Free Delivery Over $100
4195 books were found.
""Machine Learning and Data Mining for Computer Security"" provides an overview of the current state of research... Read More >>
Read More >>
A guide to protecting enterprise data. It presents a systematic approach to planning and implementing cost-effective... Read More >>
Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography;... Read More >>
There is increasing agreement that we need to design secure computer systems that people can actually use, but less... Read More >>
Packed with definitions, tips, tools, and real-life examples, this book is the equivalent of a household alarm system... Read More >>
Offers a look at why a network must be set up with certain authentication computer science protocols that guarantee... Read More >>
Provides knowledge you need to protect small businesses from viruses, worms, Trojan horses, spam, spyware, adware,... Read More >>
Because of the business value attributed to information technology, the high costs of this technology and the problems... Read More >>
Podcasting is a web-based broadcast medium that sends audio content directly to an iPod or other digital audio player.... Read More >>
Part of the Exam Certification Guide Series , this work serves as a preparation guide for the Cisco IPS exam 642-532.... Read More >>
Helps you learn what you need to know to master the CISSP security technology and the certification exam. This book... Read More >>
Written by a team of computer forensics experts, this book presents six realistic investigations and provides a... Read More >>
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained... Read More >>
The importance of auditing at both the server and network level and how to create trust relationships and domains... Read More >>
Shows readers how to strengthen the weak spots they find in their network's armor. This book enables readers discover... Read More >>
Constitutes the proceedings of the First International Conference on Cryptology hosted in Malaysia, held in Kuala... Read More >>
This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which... Read More >>
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking,... Read More >>
Sheds light on practice design, deployment, and maintenance of an ISA Server 2004 Environment. This book provides... Read More >>
Die Autoren stellen dabei die Prinzipien der System-Modellierung und der Entwicklung von Software in den Mittelpunkt... Read More >>
Some corporations are beginning to rethink how they provide security, so that interactions with customers, employees,... Read More >>
Constitutes the refereed proceedings of the 9th IFIP TC-6 TC-11 International Conference on Communications and Multimedia... Read More >>