Free Delivery Over $100
10346 books were found.
Beginning with the foundational and technical components of information security, this title focuses on access control... Read More >>
Read More >>
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of... Read More >>
This book presents the fundamental concepts of information and communication technology (ICT) governance and control.... Read More >>
This book constitutes the thoroughly refereedpost-conference proceedings of the 10th International Conference on... Read More >>
This report sets out the results of a study of consumer attitudes toward data breaches, notifications of those breaches,... Read More >>
The need for everyone to be interested in securing themselves while surfing online, buying, selling and performing... Read More >>
The Internet can be both educational and fun, however it comes with risks. Those risks must be addressed to keep... Read More >>
In this book, tech expert Amber Mac and Internet security expert Michael Bazzell provide the ultimate handbook for... Read More >>
This bookconstitutes the proceedings of the 17th International Conference on Passive andActive Measurement, PAM... Read More >>
This book constitutes the thoroughly refereedpost-workshop proceedings of the 16th International Workshop on InformationSecurity... Read More >>
Internet Password Organizer This Internet Password Organizer is great for keeping track of all your usernames and... Read More >>
This book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST... Read More >>
American companies are renowned as being the most innovative in the world. Companies of every size and in every... Read More >>
"Password Log This password log is great for keeping track of all your usernames and passwords when logging into... Read More >>
This bookcontains revised selected papers from the 22nd International Conference onSelected Areas in Cryptography,... Read More >>
DominikHerrmann zeigt, dass die Betreiber von Nameservern, die im Internet zurAuflösung von Domainnamen in IP-Adressen... Read More >>
Dieses Buch erklärt kriminologische Grundlagen von Wirtschaftsspionage, erläutert das Phänomen und vermittelt im... Read More >>