Free Delivery Over $100
4195 books were found.
This volume on computer network security and cyber ethics examines topics including: the infrastructure and communication... Read More >>
Read More >>
Offers examples and templates for crafting or revamping your security program in the form of an Enterprise-Wide... Read More >>
This volume covers topics such as: biometrics; cryptography and electronic signatures on smart card security; formal... Read More >>
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how... Read More >>
These are the proceedings of CHES 2001, the third Workshop on Cryptographic Hardware and Embedded Systems. The ?rst... Read More >>
This title constitutes the thoroughly refereed post-proceedings of the International Conference on Cryptography... Read More >>
A self-study resource for Microsoft exam 70-227. Read More >>
This is an authoritative security handbook from the CERT Coordination Center, the oldest computer security response... Read More >>
Using a problem-oriented approach, this book walks you through almost everything from protecting against network... Read More >>
The new second edition focuses on the platform features of Java that provide security--the class loader, bytecode... Read More >>
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical... Read More >>
Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure... Read More >>
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security... Read More >>
Invasion of privacy and misuse of personal data are some of the negative effects of information and communication... Read More >>
The Sams Teach Yourself in 24 Hours series is designed in 24 one-hour lessons with structured steps to guide the... Read More >>
Each committee member was responsible for the review of at least 20 submissions, so each paper was carefully evaluated... Read More >>
Written in conjunction with RSA Security - the most trusted name in e-security - this book gives a presentation... Read More >>
This is a guide to implementing and understanding PKI technology. It features case studies of PKI implementation... Read More >>
This work begins with an in-depth technical tutorial on PKI (Public Key Infrastructure), including a decision tree... Read More >>