Free Delivery Over $100
4597 books were found.
Read More >>
Among the topics addressed are access control, authorization frameworks, privacy policies, security protocols, trusted... Read More >>
Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but... Read More >>
With the above in mind, we organized the SDM 2004 workshop to initiate and promote secure data management as one... Read More >>
An introduction to ""Open Source Security Tools"", this work reviews the assortment of free and low-cost solutions.... Read More >>
Presents an overview of information systems security, offering the basic underpinnings of information security and... Read More >>
Offers information on unlocking hidden settings, customizing boot screens, supercharging online and program launch... Read More >>
Crypto 2004, the 24th Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research... Read More >>
This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded... Read More >>
Provides a 'command-line centric' view of Microsoft and non-Microsoft tools that can be very helpful to folks responsible... Read More >>
Security is probably the most critical factor for the development of the Information Society. E-government, e-commerce,... Read More >>
Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences... Read More >>
Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical... Read More >>
The Dictionary of Information Security provides complete and easy to read explanations of common security and infrastructure... Read More >>
This revised and extended edition includes new material on the AES encryption algorithm, the SHA-1 Hash algorithm,... Read More >>
Cryptography is a key technology in electronic key systems. Based on courses taught by the author, this book explains... Read More >>
All you need to understand, deploy and use the Snort IDS on your systems. Read More >>
The growing connectivity among secure and insecure networks has created opportunities for unauthorized intrusions... Read More >>
A guide to penetrating and defending wireless networks, and to hacking wireless networks. It helps you master the... Read More >>
The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July,... Read More >>
This book constitutes the refereed proceedings of the 11th International Workshop on Fast Software Encryption, FSE... Read More >>
This book constitutes the refereed proceedings of the First European Public Key Infrastructure Workshop: Research... Read More >>
Privacy in statistical databases is about ?nding tradeo?s to the tension between the increasing societal and economical... Read More >>
The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized... Read More >>