Free Delivery Over $100
2045 books were found.
Audit professionals are valued members of society and are expected to be both skilled and ethical in their decision-making.... Read More >>
Security practitioners must be able to build cost-effective security programs while also complying with government... Read More >>
Read More >>
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure... Read More >>
"""This book contains multidisciplinary knowledge and analysis by leading researchers and practitioners with technical... Read More >>
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally... Read More >>
Software Engineering: The Current Practice teaches students basic software engineering skills and helps practitioners... Read More >>
Experts examine censorship, surveillance, and resistance across Asia, from China and India to Malaysia and the Philippines.... Read More >>
"""This book discusses the impact of cyber ethics and cyber law on information technologies and society, featuring... Read More >>
The Internet has been transformed in the past years from a system primarily oriented on information provision into... Read More >>
User-adaptive (or ""personalized"") systems take individual character istics of their current users into account... Read More >>
This newly revised pocket dictionary from itSMF UK contains all the definitions from the ITIL(r) Glossary and Abbreviations... Read More >>
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference, EGOV 2011, held in Delft, The... Read More >>
At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily... Read More >>
This book constitutes the thoroughly refereed post-proceedings of the 16th International Workshop on Security Protocols,... Read More >>
It goes on to address such issues as naming, the Akoma-Ntoso document model, the contribution of standard-based... Read More >>
A new edition, packed with even more clever tricks and methods that make everyday life easier Lifehackers redefine... Read More >>
Immer mehr Internetnutzer gehen von der klassischen, durch eine passive und reaktive Konsumtion geprägten Mediennutzung... Read More >>
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics,... Read More >>
Alles in einem: iPod touch, MacBook und eReader? Das iPad packt die beliebtesten Funktionen in ein tragbares Gerat... Read More >>
As the global leader in information security education and certification, (ISC)2(R) has a proven track record of... Read More >>