this book is an in-depth... Read More >>
The Internet is often called a superhighway, but it may be more analogous to a city: an immense tangle of streets,... Read More >>
Constitutes the post-conference proceedings of the Second International Workshop on Critical Information Infrastructures... Read More >>
Constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September... Read More >>
Designed to prepare students for the Microsoft MCSE Certification Exam numbered 70-299 and for the challenges they... Read More >>
The papers handle topics such as access control, privacy of web based search, anonymus webs of trust, security attacks,... Read More >>
"There is a newer version of this book, updated for software version 9.x and later. Look for ISBN 978-0983660750.... Read More >>
This unique and practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating... Read More >>
The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers... Read More >>
Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network... Read More >>