Free Delivery Over $100
10034 books were found.
Intrusion detection and protection is a key component in the framework of the computer and network security area.... Read More >>
Read More >>
Includes the refereed proceedings of the 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008)... Read More >>
CompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and... Read More >>
Voice over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer... Read More >>
Revised and updated to include the most up-to-date information, CompTIA Security+ Study Guide, 4th Edition gives... Read More >>
Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date... Read More >>
This book presents the most interesting talks given at ISSE 2008 - the forum for the interdisciplinary discussion... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec... Read More >>
The papers cover topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key... Read More >>
The papers present four families of public key cryptosystems that have the potential to resist quantum computers:... Read More >>
Presents the academic community with a broad range of international findings in online consumer protection. This... Read More >>
Provides practical steps for producing secure information systems, targeted at the highest levels in the organization.... Read More >>
Focusing on the analysis of current and future threats, and best practices for architecture design and service deployment,... Read More >>
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security... Read More >>
Best practices for securing networks with FWSM Understand the differences between PIX/ASA firewall and FWSM... Read More >>
The Only Book for Analyzing and Mitigating Mobile Malicious Code! Read More >>
This is a book about SPAM, e-SCAMs and how to be safe from them. Here is a book written in a simple style and straight... Read More >>
Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar... Read More >>
Examines past research that outlines the requirements for a secure operating system and research that implements... Read More >>
The BACnet standard [1] defines a communication protocol for information exchange between components of a distributed... Read More >>