Free Delivery Over $100
10034 books were found.
This text introduces a complete and concise view of network security. It provides in-depth theoretical coverage... Read More >>
Offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards,... Read More >>
Read More >>
Taking a non-nonsense look at identity theft, one of the world's most renowned security experts explains what consumers... Read More >>
Wireless Mesh Networks (WMN) is a promising technology that will play an increasingly important role in the next... Read More >>
APPLIED SECURITY VISUALIZATION “Collecting log data is one thing, having relevant information is something... Read More >>
This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks,... Read More >>
Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology.... Read More >>
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals,... Read More >>
Defining key threats an average household computer might face, and offering strategies to turn novice and basic... Read More >>
Reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network.... Read More >>
Examines the decision making process and health seeking patterns of low-income young women with unplanned pregnancies... Read More >>
The 16 revised full papers and 9 revised short papers presented together with 5 poster papers, 2 panel reports,... Read More >>
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference... Read More >>
Teaches Google searching basics. This book lets you explore Google's Web-based Interface, build Google queries,... Read More >>
An invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and... Read More >>
Online Predators is a guide for parents who want to know if their child is at risk due to information they share... Read More >>
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held... Read More >>
Is It Safe? PROTECTING YOUR COMPUTER, YOUR BUSINESS, AND YOURSELF ONLINE IDENTITY THEFT. DATA THEFT. INTERNET... Read More >>
Constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security,... Read More >>
<p>This book constitutes the refereed proceedings of the Second International Conference on Information Systems... Read More >>
Constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in... Read More >>