Network security books

10034 books were found.

dotCrime Manifesto, The: How to Stop Internet Crime

dotCrime Manifesto, The: How to Stop Internet Crime...

Author: Phillip Hallam-Baker
ISBN: 9780132701976
Format: Electronic book text
$73.89

Internet crime keeps getting worse...but it doesn't have to be that way. In this book, Internet security pioneer...  Read More >>

Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings

Information and Communications Security: 9th International...

Author: Hideki Imai ,  Guilin Wang
ISBN: 9783540770473
Format: Paperback
$237.47

Constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security,...  Read More >>

Identity Theft: A Comprehensive Guide

Identity Theft: A Comprehensive Guide

Author: Jay Mason
ISBN: 9780595481286
Format: Paperback
$28.91

Identity Theft: A Comprehensive Guide, enables readers to understand, prevent and recover from the crime of identity...  Read More >>

Secure Telematic Applications for National Scale Projects

Secure Telematic Applications for National Scale Projects...

Author: J.-G. Fontaine ,  M. Makhaniok
ISBN: 9781586039349
Format: Paperback
$222.53

The NATO Advances Research Workshop 'Secure Telematic Applications for National Scale Projects' is organized in...  Read More >>

Computer Security, Privacy and Politics

Computer Security, Privacy and Politics

Author: Ramesh Subramanian (Quinnipiac University, USA) ,  Ramesh Subramanian (Quinnipiac University, USA)
ISBN: 9781281232311
Format: Electronic book text
$263.87

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive...  Read More >>

Multimedia Forensics and Security

Multimedia Forensics and Security

Author: Chang-Tsun Li (University of Warwick, UK)
ISBN: 9781281411617
Format: Electronic book text
$475.20

As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet...  Read More >>

Pattern Recognition Technologies and Applications

Pattern Recognition Technologies and Applications

Author: Brijesh Verma (Central Queensland University, Australia) ,  Michael Blumenstein (Griffith University, Australia)
ISBN: 9781281333711
Format: Electronic book text
$475.20

The nature of handwriting in our society has significantly altered over the ages due to the introduction of new...  Read More >>

Cryptanalytic Attacks on Rsa

Cryptanalytic Attacks on Rsa

Author: Song Y Yan (Massachusetts Institute of Technology, USA)
ISBN: 9781281138415
Format: Undefined
$314.16

RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers....  Read More >>

Web Security Testing Cookbook

Web Security Testing Cookbook

Author: Paco Hope ,  Ben Walther
ISBN: 9781306816199
Format: Electronic book text
$84.45

 Read More >>

Screenos Cookbook

Screenos Cookbook

Author: Stefan Brunner ,  Vik Davar
ISBN: 9781306814980
Format: Electronic book text
$116.13

Helps you troubleshoot secure networks that run ScreenOS firewall appliances. This book offers recipes that address...  Read More >>

Digital Watermarking and Steganography

Digital Watermarking and Steganography

Author: Ingemar Cox (Professor, University College, London, U.K.) ,  Matthew Miller (NEC, Princeton, NJ, U.S.A.)
ISBN: 9780123725851
Format: Hardback
$232.19

Containing information on steganalysis and steganography, this book includes watermarking with side information,...  Read More >>

TechnoSecurity's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

TechnoSecurity's Guide to E-Discovery and Digital Forensics:...

Author: Jack Wiles (Co-founder and President of TheTrainingCo.; Founding member of the U.S. Secret Service South Carolina Electronic Crimes Task Force) ,  Jack Wiles
ISBN: 9781597492232
Format: Paperback
$166.19

Provides IT security professionals with the information needed to create, manage and sustain a digital forensics...  Read More >>

Web 2.0 Security: Defending Ajax, Ria, and Soa

Web 2.0 Security: Defending Ajax, Ria, and Soa

Author: Shreeraj Shah
ISBN: 9781584505501
Format: Mixed media product
$131.97

Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup...  Read More >>

The Best of FreeBSD Basics

The Best of FreeBSD Basics

Author: Dru Lavigne ,  Jeremy C Reed
ISBN: 9780979034220
Format: Paperback
$65.85

 Read More >>

How to Cheat at Securing Your Network

How to Cheat at Securing Your Network

Author: Ido Dubrawsky (Chief Security Advisor, Microsoft’s Communication Sector North America, a division of the Mobile and Embedded Devices Group)
ISBN: 9781597492317
Format: Paperback
$137.15

Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities,...  Read More >>

Cryptology and Network Security: 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings

Cryptology and Network Security: 6th International Conference,...

Author: Feng Bao ,  San Ling
ISBN: 9783540769682
Format: Paperback
$184.67

Constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS...  Read More >>

Multimedia Forensics and Security

Multimedia Forensics and Security

Author: Chang-Tsun Li
ISBN: 9786611411619
Format: Electronic book text
$950.40

As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet...  Read More >>

Security+, Update for Guide to Network Security Fundamentals

Security+, Update for Guide to Network Security Fundamentals...

Author: Mark Ciampa
ISBN: 9781428360853
Format: Paperback
$81.71

The Security+ Guide to Network Security Fundamentals Second Edition Update is designed to provide updated information...  Read More >>

Google Hacking for Penetration Testers, Volume 2

Google Hacking for Penetration Testers, Volume 2

Author: Johnny Long
ISBN: 9786611325480
Format: Electronic book text
$263.74

A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search,...  Read More >>

Information Security and Ethics: Concepts, Methodologies, Tools, and Applications

Information Security and Ethics: Concepts, Methodologies,...

Author: Hamid Nemati
ISBN: 9786610948697
Format: Electronic book text
$9240.00

Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information...  Read More >>

Botnet Detection: Countering the Largest Security Threat

Botnet Detection: Countering the Largest Security Threat...

Author: Wenke Lee ,  Cliff Wang
ISBN: 9786611116873
Format: Electronic book text
$522.72

Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders...  Read More >>

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit...

Author: Jesse Varsalone (Elkridge, Maryland, USA)
ISBN: 9781282169326
Format: Electronic book text
$199.43

The only forensic analysis book covering Macintosh OS X, iPods, and iPhones  Read More >>

Mobile Malware Attacks and Defense

Mobile Malware Attacks and Defense

Author: Ken Dunham (Rampart Research)
ISBN: 9781282169333
Format: Electronic book text
$189.92

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs,...  Read More >>

Network Security Technologies and Solutions (CCIE Professional Development Series)

Network Security Technologies and Solutions (CCIE Professional...

Author: Yusuf Bhaiji
ISBN: 9781282610361
Format: Electronic book text
$110.88

 Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List