Network security books

10346 books were found.

CISSP All-in-One Exam Guide

CISSP All-in-One Exam Guide

Author: Shon Harris
ISBN: 9780071781749
Format: Mixed media product
$211.20

This is a comprehensive, up-to-date revision of the market-leading CISSP training resource from the #1 name in IT...  Read More >>

Programming Languages and Systems: 10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012, Proceedings

Programming Languages and Systems: 10th Asian Symposium,...

Author: Ranjit Jhala ,  Atsushi Igarashi
ISBN: 9783642351815
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the 10th Asian Symposium on Programming Languages and Systems,...  Read More >>

Kryptographie in C und C++: Zahlentheoretische Grundlagen, Computer-Arithmetik mit großen Zahlen, kryptographische Tools

Kryptographie in C und C++: Zahlentheoretische Grundlagen,...

Author: Michael Welschenbach
ISBN: 9783642626463
Format: Paperback
$131.97

Das Buch bietet einen umfassenden Überblick über die Grundlagen moderner kryptographischer Verfahren und ihre programmtechnische...  Read More >>

Datenschutz bei Wearable Computing: Eine juristische Analyse am Beispiel von Schutzanzügen

Datenschutz bei Wearable Computing: Eine juristische...

Author: Alexander Roßnagel ,  Silke Jandt
ISBN: 9783834825544
Format: Paperback
$184.77

Ein wichtiges Anwendungsfeld des Ubiquitous Computing ist das Wearable Computing: Miniaturisierte elektronische...  Read More >>

Information Security and Cryptology: 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers

Information Security and Cryptology: 7th International...

Author: Chuan-Kun Wu ,  Moti Yung
ISBN: 9783642347030
Format: Paperback
$145.17

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on...  Read More >>

Insider Threats in Cyber Security

Insider Threats in Cyber Security

Author: Christian W. Probst ,  Jeffrey Hunker
ISBN: 9781461426387
Format: Paperback
$287.76

 Read More >>

Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

Privacy and Anonymity in Information Management Systems:...

Author: Jordi Nin ,  Javier Herranz
ISBN: 9781447125792
Format: Paperback
$448.77

Should this be true, we would have created our own nightmare: a global village combining the worst of conventional...  Read More >>

Security of Data and Transaction Processing: A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000)

Security of Data and Transaction Processing: A Special...

Author: Vijay Atluri ,  Pierangela Samarati
ISBN: 9781461370093
Format: Paperback
$290.37

Security of Data and Transaction Processing brings together in one place important contributions and up-to-date...  Read More >>

Implementing Service Quality Based on ISO/IEC 20000, 2nd Edition

Implementing Service Quality Based on ISO/IEC 20000,...

Author: Michael Kunas
ISBN: 9781849284028
Format: Paperback
$65.87

ISO/IEC 20000 is an important international standard for IT service providers. Implementation and certification...  Read More >>

Network and System Security: 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings

Network and System Security: 6th International Conference,...

Author: Li Xu ,  Elisa Bertino
ISBN: 9783642346002
Format: Paperback
$145.17

 Read More >>

Myjot

Myjot

Author: Lisa Hunter ,  Chris Hunter
ISBN: 9780615718057
Format: Paperback
$13.17

Can't remember your passwords? Tired of resetting your passwords? myJot is a convenient tool for jotting down important...  Read More >>

Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012, Proceedings

Decision and Game Theory for Security: Third International...

Author: Jens Grossklags ,  Jean Walrand
ISBN: 9783642342653
Format: Paperback
$145.17

This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory...  Read More >>

Data Mining for Skype Forensics

Data Mining for Skype Forensics

Author: Ahmad Azab
ISBN: 9781480189089
Format: Paperback
$261.36

This book introduces readers to the key concepts of data mining that can be used to identify Skype traffic using...  Read More >>

Guide to Network Security, International Edition

Guide to Network Security, International Edition

Author: Michael Whitman (Institute for Cybersecurity Workforce Development, Kennesaw State University) ,  Herbert Mattord (Michael J. Coles College of Business, Kennesaw State University)
ISBN: 9781133279075
Format: Paperback
$162.99

Suitable for readers who want to help organizations protect critical information assets and secure their systems...  Read More >>

Moving Target Defense II: Application of Game Theory and Adversarial Modeling

Moving Target Defense II: Application of Game Theory...

Author: Sushil Jajodia ,  Anup K. Ghosh
ISBN: 9781461454151
Format: Hardback
$290.37

Designed as a professional book for practitioners and researchers working in the cyber security field, advanced...  Read More >>

Course360 Information Security Ethical Hacking on Clms Printed Access Card

Course360 Information Security Ethical Hacking on Clms...

Author: Cengage Learning
ISBN: 9781133134923
Format: Digital
$264.00

Course360 was created to provide students with an interactive classroom experience in an online format.  Read More >>

Information Security: The Complete Reference, Second Edition

Information Security: The Complete Reference, Second...

Author: Mark Rhodes-Ousley
ISBN: 9780071784351
Format: Paperback
$184.80

This thorough update to the most authoritative volume available on network security covers the latest security standards...  Read More >>

Course360 Computer Forensics Printed Access Card

Course360 Computer Forensics Printed Access Card

Author: Cengage Learning ,  Cengage Learning
ISBN: 9781133134831
Format: Online resource
$242.88

 Read More >>

Automatic Malware Analysis: An Emulator Based Approach

Automatic Malware Analysis: An Emulator Based Approach...

Author: Heng Yin ,  Dawn Song
ISBN: 9781461455226
Format: Paperback
$145.17

 Read More >>

It Security Management 100 Success Secrets - 100 Most Asked Questions: The Missing It Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide - Second Edition

It Security Management 100 Success Secrets - 100 Most...

Author: Lance Batten
ISBN: 9781283816526
Format: Electronic book text
$50.56

IT Security Management 100 Success Secrets - 100 Most Asked Questions: The Missing IT Security Management Control,...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List