Free Delivery Over $100
4215 books were found.
Read More >>
Invasion of privacy and misuse of personal data are some of the negative effects of information and communication... Read More >>
The Sams Teach Yourself in 24 Hours series is designed in 24 one-hour lessons with structured steps to guide the... Read More >>
Each committee member was responsible for the review of at least 20 submissions, so each paper was carefully evaluated... Read More >>
Written in conjunction with RSA Security - the most trusted name in e-security - this book gives a presentation... Read More >>
This is a guide to implementing and understanding PKI technology. It features case studies of PKI implementation... Read More >>
This work begins with an in-depth technical tutorial on PKI (Public Key Infrastructure), including a decision tree... Read More >>
Other sessions deal with government projects, law and policy issues, freedom and privacy news, analysts’ opinions,... Read More >>
Introduces the concepts of information warfare from a non-military, organizational perspective. This book covers... Read More >>
Aimed primarily at final year undergraduate courses and MSc courses on Information Systems, Management of Information... Read More >>
The Call for Papers brought 56 papers from 15 countries and 20 papers will be presented in ve sessions. Moreover,... Read More >>
Services that provide anonymous and unobservable access to the Internet are important for electronic commerce applications... Read More >>
This book opens with an introduction into the format of some of the more common detection sensors and then begins... Read More >>
A guide to cryptography and how it works. Read More >>
With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy... Read More >>
In recent years, Windows NT and 2000 systems have emerged as viable platforms for Internet servers, but securing... Read More >>
This text is designed to help companies implement e-commerce while minimizing their risk. It presents an overview... Read More >>
Cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and... Read More >>