Network security books

10336 books were found.

Password Log: (Discreet Password Journal), Blue Floral, 5 by 8, Password Organizer with 300 Password Reccord: Password Book and Organizer Journal

Password Log: (Discreet Password Journal), Blue Floral,...

Author: Orendabook
ISBN: 9781539975991
Format: Paperback
$15.71

Internet Password Address Book Discreet Notebook Easily to Find What you are looking Directory Alphabetical 5 inches...  Read More >>

Address Book  not to Miss any Address

Address Book not to Miss any Address

Author: William Norton
ISBN: 9781540459602
Format: Paperback
$35.32

 Read More >>

Cyber Warfare: Building the Scientific Foundation

Cyber Warfare: Building the Scientific Foundation

Author: Sushil Jajodia ,  Paulo Shakarian
ISBN: 9783319360072
Format: Paperback
$369.57

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including...  Read More >>

Violence in Nigeria: Patterns and Trends

Violence in Nigeria: Patterns and Trends

Author: Patricia Taft ,  Nate Haken
ISBN: 9783319360195
Format: Paperback
$145.17

The analysis of violence at state and local levels reveals a fractal pattern of overlapping ecosystems of conflict...  Read More >>

Understanding Network Hacks: Attack and Defense with Python

Understanding Network Hacks: Attack and Defense with...

Author: Bastian Ballmann
ISBN: 9783662508626
Format: Paperback
$131.97

Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning,...  Read More >>

Pattern and Security Requirements: Engineering-Based Establishment of Security Standards

Pattern and Security Requirements: Engineering-Based...

Author: Kristian Beckers
ISBN: 9783319365879
Format: Paperback
$290.37

Security threats are a significant problem for information technology companies today. This book focuses on how...  Read More >>

Counterterrorism and Cybersecurity: Total Information Awareness

Counterterrorism and Cybersecurity: Total Information...

Author: Newton Lee
ISBN: 9783319374604
Format: Paperback
$145.17

From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines...  Read More >>

Security Issues in Mobile NFC Devices

Security Issues in Mobile NFC Devices

Author: Michael Roland
ISBN: 9783319368016
Format: Paperback
$316.77

This work provides an assessment of the current state of near field communication (NFC) security, it reports on...  Read More >>

Don't Step in the Trap: How to Recognize and Avoid Email Phishing Scams

Don't Step in the Trap: How to Recognize and Avoid Email...

Author: Brett W Smith ,  Antonia R Hughes
ISBN: 9781534765023
Format: Paperback
$14.49

More and more consumers and businesses are being victimized by increasingly sophisticated email scams, including...  Read More >>

Innovative Security Solutions for Information Technology and Communications: 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers

Innovative Security Solutions for Information Technology...

Author: Ion Bica ,  Reza Reyhanitabar
ISBN: 9783319472379
Format: Paperback
$116.41

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on...  Read More >>

Critical Infrastructure Protection VII: 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers

Critical Infrastructure Protection VII: 7th IFIP WG...

Author: Jonathan Butts ,  Sujeet Shenoi
ISBN: 9783662525432
Format: Paperback
$145.17

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital...  Read More >>

Trusted Cloud Computing

Trusted Cloud Computing

Author: Helmut Krcmar ,  Ralf Reussner
ISBN: 9783319385228
Format: Paperback
$145.17

This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental...  Read More >>

Critical Infrastructure Protection VIII: 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers

Critical Infrastructure Protection VIII: 8th IFIP WG...

Author: Jonathan Butts ,  Sujeet Shenoi
ISBN: 9783662526163
Format: Paperback
$145.17

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital...  Read More >>

The Hash Function BLAKE

The Hash Function BLAKE

Author: Jean-Philippe Aumasson ,  Willi Meier
ISBN: 9783662525975
Format: Paperback
$287.76

It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using...  Read More >>

Hands-On Ethical Hacking and Network Defense

Hands-On Ethical Hacking and Network Defense

Author: Nicholas Antill ,  Michael Simpson
ISBN: 9781285454610
Format: Mixed media product
$715.31

A work from Cengage Learning on hands-on ethical hacking and network defense.  Read More >>

How Privacy Keeps You From Tindering: To swipe or not to swipe!: Privacy and The Law

How Privacy Keeps You From Tindering: To swipe or not...

Author: Sandra Odisho
ISBN: 9781539753223
Format: Paperback
$52.80

What do we mean when we say Privacy? Are any of us actually protected? Does Tinder follow their privacy policy in...  Read More >>

Autonomous Agents and Multiagent Systems: AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016, Revised Selected Papers

Autonomous Agents and Multiagent Systems: AAMAS 2016...

Author: Nardine Osman ,  Carles Sierra
ISBN: 9783319468396
Format: Paperback
$116.41

This book constitutes the most visionary papers of the AAMAS 2016 Workshops, held in Singapore, Singapore, in May...  Read More >>

Game Theoretic Analysis of Congestion, Safety and Security: Networks, Air Traffic and Emergency Departments

Game Theoretic Analysis of Congestion, Safety and Security:...

Author: Kjell Hausken ,  Jun Zhuang
ISBN: 9783319366326
Format: Paperback
$290.37

Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments,...  Read More >>

Cyber Defense and Situational Awareness

Cyber Defense and Situational Awareness

Author: Alexander Kott ,  Cliff Wang
ISBN: 9783319380261
Format: Paperback
$263.97

It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of...  Read More >>

Trusted Computing Platforms: TPM2.0 in Context

Trusted Computing Platforms: TPM2.0 in Context

Author: Graeme Proudler ,  Liqun Chen
ISBN: 9783319356907
Format: Paperback
$475.17

In this book the authors first describe the background of trusted platforms and trusted computing and speculate...  Read More >>

Attribute-based Credentials for Trust: Identity in the Information Society

Attribute-based Credentials for Trust: Identity in the...

Author: Kai Rannenberg ,  Jan Camenisch
ISBN: 9783319381947
Format: Paperback
$290.37

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard,...  Read More >>

Hack-Proof Your Life Now!: The New Cybersecurity Rules: Protect your email, computer, and bank accounts from hackers, malware, and identity theft

Hack-Proof Your Life Now!: The New Cybersecurity Rules:...

Author: Sean M Bailey ,  Kropp Devin
ISBN: 9780997729009
Format: Paperback
$52.67

Smart online security is critical. But guidance for staying safe has been fragmented and confusing-until now. Hack-Proof...  Read More >>

Online Banking Security Measures and Data Protection

Online Banking Security Measures and Data Protection...

Author: Shadi A. Aljawarneh
ISBN: 9781522508649
Format: Hardback
$503.95

Presents the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary...  Read More >>

Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice

Cyber-Development, Cyber-Democracy and Cyber-Defense:...

Author: Elias G. Carayannis ,  David F. J. Campbell
ISBN: 9781493952915
Format: Paperback
$290.37

By promoting dissemination and sharing of knowledge, cyber-democracy allows a knowledge conversion of the local...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List