Free Delivery Over $100
4195 books were found.
Introduces a strategy to protecting your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing... Read More >>
Read More >>
Features the real world cases of botnet attacks to underscore the need for action. This title explains botnet fundamentals... Read More >>
Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to... Read More >>
Constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA... Read More >>
Constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI... Read More >>
Constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography,... Read More >>
A penetrating and insightful study of privacy and security in telecommunications for a post-9/11, post-Patriot Act... Read More >>
Together with a brief introduction into grid computing in general and underlying security technologies, this book... Read More >>
Examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers,... Read More >>
Includes a section that covers key concepts of cryptography, from encryption and digital signatures to cryptographic... Read More >>
This Recommendation specifies key establishment schemes using discrete logarithm cryptography, based on standards... Read More >>
Prepare for the CEH certification exam with this official review guide and learn how to identify security risks... Read More >>
Provides explicit hacks, tutorials, penetration tests, and demonstrations for security professionals and Web application... Read More >>
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all... Read More >>
Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art... Read More >>
Constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam,... Read More >>
Defines more than 900 metrics measuring compliance with legislation, resiliency of security controls, and return... Read More >>
Offers a roadmap to protecting Vista against new and unexpected security threats that might arise to hijack your... Read More >>
Contains terms that are used in the broad fields of electronics data protection and data management in the interconnected... Read More >>
Phishing and Counter-Measures discusses how and why phishing is a threat, and presents effective countermeasures.... Read More >>