Free Delivery Over $100
10034 books were found.
Read More >>
<p>This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec... Read More >>
In particolare vengono analizzati gli effetti dei nuovi sistemi di gestione dei diritti di proprietà intellettuale... Read More >>
Security issues in ad-hoc and sensor networks have become extremely important. This book provides a comprehensive... Read More >>
Dr. Jahangiri, a world-renowned information technology expert, presents a comprehensive guide to computer hacking.... Read More >>
In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely... Read More >>
An all-new study guide for the all-new CCNA Security exam Read More >>
While for a large variety of these systems such as transportation systems, nuclear or chemical plants, or medical... Read More >>
"""PREPARING TOMORROW'S INFORMATION SECURITY PROFESSIONALS""--Cover." Read More >>
Intended for anyone from the mobile user to a student or professional working in a wireless environment, this title... Read More >>
The first test prep guide for the new ISC2 Certified Secure Software Lifecycle Professional exam The CSSLP (Certified... Read More >>
Virtualization is becoming extremely important: organizations can run multiple instances of a variety of operating... Read More >>
The papers in this s- tion deal with provenance access control, access control model for collaborative editors,... Read More >>
These proceedings contain the papers presented at VoteID 2009, the Second - ternationalConferenceonE-votingandIdentity.TheconferencewasheldinL-... Read More >>
Covers the various aspects of intrusion detection and response systems. This book not only covers the developments... Read More >>
This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September... Read More >>
A hands-on guide to implementing Cisco ASA (Adaptive Security Appliance) Read More >>
<p>This is one of the first books to provide an overview of trust management for open service-oriented environments.... Read More >>
<p>This volume constitutes the refereed proceedings of 11 international workshops held as part of OTM 2010 in Hersonissos,... Read More >>
The objective of computer security varies and can include protection of information from theft or corruption, or... Read More >>