Free Delivery Over $100
10034 books were found.
A guide to building robust end-to-end security into J2EE enterprise applications, Web services, identity management,... Read More >>
Addresses the operational and day-to-day security management requirements of business stability and disaster recovery... Read More >>
Originally presented as the author's thesis (doctoral)--Univ. Bochum, 2005. Read More >>
Read More >>
Many existing titles provide introductions to security concepts and technologies. The comprehensively researched... Read More >>
A guide to protecting enterprise data. It presents a systematic approach to planning and implementing cost-effective... Read More >>
Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography;... Read More >>
Offers a look at why a network must be set up with certain authentication computer science protocols that guarantee... Read More >>
Provides knowledge you need to protect small businesses from viruses, worms, Trojan horses, spam, spyware, adware,... Read More >>
Because of the business value attributed to information technology, the high costs of this technology and the problems... Read More >>
Addresses security and routing in wireless networks. The goal of this book is to serve as a reference for both security... Read More >>
Roland Steidle untersucht, wie Assistenzsysteme in einem verteilten System datenschutzkonform gestaltet werden konnen.... Read More >>
This is CISO Security Program Metrics. It provides tools for the CISO to help get their job done effectively, efficiently,... Read More >>
The importance of auditing at both the server and network level and how to create trust relationships and domains... Read More >>
Shows readers how to strengthen the weak spots they find in their network's armor. This book enables readers discover... Read More >>
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking,... Read More >>
This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which... Read More >>
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures... Read More >>
Sheds light on practice design, deployment, and maintenance of an ISA Server 2004 Environment. This book provides... Read More >>
The problem of providing secure network access for remote mobile users is becoming more and more complicated. Therefore... Read More >>
These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme... Read More >>
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean... Read More >>
With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi and the growing interest in the... Read More >>
Showing you how to regain control of your life, this book teaches how to keep private information private, stop... Read More >>