Free Delivery Over $100
10034 books were found.
In recent years, Windows NT and 2000 systems have emerged as viable platforms for Internet servers, but securing... Read More >>
Risk is a cost of doing business. The question is, What are the risks, and what are their costs? Knowing the vulnerabilities... Read More >>
This text is designed to help companies implement e-commerce while minimizing their risk. It presents an overview... Read More >>
Read More >>
If you're charged with maintaining the security of e-commerce sites, you need this unique book that provides an... Read More >>
High-profile viruses and hacking incidents serve to highlight the dangers of system security breaches. This text... Read More >>
Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications... Read More >>
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together... Read More >>
Deals with SSL/TLS, aimed at those concerned with network security. Read More >>
From the #1 name in IT security certification and training, Shon Harris, this valuable boxed set bundles Harris'... Read More >>
his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS... Read More >>
Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe... Read More >>
A guide to understanding, selecting, and deploying intrusion detection in the enterprise. Its advice covers the... Read More >>
This reader is a compilation of current newspaper, magazine and journal articles on issues dealing with e-business.... Read More >>
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents.... Read More >>
This was the first conference jointly organized by the IFIP Working Groups 6. In view of the three sponsoring Working... Read More >>
The reasons in retrospect are not far to seek: advances in technology, changes in the system context, and new types... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the Second International Conference on Information... Read More >>