Free Delivery Over $100
2045 books were found.
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target Read More >>
Read More >>
This volume assembles hundreds of cases and studies to provide the most accurate and comprehensive picture of the... Read More >>
Cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and... Read More >>
As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers... Read More >>
To deal with security issues effectively, knowledge of theories alone is not sufficient Read More >>
Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security... Read More >>
How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner... Read More >>
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack... Read More >>
First Published in 1994. Routledge is an imprint of Taylor & Francis, an informa company. Read More >>
Suitable for those interested in the construction and operation of an information assurance (IA) program, this book... Read More >>
Demonstrates techniques for strengthening network security. The book provides an introduction to Cisco technology... Read More >>
This book helps auditors understand the reality of performing the internal audit role and the importance of properly... Read More >>
A collection of intelligence and security articles that covers common security terms and vulnerabilities, such as... Read More >>
Addressing the diminished understanding of the value of security on the executive side and a lack of good business... Read More >>
Risk-based operational audits and performance audits require a broad array of competencies Read More >>
Offers a formal framework for finding and eliminating network security threats. This title focuses on the steps... Read More >>
Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable... Read More >>
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction... Read More >>
Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information... Read More >>
Exploring privacy issues and the general concept of personal identity, this book delves into real-world biometrics... Read More >>
Presenting contributions from 50 wireless communications experts from different corners of the world, this title... Read More >>
Develops a comprehensive, global model for contextually based processing systems. This title presents a fresh perspective... Read More >>