Free Delivery Over $100
2045 books were found.
Presents information in forensic computing and IT security. This volume offers practical insight to security and... Read More >>
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to... Read More >>
“Intellectual property, software plagiarism, patents, and copyrights are complicated subjects. This book explains... Read More >>
Read More >>
Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived... Read More >>
"Written on the occasion of copyright's 300th anniversary, John Tehranian's Infringement Nation presents an engaging... Read More >>
In light of the legislation such as the Federal Information Security Management Act (FISMA), there is an increased... Read More >>
Cybercrime is a newly emerging discipline that analyzes the changing nature and scope of victimization through the... Read More >>
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic... Read More >>
The bestseller returns-completely updated to include the newest hardware, software, and techniques for building... Read More >>
Schwerpunkte der Studie liegen auf der systematischen Darstellung gegenwärtiger Angriffe und der künftigen Entwicklung... Read More >>
Im Grenzbereich von Technik-, Rechts-, Sozial- und Wirtschaftswissenschaften erweist sich das Technikrecht als Querschnittsmaterie... Read More >>
A text that deals with the important legal areas for e-commerce related business in most of the member states in... Read More >>
Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing... Read More >>
Governments, the media, the information technology industry and scientists publicly argue that information and communication... Read More >>
Develops a comprehensive, global model for contextually based processing systems. This title presents a fresh perspective... Read More >>
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust... Read More >>
Covers privacy and anonymity for data mining applications. This book presents novel application domains, such as... Read More >>
The judiciary is in the early stages of a transformation in which AI (Artificial Intelligence) technology will... Read More >>
Distributed networks such as the Internet have altered the fundamental way a record is created, captured, accessed... Read More >>
The papers illustrate the diverse impacts of the information society and the changing paradigms within education,... Read More >>
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference... Read More >>
This book warns of the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in... Read More >>