Free Delivery Over $100
10346 books were found.
Read More >>
Written by information assurance and cyber security expert Peter Gregory, this new edition offers up-to-date, authoritative... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC... Read More >>
The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little... Read More >>
Examines the protocols and applications that are the foundation of industrial control systems and provides you with... Read More >>
This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability,... Read More >>
This all-new, exam-focused study guide from bestselling certification author and IT consultant Glen Clarke includes... Read More >>
Security experts and trainers cover all exam objectives for this new IT security certification in detail and provide... Read More >>
Proven methods for securing corporate networks against social media attacks<p> Securing the Clicks: Network Security... Read More >>
Introduces the reader to some of the basic concepts, results and applications of biorthogonal systems in infinite... Read More >>
This book teaches computer forensics to any level computer user. The text is very easy to navigate, with clear screen... Read More >>
Constitutes the refereed post-conference proceedings of four workshops collocated with NETWORKING 2011, held in... Read More >>
Great commercial penetration testing tools can be expensive and sometimes hard to use or of questionable accuracy.... Read More >>
Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This... Read More >>
Die hohe Dynamik der Informations- und Kommunikationstechnologien (IKT) führt unverändert zu gravierenden Veränderungen... Read More >>
Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Autonomic and Trusted Computing,... Read More >>
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially... Read More >>