Free Delivery Over $100
4195 books were found.
"""Designing BSD Rootkits"" introduces the fundamentals of programming and developing rootkits under the FreeBSD... Read More >>
A rootkit is a type of malicious software that gives the hacker root or administrator access to your network.... Read More >>
An insider's guide to auditing software security. It uncovers vulnerabilities in applications ranging from sendmail... Read More >>
Provides a synopsis of the technologies in information policy, security, privacy, and access, as well as the best... Read More >>
Constitutes the refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT... Read More >>
Theseproceedingscontainthepapersofthe3rdEuropeanWorkshoponSecurity and Privacy in Ad Hoc and Sensor Networks (ESAS... Read More >>
All the submissions were reviewed by at least three reviewers, which was possible by the hard work of 23 Program... Read More >>
Serving as a guide to securing DB2, this book provides DBAs and their managers with security information. It offers... Read More >>
Read More >>
Constitutes the refereed post-proceedings of the 6th International Workshop on Privacy Enhancing Technologies, PET... Read More >>
Constitutes the refereed post-proceedings of the First International Workshop on Critical Information Infrastructures... Read More >>
An Inside Look at Windows Vista Security for Systems Administrators Get an early start on Windows Vista security... Read More >>
Data warehousing and data mining provide techniques for collecting information from distributed databases and for... Read More >>
This book is the first comprehensive overview of contemporary systems for secure electronic/digital postage. It... Read More >>
Company network administrators are compelled today to aggressively pursue a robust network security regime. This... Read More >>
Database security is one of the classical topics in the research of information system security. In recent years,... Read More >>
Constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS... Read More >>
Acts as a guide for software developers who must learn and implement cryptography. Introducing the subject of cryptography,... Read More >>
Privacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the... Read More >>
Constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006,... Read More >>
Constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS... Read More >>
Covering technologies used to search for vulnerabilities on websites from a hacker's point of view, this book on... Read More >>
It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications... Read More >>
Constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology... Read More >>