Free Delivery Over $100
4195 books were found.
Read More >>
'Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code' discusses sociological forces that make... Read More >>
This guide provides applied security techniques for J2EE programmers and developers. It explains security concepts... Read More >>
Provides in-depth coverage of the installation, administration, and programming of secure Microsoft SQL Server environments... Read More >>
Das Lehrbuch uber Codierungstheorie fur Mathematik- und Informatik-Studenten setzt ausser elementarem Grundwissen... Read More >>
Shows you practical workarounds and fixes for the vulnerabilities in WLANs. This easy-to-use WLAN security book... Read More >>
Microsoft's .NET Framework provides developers with a powerful set of tools to make their applications secure. This... Read More >>
This book constitutes the refereed proceedings of the 6th International Symposium on Recent Advances in Intrusion... Read More >>
This book constitutes the refereed proceedings of the 5th International Workshop on Cryptographic Hardware and Embedded... Read More >>
This code companion covers a wide range of topics, including safe initialization, access control, input validation,... Read More >>
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of... Read More >>
This is an overview of key establishment protocols. Read More >>
- Proven--based on field experience - Authoritative--offers the best advice available - Accurate--technically validated... Read More >>
Suitable for cryptographers, this book is self-contained; it presents background material to understand an algorithm... Read More >>
This is a comprehensive tutorial and reference that contains numerous practical examples using C# and VB.NET. Read More >>
Crypto 2003, the 23rd Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research... Read More >>
Research Directions in Data and Applications Security describes original research results and innovative practical... Read More >>
Because of their small, portable nature, PDAs present a unique security dilemma. This title is suitable for PSA... Read More >>