Free Delivery Over $100
4195 books were found.
Information security experts in industry can use the book as a guide for understanding what is needed to implement... Read More >>
Constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held in... Read More >>
Read More >>
Constitutes the post-proceedings of the First International Workshop on Secure Mobile Ad-hoc Networks and Sensors,... Read More >>
Presents a perspective of the ISO/IEC 17799 Information Security Standard and provides an analysis of how to effectively... Read More >>
It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses... Read More >>
3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch... Read More >>
A rated survey list of available systems and tools completes the book.With this broad overview, the authors address... Read More >>
Constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption,... Read More >>
"There is no such thing as ""perfect security"" when it comes to keeping all systems intact and functioning properly.... Read More >>
Constitutes the refereed post-proceedings of the First International Conference on Digital Rights Management: Technology,... Read More >>
Constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware,... Read More >>
Constitutes the thoroughly refereed postproceedings of the 5th International Workshop on Privacy Enhancing Technologies,... Read More >>
” In addition to the regular papers the program also included three invited talks. We wish to thank all the authors... Read More >>
Provides an overview of the two international information security standards, ISO/IEC 27001:2005 and ISO/IEC 17799:2005.... Read More >>
Helps you determine if you have what it takes to keep hackers out of your network. This title features twenty real-life... Read More >>
Illustrates the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct... Read More >>
Constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication... Read More >>
The Secure Online Business Handbook is a practical guide for managers in developing and implementing appropriate... Read More >>
""The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets"" deals with computers/software.... Read More >>
This is especially so for video conferencing, thin-client computing and Internet cafes.CryptoGraphics: Exploiting... Read More >>
Provides an overview of the implementation of an Information Security Management System that conforms to the requirements... Read More >>
The 2006 edition of the Eurocrypt conference was held in St. Petersburg,Russia from May 28 to June 1, 2006. In total,... Read More >>
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation is a definitive textbook on... Read More >>