Free Delivery Over $100
10034 books were found.
The Advanced Computer Systems Conference was held in October 2006, in Miedzyzdroje, Poland. This book contains a... Read More >>
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere,... Read More >>
Read More >>
La guia esencial para Seguridad y conceptos de auditoria SAP Con 75 elementos esenciales de seguridad, preguntas... Read More >>
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks... Read More >>
Details both the management and technical skill and tools required to develop an effective vulnerability management... Read More >>
The 27th Annual International Cryptology Conference was held in Santa Barbara, California, in August 2007. The conference... Read More >>
Critical Information Infrastructures starts with some basic definitions and assumptions on the topic. It goes on... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
Constitutes the papers of the Third International Conference on E-business and Telecommunication Networks, ICETE... Read More >>
<p>Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System... Read More >>
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional... Read More >>
Focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. This work is... Read More >>
Offers a look at network security. This book guides readers step-by-step through the 'stack' - the seven layers... Read More >>
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions.... Read More >>
Covers the economics of cyber security and the intersection of privacy and information security. This title introduces... Read More >>
Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e.,... Read More >>
Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security... Read More >>
Helps you understand Cisco Security Monitoring, Analysis, and Response System that reduces your security risks and... Read More >>
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion... Read More >>
A companion guide for the Cisco Networking Academy Program. It is designed as a portable desk reference to be used... Read More >>