Free Delivery Over $100
10034 books were found.
Read More >>
This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Formal Aspects... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Privacy Enhancing... Read More >>
The first book to provide detailed information about spidering and scraping methodologies. Shows how to begin collecting... Read More >>
Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies... Read More >>
Safeguarding the confidentiality, authenticity, integrity, and non-repudiation of information is paramount to organizational... Read More >>
Hackers have uncovered the dark side of cryptography--that device developed to defeat Trojan horses, viruses, password... Read More >>
This is a field guide to the woolly world of non-trivial deployed web services. Standard bodies may wrangle and... Read More >>
Provides a holistic approach to network security, giving IT professionals the logical, concise, hands-on information... Read More >>
Learn about firewalls, wireless security, desktop protection, biometrics, new IDS technology, and get up-to-date... Read More >>
In depth guide to implementing antispam solutions using SpamAssassin FEATURES AT A GLANCE * Implement the right... Read More >>
Providing a comprehensive coverage of Frame Relay technologies and the Cisco Frame Relay solutions developed in... Read More >>
This guide is designed to expand networking student's basic network and operating system skills to include planning,... Read More >>
Safety Monitor provides hands-on, step-by-step, practical instruction for parents to protect their children from... Read More >>
A tactical guide to installing, implementing, optimizing, and supporting SSH in order to secure your network Prevent... Read More >>
Cisco Systems, Inc is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line... Read More >>
Reveals how readers can evaluate the security needs of their networks, develop a security policy for their companies,... Read More >>
Provides information about securing HP NonStop servers. This book places emphasis on explaining security risks and... Read More >>
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... Read More >>