Free Delivery Over $100
10034 books were found.
Written by a well-known figure in the security/hacking community, this book stimulates readers to think more creatively... Read More >>
A recipe book. Read More >>
The first general interest book by a blogger edited collaboratively by his readers, Darknet reveals how Hollywooda... Read More >>
Contains sections that include Coding, which covers the basics in coding complemented with programming tips and... Read More >>
Visual Studio .Net includes a wealth of little-used capabilities, is very customizable, has a complete automation... Read More >>
Offers a dual perspective on security: how your network looks to hackers who want to get inside, and how you need... Read More >>
Firefox Hacks is ideal for power users who want to maximize the effectiveness of Firefox, the next-generation web... Read More >>
Provide a detailed analysis of the timely and dangerous attack vectors targeted at operating systems, applications,... Read More >>
Begins with an overview of investigation and computer foundations. This book describes data structures, analyzes... Read More >>
A comprehensive survey of computer network security concepts, methods, and practices. This broad-ranging text/reference... Read More >>
This all-purpose guide for locking down Apache arms readers with all the information they need to securely deploy... Read More >>
Read More >>
Despite passed legislation, the volume of junk e-mail continues to grow at a rate of 37 percent per week. This title... Read More >>
Presents some of the important research trends reflected in advances in computer security, including: security protocol... Read More >>
Proceedings of SPIE offer access to the latest innovations in research and technology and are among the most cited... Read More >>
A guide to preventing network intrusions and defending against intrusions that manage to slip through your perimeter.... Read More >>
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different... Read More >>
The hacker's point of view sheds new light on the PC, the Windows operating system, and the Internet. Tips on the... Read More >>
This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various... Read More >>
Shows how to meet security challenges by presenting security best practices, rules, and customs. This work uses... Read More >>
Constantin von Stechow untersucht, wie der Einsatz von Privacy Enhancing Technologies rechtlich und in der taglichen... Read More >>
Provides information on Microsoft's log parser tool. This book contains several customized, working scripts and... Read More >>
A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific,... Read More >>
Helps readers learn how to plan for and implement VoIP security solutions in converged network infrastructures.... Read More >>