Free Delivery Over $100
10034 books were found.
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it... Read More >>
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security... Read More >>
Read More >>
Provides explicit hacks, tutorials, penetration tests, and demonstrations for security professionals and Web application... Read More >>
A guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics,... Read More >>
Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art... Read More >>
Der Einsatz von Intrusion-Detection-Systeme zum Schutz vor Angriffen von IT-Systemen ist häufig von Fehlalarmen... Read More >>
The RadioBSD Crier: 2007/01 brings you a 24-page article on managing FreeBSD and NetBSD IPFW, IPFW2, and IP6FW firewalls.... Read More >>
VoIP is a communications technology that is prone to attacks such as SPIT, Voicemail Brute forcing, Caller ID Spoofing,... Read More >>
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures.... Read More >>
Network Admission Control (NAC) uses the network infrastructure to enforce security policy compliance on all devices... Read More >>
Faculty of Advanced Technology, University of Glamorgan, Wales, UK Read More >>
Constitutes the refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET... Read More >>
Data warehousing and data mining provide techniques for collecting information from distributed databases and for... Read More >>
The Ultimate Reference & Learning Guide for the Internet Professional! In depth and current overview of common challenges... Read More >>
Company network administrators are compelled today to aggressively pursue a robust network security regime. This... Read More >>
Offers 125 concise and practical hacks, including information for Windows administrators, hacks for wireless networking... Read More >>
Network Admission Control (NAC) is designed to prohibit or restrict access to the secured internal network from... Read More >>
Delivers techniques for anticipating and identifying software security problems. Reviewing the design and coding... Read More >>
The average user has little idea of the severity of security threats to the Windows Vista OS or how those threats... Read More >>
Covering technologies used to search for vulnerabilities on websites from a hacker's point of view, this book on... Read More >>
Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises... Read More >>