Free Delivery Over $100
10034 books were found.
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
"IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals,... Read More >>
Constitutes the refereed proceedings of the 16th EUNICE/IFIP TC 6.6 Workshop on Networked Services and Applications,... Read More >>
Read More >>
This complete new guide to auditing network security is an indispensable resource for security, network, and IT... Read More >>
ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past... Read More >>
Featuring TWO wireless certifications covered in ONE book along with a definitive source of reference knowledge,... Read More >>
Lists the dangerous hacks and exploits specific to networks, and presents the anatomy of these attacks including... Read More >>
Constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography,... Read More >>
Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic... Read More >>
Volume ... of 5 mapping to EC-Council Certified Security Analyst certification. Read More >>
Suitable for those from the average home computer user to an office professional to someone looking to develop a... Read More >>
Provides focused coverage of network and system security technologies. This title explores practical solutions to... Read More >>
This book offers a practical approach to managing security in FPGA designs for researchers and practitioners in... Read More >>
Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security.... Read More >>
The increased reliance of critical services on our cyberinfrastructure and the dire consequences of security breaches... Read More >>
Table of Contents: Introduction / Foundations / Detecting Buffer Overruns Using Static Analysis / Analyzing Security... Read More >>
"Securing the Borderless Network: Security for the Web 2.0 World Tom Gillis Securing the Borderless Network... Read More >>
IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals,... Read More >>
Getting into the world of hacking can be exciting because of all the possibilities, but it can be hard for some... Read More >>
For one-semester undergraduate/graduate level courses and for self-study. William Stallings offers a practical survey... Read More >>