Network security books

10349 books were found.

Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings

Detection of Intrusions and Malware, and Vulnerability...

Author: Sven Dietrich
ISBN: 9783319085081
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and...  Read More >>

Trust, Privacy, and Security in Digital Business: 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings

Trust, Privacy, and Security in Digital Business: 11th...

Author: Claudia Eckert ,  Sokratis K. Katsikas
ISBN: 9783319097695
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital...  Read More >>

Audacity to Spy: How Government, Business & Hackers Rob Us of Privacy

Audacity to Spy: How Government, Business & Hackers...

Author: Catherine Nolan ,  Ashley M Wilson, JD
ISBN: 9781935504795
Format: Paperback
$52.67

The Audacity to Spy, written by an attorney with an interest in privacy laws and legislation and her grandmother...  Read More >>

Stochastic Equations: Theory and Applications in Acoustics, Hydrodynamics, Magnetohydrodynamics, and Radiophysics, Volume 2: Coherent Phenomena in Stochastic Dynamic Systems

Stochastic Equations: Theory and Applications in Acoustics,...

Author: Valery I. Klyatskin
ISBN: 9783319075891
Format: Hardback
$448.77

In some cases, certain coherent structures can exist in stochastic dynamic systems almost in every particular realization...  Read More >>

Trust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014, Proceedings

Trust Management VIII: 8th IFIP WG 11.11 International...

Author: Jianying Zhou ,  Nurit Gal-Oz
ISBN: 9783662438121
Format: Hardback
$145.17

This book constitutes the refereed proceedings of the 8th IFIP WG 11.11 International Conference on Trust Management,...  Read More >>

Digital-Forensics and Watermarking: 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers

Digital-Forensics and Watermarking: 12th International...

Author: Yun Qing Shi ,  Hyoung-Joong Kim
ISBN: 9783662438855
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics...  Read More >>

Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers

Fast Software Encryption: 20th International Workshop,...

Author: Shiho Moriai
ISBN: 9783662439326
Format: Paperback
$145.17

 Read More >>

Cyberspace and Cybersecurity: Chinese translation

Cyberspace and Cybersecurity: Chinese translation

Author: Dr George K Kostopoulos ,  Riley Repko
ISBN: 9781477669617
Format: Paperback
$145.20

 Read More >>

Slandered and Helpless: In Defense of Your Reputation Online & Offline

Slandered and Helpless: In Defense of Your Reputation...

Author: Treat Preston
ISBN: 9781500985950
Format: Paperback
$26.06

Reputation Management: Slandered and Helpless - In Defense of Your Reputation Online & Offline is an eye-opening...  Read More >>

Architecting User-Centric Privacy-as-a-Set-of-Services: Digital Identity-Related Privacy Framework

Architecting User-Centric Privacy-as-a-Set-of-Services:...

Author: Ghazi Ben Ayed
ISBN: 9783319082301
Format: Hardback
$290.37

The framework is intended to distill privacy-related digital identity requirements (business interoperability) into...  Read More >>

Pervasive Wireless Environments: Detecting and Localizing User Spoofing

Pervasive Wireless Environments: Detecting and Localizing...

Author: Jie Yang ,  Yingying Chen
ISBN: 9783319073552
Format: Paperback
$145.17

This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated...  Read More >>

Trustworthy Computing and Services: International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers

Trustworthy Computing and Services: International Conference,...

Author: Yuyu Yuan ,  Xu Wu
ISBN: 9783662439074
Format: Paperback
$145.17

 Read More >>

Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings

Information Security and Privacy: 19th Australasian...

Author: Willy Susilo ,  Yi Mu
ISBN: 9783319083438
Format: Paperback
$145.17

 Read More >>

Smart Card Research and Advanced Applications: 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers

Smart Card Research and Advanced Applications: 12th...

Author: Aurélien Francillon ,  Pankaj Rohatgi
ISBN: 9783319083018
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on...  Read More >>

Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 -- July 3, 2014. Proceedings

Monitoring and Securing Virtualized Networks and Services:...

Author: Anna Sperotto ,  Guillaume Doyen
ISBN: 9783662438619
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 8th IFIP WG 6.6 International Conference on Monitoring and...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List