Free Delivery Over $100
10346 books were found.
Read More >>
A personal internet address and password log book featuring cover illustration by Cheryl Casey. Keep track of all... Read More >>
Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly... Read More >>
Practical Online and Mobile Security is a comprehensive guide to navigating and mitigating the common and not-so-common... Read More >>
This report represents the results of our audit of network and systems security at the Office of the Comptroller... Read More >>
The book contains the extended version of the works that have been presented and discussed in the Second International... Read More >>
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading... Read More >>
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015,... Read More >>
Lernen Sie, wie Homo oeconomicus beim Thema Cyber Security zum Homo carens securitate wird und wie es gelingt, mithilfe... Read More >>
This book constitutes the refereed proceedingsof the 14th International Conference on Cryptology and Network Security,... Read More >>
Security Operations Center Building, Operating, and Maintaining Your SOC The complete, practical guide to... Read More >>
Specifically, the secure health data aggregation explores social spots to help forward health data and enable users... Read More >>
Organize your online activity with this unique journal. Internet Address & Password Log Journal Tired of small pieces... Read More >>
This blank address book is the perfect gift for the grumpy old man in your life. In addition to the normal address... Read More >>
This book constitutes the thoroughly refereed conferenceproceedings of the Third International Workshop on Risk... Read More >>
Clouds face many threats like compromises of the hypervisor, insecure cloud storage, insecure images of VMs that... Read More >>
This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum,... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for... Read More >>
Learn how to hack! Get the scoop on the secret techniques that the professional hackers are using today! Protect... Read More >>
While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond... Read More >>