Free Delivery Over $100
10034 books were found.
<p>This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume... Read More >>
SSL Remote Access VPNs An introduction to designing and configuring SSL virtual private networks Jazib... Read More >>
Surveys current and proposed spam filtering techniques with particular emphasis on how well they work. The primary... Read More >>
Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study... Read More >>
Der Begriff Trusted Computing umschreibt eine Reihe neuer Ansätze zur Verbesserung der Computersicherheit durch... Read More >>
""Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than... Read More >>
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust... Read More >>
Understanding network vulnerabilities in order to protect networks from external and internal threats is vital to... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network... Read More >>
Read More >>
Comprehensive Group Policy Coverage, including Windows Server 2008 and Vista SP1 This new edition of Group Policy:... Read More >>
Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing... Read More >>
A study guide for all three Juniper Enterprise Routing certification exams. It covers all three certification exams... Read More >>
IT Governance, fully updated for this 4th edition, provides essential reading on how best to deal with information... Read More >>
Previous ed. published as by Greg Holden. Boston, Mass.: Course Technology, 2004. Read More >>
Presents research on security issues in various wireless communications, advances in wireless security, the wireless... Read More >>
The first cybercafes have increasingly become more popular. This title explores the emerging trends and technologies... Read More >>
This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008,... Read More >>
Looks at the difficulty of arriving at a definition of cyber terrorism. This publication examines cyber terrorism... Read More >>
""Security engineering is different from any other kind of programming... if you're even thinking of doing any security... Read More >>