Free Delivery Over $100
10034 books were found.
The 1st International Conference on “Applied Cryptography and Network Se- rity” (ACNS 2003) was sponsored and organized... Read More >>
If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book... Read More >>
ICICS 2003, the Fifth International Conference on Information and C- munication Security, was held in Huhehaote... Read More >>
ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on... Read More >>
The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin... Read More >>
Shows experienced programmers how to meet tough security challenges. This book helps programmers work fluently with... Read More >>
This guide provides applied security techniques for J2EE programmers and developers. It explains security concepts... Read More >>
This book constitutes the refereed proceedings of the Second International Workshop on Mathematical Methods, Models,... Read More >>
Shows you practical workarounds and fixes for the vulnerabilities in WLANs. This easy-to-use WLAN security book... Read More >>
Microsoft's .NET Framework provides developers with a powerful set of tools to make their applications secure. This... Read More >>
This book constitutes the refereed proceedings of the 6th International Symposium on Recent Advances in Intrusion... Read More >>
Christian Meyn untersucht, wie sich das Bedürfnis nach Sicherheit vor Kriminalität und Terrorismus mit der verlässlichen... Read More >>
Wireless LAN networking can enable small teams, communities to communicate via their mobile devices without cables.... Read More >>
- Proven--based on field experience - Authoritative--offers the best advice available - Accurate--technically validated... Read More >>
Suitable for cryptographers, this book is self-contained; it presents background material to understand an algorithm... Read More >>
This work discusses research in theoretical and practical aspects of security in distributed systems, in particular... Read More >>
Because of their small, portable nature, PDAs present a unique security dilemma. This title is suitable for PSA... Read More >>
Providing descriptions of security techniques, this title presents significant clarification of IEEE draft standards.... Read More >>
Read More >>
Providing a source for features, capabilities, how to instructions, security recommendations, and practices for... Read More >>
The very best way to protect a company's data and make it highly available 24/7 is to correctly install, configure,... Read More >>
The main purpose of the tutorial was to present and discuss an Architecture for Informa tion Security Management... Read More >>
This work addresses the concern for online privacy through an examination of the Center for Democracy and Technology.... Read More >>
Presenting practical lab scenarios for Cisco certification exams, these practical guides shows networking students... Read More >>
Provides everyone from network professionals to students a single source for learning and implementing security... Read More >>