Free Delivery Over $100
4195 books were found.
A dictionary and handbook that defines the field and provides unique insight Turn to Minoli-Cordovana's Authoritative... Read More >>
Read More >>
Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall... Read More >>
Cryptosystems are inherently computationally complex and in order to satisfy the high throughput requirements of... Read More >>
Constitutes the refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data... Read More >>
These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held... Read More >>
Introduces software professionals to the mindset and techniques they need to build secure software systems. This... Read More >>
Helps implement e-business security. This title helps defend against Web-based attacks by looking at your Web applications... Read More >>
Constitutes the refereed post-proceedings of the 12th International Workshop on Security Protocols, April 2004.... Read More >>
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and... Read More >>
An encyclopedia that contains information on various aspects of cryptography and security. It covers subject areas... Read More >>
"""Finding Security Bugs"" deals with computers/software." Read More >>
Provides a step towards narrowing the gap between security and software engineering. This book introduces the field... Read More >>
Shows how to strategically maximize a limited security budget without compromising the quality of risk management... Read More >>
The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Italy, on September... Read More >>
Managers responsible for IT/Security departments from mall office environments up to enterprise networks need to... Read More >>
Presents the technologies, strategies and methodologies needed to successfully thwart off those who thrive on security... Read More >>
th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island,... Read More >>
Presents information on the use of several algebraic techniques in analyzing the AES. This book is useful for academic... Read More >>
Serving as a guide to using SELinux in production environments, this book illuminates various facets of working... Read More >>
For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This... Read More >>
Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection... Read More >>