Free Delivery Over $100
10034 books were found.
For advanced information security courses on disaster recovery With real world examples, this text provides... Read More >>
A dictionary and handbook that defines the field and provides unique insight Turn to Minoli-Cordovana's Authoritative... Read More >>
Read More >>
Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall... Read More >>
Thomas Wölfls Modell erlaubt erstmals neben der Herleitung von Schlüsselauthentizität auch die Ableitung von Attributauthentizität... Read More >>
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement... Read More >>
Protect your network with self-regulating network security solutions that combat both internal and external threats.... Read More >>
Constitutes the refereed post-proceedings of the 12th International Workshop on Security Protocols, April 2004.... Read More >>
A complete program of textbook, lab manual, and software, this Academic Learning Series textbook and lab manual... Read More >>
Offers the busy network administrator with solutions to securing the wireless network. This book provides the basic... Read More >>
Provides a tutorial - including tricks and tools that hackers use, a primer on network security design fundamentals,... Read More >>
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult... Read More >>
Gives an introduction to designing and configuring Cisco IPsec VPNs. This work provides a basic working knowledge... Read More >>
The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded... Read More >>
For anyone involved with computer security, including security administrators, system administrators, developers,... Read More >>
Explores the International Standards Organizations Open System Interconnect (ISO OSI) network stack and discusses... Read More >>
Demonstrates the role of morality and ethics in the deliberations and decisions of people handling information technology.... Read More >>
Constitutes the thoroughly refereed postproceedings of the 5th International Workshop on Privacy Enhancing Technologies,... Read More >>
Matthias Christoph Schwenke untersucht die Ambivalenz des Phänomens ""Individualisierung"" insbesondere unter datenschutzrechtlichen... Read More >>
Presents the technologies, strategies and methodologies needed to successfully thwart off those who thrive on security... Read More >>
Provides an overview of the two international information security standards, ISO/IEC 27001:2005 and ISO/IEC 17799:2005.... Read More >>