Free Delivery Over $100
4195 books were found.
Acts as a guide for software developers who must learn and implement cryptography. Introducing the subject of cryptography,... Read More >>
Read More >>
Introduces the problems of computer security to researchers with a machine learning background. This book introduces... Read More >>
In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating... Read More >>
Intends to assist the security professional in identifying what systems are required to meet security needs as defined... Read More >>
Including easy-to-understand definitions of viruses, spyware, and hackers, this book helps you understand what you're... Read More >>
Presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques. This book also... Read More >>
The protocols include:- Secure address resolution - Weak hop integrity - Strong hop integrity using soft sequence... Read More >>
Breaches in cybersecurity are on the rise. Between 1998 and 2003, reported cybersecurity incidents increased over... Read More >>
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic... Read More >>
Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire... Read More >>
A practical guide to simulating, detecting, and responding to network attacks. This book offers steps on how to... Read More >>
Designed to provide the facts on modern practices to efficiently and effectively run a security department, this... Read More >>
Shows you how to create exciting web pages using Cascading Style Sheets (CSS) for presentation and dynamic effect... Read More >>
The book deals with the management of information systems security and privacy, based on a model that covers technological,... Read More >>
Protect your network from both internal and external threats. Check Point NGX VPN-1/Firewall-1 is a Check Point's... Read More >>
Written by a business manager, this book sets out why ISO 27001 is the right answer to the information security... Read More >>
Covering basic concepts of Web and information system security, this book provides insights into the semantic Web... Read More >>
A guide to building robust end-to-end security into J2EE enterprise applications, Web services, identity management,... Read More >>
New medical privacy rules (HIPAA) are having a profound impact on all medical practices. Read More >>
In the next chapter an overview of Web Services and examples of the use of Web Services for net-centric operations... Read More >>