Free Delivery Over $100
4215 books were found.
Synopsis coming soon....... Read More >>
Read More >>
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public... Read More >>
Focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies... Read More >>
This book explains how to plan and build a Virtual Private Network (VPN), a collection of technologies that creates... Read More >>
This text describes Twofish, an algorithm meeting the requirements put forth by the NIST (National Institute of... Read More >>
A view of information warfare - the information-based threats of criminals and information terrorists to nations,... Read More >>
The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the... Read More >>
The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme... Read More >>
Anwendungsbezogen und entwicklungsorientiert wird in diesem Band die Java-Technologie diskutiert. Ausgehend von... Read More >>
A guide to digital certificates - a form of electronic identification. Read More >>
"The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will... Read More >>
This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS... Read More >>
The main issues of this work are the construction of US identity, as seen particularly in its foreign policy, and... Read More >>
This report identifies the security vulnerabilities that E-commerce sites face and examines technologies and procedures... Read More >>
An overview of emerging threats to commercial, civil, and military information systems-and how these threats can... Read More >>
Database Recovery presents an in-depth discussion on all aspects of database recovery. A book on recovery is incomplete... Read More >>
Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It includes thorough... Read More >>