Network security books

10034 books were found.

Applied Information Security

Applied Information Security

Author: Randy J. Boyle
ISBN: 9780136122036
Format: Paperback
$133.77

For undergraduate and graduate IT Security courses. Applied Information Security guides students through the...  Read More >>

Kryptografie in Theorie und Praxis: Mathematische Grundlagen für Internetsicherheit, Mobilfunk und elektronisches Geld

Kryptografie in Theorie und Praxis: Mathematische Grundlagen...

Author: Albrecht Beutelspacher ,  Heike B. Neumann
ISBN: 9783834809773
Format: Paperback
$72.42

Das Buch stellt die gesamte Kryptografie unter diesem Aspekt vor: Grundlagen und Anwendungen, Verschlüsselung und...  Read More >>

Information Security Breaches: Avoidance and Treatment Based on  ISO27001

Information Security Breaches: Avoidance and Treatment...

Author: Michael Krausz
ISBN: 9781849280273
Format: Paperback
$79.07

Although breaches of information security are not a new phenomenon,...  Read More >>

Security in Embedded Devices

Security in Embedded Devices

Author: Catherine H. Gebotys
ISBN: 9781441915290
Format: Hardback
$340.56

Although security is prevalent in PCs, wireless communications and other systems today, it is expected to become...  Read More >>

Snort Intrusion Detection 2.0

Snort Intrusion Detection 2.0

Author: Jay Beale ,  James C Foster
ISBN: 9781281056092
Format: Electronic book text
$284.86

 Read More >>

Formal Correctness of Security Protocols

Formal Correctness of Security Protocols

Author: Giampaolo Bella
ISBN: 9781280864322
Format: Undefined
$237.47

Investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. This title examines...  Read More >>

Securing E-Business Applications and Communications

Securing E-Business Applications and Communications...

Author: Jonathan S Held (Microsoft Corporation, Redmond, Washington, USA) ,  John R Bowers
ISBN: 9781281095053
Format: Undefined
$297.90

Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications...  Read More >>

Dr Tom Shinder's ISA Server and Beyond

Dr Tom Shinder's ISA Server and Beyond

Author: Dr Thomas W Shinder, Dr., M.D. ,  Debra Littlejohn Shinder
ISBN: 9781281056061
Format: Electronic book text
$342.94

The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge...  Read More >>

Hack Proofing Your Identity in the Information Age

Hack Proofing Your Identity in the Information Age

Author: Teri Bidwell ,  Michael Cross
ISBN: 9781281055996
Format: Electronic book text
$221.50

 Read More >>

Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

Author: Johnny Long
ISBN: 9781281055941
Format: Electronic book text
$247.90

Teaches Google searching basics. This book lets you explore Google's Web-based Interface, build Google queries,...  Read More >>

Programming Languages and Systems: 7th Asian Symposium, APLAS 2009, Seoul, Korea, December 14-16, 2009, Proceedings

Programming Languages and Systems: 7th Asian Symposium,...

Author: Zhenjiang Hu
ISBN: 9783642106712
Format: Paperback
$219.12

The papers are divided into topical sections on program analysis, transformation and optimization, type system,...  Read More >>

Information Systems Security: 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings

Information Systems Security: 5th International Conference,...

Author: Atul Prakash ,  Indranil Sen Gupta
ISBN: 9783642107719
Format: Paperback
$219.12

The management of services and operations in today’s organizations are - coming increasingly dependent on their...  Read More >>

Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings

Advances in Computer Science, Information Security and...

Author: Anupam Datta
ISBN: 9783642106217
Format: Paperback
$190.08

This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held...  Read More >>

Creeping Failure: How We Broke the Internet and What We Can Do to Fix It

Creeping Failure: How We Broke the Internet and What...

Author: Jeffrey Hunker
ISBN: 9781299259812
Format: Electronic book text
$189.60

The Internet is often called a superhighway, but it may be more analogous to a city: an immense tangle of streets,...  Read More >>

Testowanie Bezpiecze?stwa Aplikacji Internetowych. Receptury

Testowanie Bezpiecze?stwa Aplikacji Internetowych. Receptury...

Author: Paco Hope ,  Ben Walther
ISBN: 9781306795876
Format: Electronic book text
$31.65

Poznaj i wykorzystaj mechanizmy testowania zabezpiecze?, a nikt nie prze?lizgnie si? przez Twoj? witryn?!Jak zainstalowa?...  Read More >>

Nokia Network Security Solutions Handbook

Nokia Network Security Solutions Handbook

Author: Kyle X Hourihan ,  Daniel Kligerman
ISBN: 9781281056078
Format: Electronic book text
$327.10

 Read More >>

Penetration Tester's Open Source Toolkit

Penetration Tester's Open Source Toolkit

Author: Jay Beale ,  Roelof Temmingh, B.Eng
ISBN: 9781281035561
Format: Electronic book text
$327.10

A penetration tester must be creative enough to think outside of the box to determine the best attack vector into...  Read More >>

Metasploit Toolkit for Penetration Testing

Metasploit Toolkit for Penetration Testing

Author: David Maynor
ISBN: 9781281112583
Format: Electronic book text
$332.38

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for...  Read More >>

Above the Clouds: Managing Risk in the World of Cloud Computing

Above the Clouds: Managing Risk in the World of Cloud...

Author: Kevin T McDonald
ISBN: 9781282529090
Format: Electronic book text
$121.44

 Read More >>

Hacking Exposed Web Applications

Hacking Exposed Web Applications

Author: Joel Scambray
ISBN: 9781282905337
Format: Electronic book text
$132.00

 Read More >>

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Applied Cryptography for Cyber Security and Defense:...

Author: Hamid R Nemati (University of North Carolina, USA) ,  Hamid R Nemati (University of North Carolina, USA)
ISBN: 9781282895195
Format: Electronic book text
$570.24

This book is written for professionals who want to improve their understanding about how to bridge the gap between...  Read More >>

Hacking Exposed Wireless

Hacking Exposed Wireless

Author: Johnny Cache ,  Joshua Wright
ISBN: 9781282736283
Format: Electronic book text
$131.97

 Read More >>

Trust Modeling and Management in Digital Environments: From Social Concept to System Development

Trust Modeling and Management in Digital Environments:...

Author: Zheng Yan ,  Zheng Yan
ISBN: 9781282500426
Format: Electronic book text
$855.36

Trust Modeling and Management in Digital Environments: From Social Concept to System Development examines how reliance...  Read More >>

Security in Virtual Worlds, 3D Webs, and Immersive Environments

Security in Virtual Worlds, 3D Webs, and Immersive Environments...

Author: Alan Rea (Western Michigan University, USA)
ISBN: 9781283024440
Format: Electronic book text
$475.20

Although one finds much discussion and research on the features and functionality of Rich Internet Applications...  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List