Free Delivery Over $100
10346 books were found.
IT Security Management 100 Success Secrets - 100 Most Asked Questions: The Missing IT Security Management Control,... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on... Read More >>
<p>With artificial neural network research being one of the new directions for new generation computers, current... Read More >>
This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and... Read More >>
Read More >>
IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals,... Read More >>
The papers are organized in topical sections on applied cryptography and security protocols, access control and... Read More >>
The Certified Ethical Hacker (CEH) is a professional certification provided by the International Council of E-Commerce... Read More >>
CCNA Top Success Secrets and Best Practices: CCNA Experts Share The World's Cisco Certified Network Associate Expert... Read More >>
Applying software engineering to Cloud computing is a primary aspect to obtain a systematic approach to the development,... Read More >>
This book constitutes the refereed proceedings of the 31st International Conference on Computer Safety, Reliability,... Read More >>
Constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2012, the 31st International Conference... Read More >>
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases,... Read More >>
This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security... Read More >>
The 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12) will be held... Read More >>
<p>Information technology in the workplace is vital to the management of workflow in the company; therefore, IT... Read More >>
<p>While information technology continues to play a vital role in every aspect of our lives, there is a greater... Read More >>
Covering internet security, malware, phishing, and how to combat these serious and growing issues on both desktop... Read More >>