Free Delivery Over $100
10034 books were found.
Covers the key concepts and technologies of internet protocol data and voice transportation. From traditional data... Read More >>
Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication,... Read More >>
This guide focuses on the issues, innovations, strategies, case studies, and policy choices that will affect all... Read More >>
This tutorial guide to best practices in network security for the administrator. covers: vulnerability assessment,... Read More >>
Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of... Read More >>
This book tells IT what they can do now to implement an investment-savvy disaster recovery plan, using what's already... Read More >>
Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered... Read More >>
"""Computer Security"" is useful for computer security professionals and students." Read More >>
Suitable for network administrators and IT professionals implementing and maintaining remote access systems, this... Read More >>
A guide to network and Internet security written from the hacker's perspective, this book teaches practical, pre-emptive... Read More >>
Covers Windows.NET Server and ISA Server, detailing security threats and outlining requirements for a secure Windows-based... Read More >>
This examines the security problems associated with magnetic stripe cards, and presents the business case for chip... Read More >>
On March 15, 2002 we held a workshop on network interdiction and the more general problem of stochastic mixed integer... Read More >>
Revere system builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push... Read More >>
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building... Read More >>
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between... Read More >>
The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam... Read More >>
Provides IT professionals with comprehensive security coverage of Microsoft's popular operating system, Windows... Read More >>
Read More >>
ICICS2002 is sponsored and organized by the Laboratories for Information Technology, Singapore, in co-operation... Read More >>
The essential tool for understanding and deploying enterprise PKIs. Read More >>
PLEASE PROVIDE COURSE INFORMATION PLEASE PROVIDE Read More >>
Virtual schools are a result of widespread changes in knowledge about learning, in available technology and in society.... Read More >>
Provides a review of network security issues, with relevance to corporate networks, from both an administrative... Read More >>