Free Delivery Over $100
4195 books were found.
Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate... Read More >>
The origins of the Asiacrypt series of conferences can be traced back to 1990, when the ?rst Auscrypt conference... Read More >>
Read More >>
This manual advises security analysts on minimizing information loss and system disruption using effective system... Read More >>
Consists of 20-25 hacking scenarios followed by the solution for each. This book features challenges/chapters that... Read More >>
Once security policies are written, they must be treated as living documents. As technology and business requirements... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop,... Read More >>
Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications.... Read More >>
Provides firewall information on the personal firewall software applications available for the non expert firewall... Read More >>
Hundreds of thousands of business enterprises, large and small, depend on Sun Solaris to keep their business alive... Read More >>
Takes readers through developing, distributing, and monitoring an information security awareness program. This book... Read More >>
Includes the developments in: security protocols; secure software engineering; mobile agent security; e-commerce... Read More >>
ICICS 2001, the Third International Conference on Information and Commu- cations Security, was held in Xi’an, China,... Read More >>
This book is on HP-UX host security. This book is designed to give the system administrator the skills required... Read More >>
This is a guide to authentication - making sure your users are who they say they are. Leading security consultant... Read More >>
The program committee considered 68 submissions of which 21 papers were accepted. Many thanks to George Davida,... Read More >>
"Reviewing the threats to Windows PC such as what hackers know about your computer and the Internet, and how they... Read More >>
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in... Read More >>
The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented... Read More >>