Free Delivery Over $100
10034 books were found.
Comprehensive coverage is given in this up-to-date and practical guide to Web services security--the first to cover... Read More >>
Features a four-part hardening methodology; checklist of steps to take to lockdown your system from further attack;... Read More >>
The author looks at key identity theft prevention measures, including behaviour profiling and entity validation.... Read More >>
Focusing completely on infrastucture security: network devices, protocols and architectures, this book offers coverage... Read More >>
Read More >>
Master network security design with guidance from the creators of the Cisco Systems SAFE security blueprint, this... Read More >>
The practice of WarDriving is a combination of hobby, sociological research, and security assessment. This book... Read More >>
The topics covered in the book include basic vulnerability discovery and development on popular operating systems... Read More >>
<p>The nice thing about the Internet is that anyone can access your web site. This can also be a drawback. PHP (and... Read More >>
Providing readers with a set of sound practices they can selectively adopt to increase the security and dependability... Read More >>
Cisco is moving into the network security arena with a line-up of security products, integrating security software... Read More >>
Describes recent discoveries on how to design advanced malicious computer viruses, worms, and Trojan horses. The... Read More >>
When it comes to security products and technologies, experience is far and away the best teacher. This work shows... Read More >>
The lectures are devoted to:- Formal Approaches to Approximating Noninterference Properties - The Key Establishment... Read More >>
Provides readers with the perfect balance of the theories and concepts behind internet security, and the practical... Read More >>
An authorized self-study guide based on the CCSP CSPFA 642-521 exam from Cisco Systems, this book covers the management... Read More >>
Once again we bring you the proceedings of the International Workshop on Security Protocols. This year our theme... Read More >>