Free Delivery Over $100
10034 books were found.
Discusses wireless security issues from physical layer to application layer. This book identifies important vulnerabilities... Read More >>
Offers an explanation of information security, physical security, and why approaching these two different types... Read More >>
The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than... Read More >>
Provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations... Read More >>
Read More >>
Rather than simply take readers through Wiresharks tools, this guide shows how to use the software to monitor their... Read More >>
Constitutes the refereed proceedings of the 5th International Conference on Applied Cryptography and Network Security,... Read More >>
Mobilitat, Sicherheit und Web Services sind zentrale Herausforderungen kunftiger Business-IT-Losungen und viel diskutierte... Read More >>
Covers real, tactical wireless security implementation. This title shows how to execute the attacks and implement... Read More >>
Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are the... Read More >>
Who, except the senders of this dangerous and ever-more sophisticated material, is not attacked everyday? What laws... Read More >>
Der Sammelband präsentiert die Ergebnisse zweier Simulationsstudien im Rahmen des Forschungsprojekts ""Multimedialer... Read More >>
Introduces a strategy to protecting your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing... Read More >>
Kostensenkungen, E?zienzsteigerungen und die Erhöhung der Flexibilität hinsichtlich zukünftiger Anforderungen ist... Read More >>
Features the real world cases of botnet attacks to underscore the need for action. This title explains botnet fundamentals... Read More >>
Explores technologies and applications needed to overcome security issues in wireless and handheld communications... Read More >>
Demonstrates how to get big dollar security for your network using freely available tools. This book explains security... Read More >>
Suitable for beginners in security, this textbook simplifies the difficult concepts of cryptography and network... Read More >>
Power analysis attacks allow the extraction of secret information from smart cards. In all these applications, the... Read More >>
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included... Read More >>
Network participants are required to observe predefined steps called security protocols, whose proof of correctness... Read More >>