Free Delivery Over $100
10034 books were found.
A guide to planning and performing a physical penetration test on your computer's security. It guides you through... Read More >>
This book provides a solid ground for researchers approaching the topic of privacy in location-based applications... Read More >>
Our best weapons against invasions of privacy are knowledge of the issues and action to protect ourselves. Risky... Read More >>
<p>This book constitutes the refereed proceedings of the 28th International Conference on Computer Safety, Reliability,... Read More >>
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally... Read More >>
Read More >>
This textbook provides a framework for thinking about security, with attention to specific types of security problems... Read More >>
Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT... Read More >>
Complete Hands-On Help for Securing VMware vSphere and Virtual Infrastructure by Edward Haletky, Author of the Best... Read More >>
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the... Read More >>
For undergraduate and graduate network security courses. This book aims to provide comprehensive knowledge of... Read More >>
Intended for researchers in wireless and computer technology, as well as graduate students, this book covers in... Read More >>
The 2009 Australasian Conference on Information Security and Privacy was the 14th in an annual series that started... Read More >>
ISA 2009 was a succ- sor of the First International Workshop on Information Assurance in Networks (IAN 2007, Jeju-island,... Read More >>
Adopting an approach that favors full disclosure, ""The Rootkit Arsenal"" presents the most accessible, timely,... Read More >>
Identifies key attributes of cyber analysis and warning capabilities, and compares these attributes with US-CERT's... Read More >>
<p>This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and... Read More >>
This text introduces a complete and concise view of network security. It provides in-depth theoretical coverage... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network... Read More >>
Reserving data authenticity in a hostile environment, where the sensor nodes may be compromised, is a critical security... Read More >>
security incidents in the security security equipment at the perception regarding security on the Internet in Spanish... Read More >>