Free Delivery Over $100
4195 books were found.
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results... Read More >>
Deals with the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing... Read More >>
Investigates the security-related specifications that encompass message level security, transactions, and identity... Read More >>
* Cryptography is the study of message secrecy and is used in fields such as computer science, computer and network... Read More >>
The Computer Science is relatively new field which is developing very fast not only because due to the huge interest... Read More >>
Constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, held... Read More >>
Read More >>
The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties... Read More >>
The International Workshop on Security (IWSEC 2007) was the second in the annualseriesthat startedin 2006.IWSEC... Read More >>
Guide to Tactical Perimeter Defense examines the critical defensive technologies needed to secure network perimeters.... Read More >>
Serves as the source on theories and models associated with information privacy and safeguard practices. This work... Read More >>
Constitutes the refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography,... Read More >>
"""LAN Switch Security"" explains all the vulnerabilities in a network infrastructure related to Ethernet switches.... Read More >>
This book is a series of related chapters on advanced topics in computer security for researchers in computer and... Read More >>
The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. The latest... Read More >>
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest... Read More >>
Constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held... Read More >>
Constitutes the refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and... Read More >>
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies,... Read More >>
Constitutes the refereed proceedings of the 12th European Symposium on Research in Computer Security, ESORICS 2007,... Read More >>
"""Netfilter: Intrusion Detection & Response"" deals with computers/software." Read More >>
Deals with computers/software. Read More >>