Free Delivery Over $100
10034 books were found.
This title enables readers to master penetration testing: hack your own systems to discover and fix their vulnerabilities.... Read More >>
A collection of 26 papers selected from 69 submissions plus one invited talk. Among the topics addressed are encryption... Read More >>
A comprehensive introduction to VPNs and networking basics, this book provides readers with a solid foundation... Read More >>
Read More >>
This book aims to go behind the headlines, examine the major security risks in the 20th century and explain how... Read More >>
A guide to Windows 2000 security. This work contains topics like: physical and file system security; password security;... Read More >>
Internet Security expert Matt Curtin's book, Building Trust: Online Security For Developers, serves as a guide for... Read More >>
This work provides coverage of Web security threats and vulnerabilities on the Internet and on intranets. It gives... Read More >>
Written in clear language with lots of real-world examples, Cyber Threat takes the reader into the darker side... Read More >>
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together... Read More >>
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge... Read More >>
This volume provides information for creating and implementing a successful security and disaster recovery plan.... Read More >>
From an industry insider--a close look at high-performance, end-to-end switching solutionsLoad balancers are fast... Read More >>
Provides firewall information on the personal firewall software applications available for the non expert firewall... Read More >>
This revised edition offers professionals an up-to-date and comprehensive understanding of the technologies that... Read More >>
Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. Read More >>
Includes the developments in: security protocols; secure software engineering; mobile agent security; e-commerce... Read More >>
A separate Answer Key to the workbook activities is available for instructors who want students to check their own... Read More >>
Coverage of the cryptographic classes in .NET - analysis of the .NET security model. Read More >>
Learn the techniques necessary to build a secure e-mail server using the Unix operating system and Open Source e-mail... Read More >>
"Reviewing the threats to Windows PC such as what hackers know about your computer and the Internet, and how they... Read More >>
Shows you how to avoid security problems the right way. Read More >>
Government regulation and new legislation, coupled with technology, have the potential to change the nature of the... Read More >>