Free Delivery Over $100
4195 books were found.
The current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency on... Read More >>
Provides practical guidance for businesses and advisers on the procedures that they need to follow to ensure full... Read More >>
Presenting a foundation in disaster recovery principles and planning, this book emphasizes the importance of incident... Read More >>
Constitutes the refereed proceedings of the Third Theory of Cryptography Conference, TCC 2006, held in New York,... Read More >>
What is it about software that makes security such a problem? If you want to build secure software, how do you do... Read More >>
Symbian OS is an advanced, customizable operating system, which is licensed by the world's leading mobile phone... Read More >>
Security of Multimedia Content: Technical Solutions, Legislation and Business Models provides a valuable overview... Read More >>
Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held... Read More >>
Reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how... Read More >>
We had sessions on the detection and containment of Internet worm attacks, anomaly detection, automated response... Read More >>
The 25 revised full papers presented here together with 7 invited papers address subjects such as block codes; algebra... Read More >>
Shows the reader how to guard agains rampant viruses and worms, and to identify hacker threats. Read More >>
Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable... Read More >>
The RSA R Conference, with over 15,000attendees, as well as over 225 sponsors and exhibitors, is the largest computer... Read More >>
First to market! This is the only book focusing solely on Cisco network hacking, security auditing and defense... Read More >>
Covers optimal authentication codes, unconditionally secure authentication schemes, and both symmetric and asymmetric... Read More >>
Read More >>
Computers/Software. Read More >>
Examines how risk management security technologies must prevent virus and computer attacks, as well as providing... Read More >>
Aims to map to the exam objectives for the Security Certified Network Professional exam. Read More >>
Teaches users how to select passwords that always meet complexity requirements. This book examines the password... Read More >>
IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business... Read More >>
ISO 27001:2005 replaced the information security standard BS7799-2 from October, 2005. This book offers practical... Read More >>