Network security books

10034 books were found.

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Applied Cryptography for Cyber Security and Defense:...

Author: Hamid R. Nemati ,  Yang Li
ISBN: 9781615207831
Format: Hardback
$475.20

Applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect...  Read More >>

Legal Issues In Information Security

Legal Issues In Information Security

Author: Joanna Lyn Grama
ISBN: 9780763791858
Format: Paperback
$237.47

 Read More >>

Preserving Privacy in Data Outsourcing

Preserving Privacy in Data Outsourcing

Author: Sara Foresti
ISBN: 9781441976604
Format: Undefined
$65.87

Here is a comprehensive approach to protecting highly sensitive information stored on systems outside the data owner's...  Read More >>

Elements of Computer Security

Elements of Computer Security

Author: David Salomon
ISBN: 9780857290052
Format: Paperback
$69.84

This accessible book examines the physical security of computer hardware, networks, and digital data, introduces...  Read More >>

The Privacy Advocates: Resisting the Spread of Surveillance

The Privacy Advocates: Resisting the Spread of Surveillance...

Author: Colin J. Bennett (Professor, University of Victoria)
ISBN: 9780262514873
Format: Paperback
$36.96

An analysis of the people and groups who have emerged to challenge the increasingly intrusive ways personal information...  Read More >>

dotCrime Manifesto: How to Stop Internet Crime, (paperback), The

dotCrime Manifesto: How to Stop Internet Crime, (paperback),...

Author: Phillip Hallam-Baker
ISBN: 9780132160384
Format: Paperback
$57.99

Internet crime keeps getting worse...but it doesn’t have to be that way. In this book, Internet security pioneer...  Read More >>

Insider Threats in Cyber Security

Insider Threats in Cyber Security

Author: Christian W. Probst ,  Jeffrey Hunker
ISBN: 9781441971326
Format: Hardback
$261.36

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together....  Read More >>

Network Security

Network Security

Author: Scott C.-H. Huang ,  David MacCallum
ISBN: 9780387738208
Format: Hardback
$340.56

Over the past two decades, network technologies have been remarkably renovated and computer networks, particularly...  Read More >>

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

Privacy and Anonymity in Information Management Systems:...

Author: Jordi Nin ,  Javier Herranz
ISBN: 9781849962377
Format: Hardback
$320.85

Should this be true, we would have created our own nightmare: a global village combining the worst of conventional...  Read More >>

Security Strategies In Web Applications And Social Networking

Security Strategies In Web Applications And Social Networking...

Author: Mike Harwood ,  Marcus Goncalves
ISBN: 9780763791957
Format: Paperback
$237.47

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies...  Read More >>

Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Cloud Security: A Comprehensive Guide to Secure Cloud...

Author: Ronald L. Krutz ,  Russell Dean Vines
ISBN: 9780470589878
Format: Paperback
$132.00

This book covers cloud computing fundamentals, architectures, service delivery approaches, deployment models, software...  Read More >>

Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption

Chaos Synchronization and Cryptography for Secure Communications:...

Author: Santo Banerjee
ISBN: 9781615207374
Format: Hardback
$475.20

Explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding....  Read More >>

Economics of Information Security and Privacy

Economics of Information Security and Privacy

Author: Tyler Moore ,  David Pym
ISBN: 9781441969668
Format: Hardback
$498.96

Covers chapters presented at WEIS 2009. This book features topics that include identity theft, modeling uncertainty's...  Read More >>

Insider Threats in Cyber Security

Insider Threats in Cyber Security

Author: Christian W Probst ,  Jeffrey Hunker
ISBN: 9781441971340
Format: Undefined
$65.87

Covering every angle of the subject, this is a cutting-edge text presenting IT and non-IT facets of insider threats...  Read More >>

Privacy and Anonymity in Information Management Systems

Privacy and Anonymity in Information Management Systems...

Author: Jordi Nin ,  Javier Herranz
ISBN: 9781849962391
Format: Undefined
$65.87

With a focus on the technical issues related to digital privacy and information management, this book is an in-depth...  Read More >>

Economics of Information Security and Privacy

Economics of Information Security and Privacy

Author: Tyler Moore ,  David Pym
ISBN: 9781441969682
Format: Undefined
$65.87

Covers chapters presented at WEIS 2009. This book features topics that include identity theft, modeling uncertainty's...  Read More >>

Creeping Failure: How We Broke the Internet and What We Can Do to Fix It

Creeping Failure: How We Broke the Internet and What...

Author: Jeffrey Hunker
ISBN: 9780771041488
Format: Hardback
$68.51

The Internet is often called a superhighway, but it may be more analogous to a city: an immense tangle of streets,...  Read More >>

Critical Information Infrastructures Security

Critical Information Infrastructures Security

Author: Javier Lopez ,  Bernhard H Mmerli
ISBN: 9783540891741
Format: Undefined
$65.87

Constitutes the post-conference proceedings of the Second International Workshop on Critical Information Infrastructures...  Read More >>

Security in Emerging Wireless Communication and Networking Systems

Security in Emerging Wireless Communication and Networking...

Author: Qijun Gu ,  Wanyu Zang
ISBN: 9783642115561
Format: Undefined
$65.87

Constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September...  Read More >>

70-299 MCSE Guide to Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70-299 MCSE Guide to Implementing and Administering...

Author: Diane Barrett ,  Bill Ferguson
ISBN: 9781423903000
Format: Mixed media product
$298.19

Designed to prepare students for the Microsoft MCSE Certification Exam numbered 70-299 and for the challenges they...  Read More >>

Privacy Enhancing Technologies: 10th International Symposium, PETS 2010, July 21-23, 2010, Berlin, Germany, Proceedings

Privacy Enhancing Technologies: 10th International Symposium,...

Author: Mikhail Atallah ,  Nicholas Hopper
ISBN: 9783642145261
Format: Paperback
$219.12

The papers handle topics such as access control, privacy of web based search, anonymus webs of trust, security attacks,...  Read More >>

The Accidental Administrator: Cisco ASA Security Appliance: A Step-by-Step Configuration Guide

The Accidental Administrator: Cisco ASA Security Appliance:...

Author: Don R. Crawley
ISBN: 9781449596620
Format: Paperback
$105.60

"There is a newer version of this book, updated for software version 9.x and later. Look for ISBN 978-0983660750....  Read More >>

802.11 Wireless Networks: Security and Analysis

802.11 Wireless Networks: Security and Analysis

Author: Alan Holt ,  Chi-Yu Huang
ISBN: 9781849962742
Format: Hardback
$289.80

This unique and practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating...  Read More >>

Handbook of FPGA Design Security

Handbook of FPGA Design Security

Author: Ted Huffmire ,  Cynthia Irvine
ISBN: 9789048191567
Format: Hardback
$340.56

The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers...  Read More >>

Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Digital Forensics for Network, Internet, and Cloud Computing:...

Author: Terrence V. Lillard ((Linux+, CISSP)) ,  Craig Schiller
ISBN: 9781597495370
Format: Paperback
$184.67

Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network...  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List