Free Delivery Over $100
10346 books were found.
The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions... Read More >>
A team of journalists with unparalleled inside access provides the first full, in-depth account of WikiLeaks, its... Read More >>
This book is written in a cookbook style. Each chapter consists of recipes, each of which is composed of step-by-step... Read More >>
Schwerpunkte der Studie liegen auf der systematischen Darstellung gegenwärtiger Angriffe und der künftigen Entwicklung... Read More >>
Constitutes the proceedings of the 6th International Conference on Information Security Practice and Experience,... Read More >>
Constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography,... Read More >>
Constitutes the refereed proceedings of the 8th International Conference on Wired/Wireless Internet Communications,... Read More >>
This book constitutes the proceedings of the 12th International Conference on Information Security and Cryptology,... Read More >>
Constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in... Read More >>
Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security... Read More >>
Constitutes the refereed post-conference proceedings of the 6th European Workshop on Public Key Services, Applications... Read More >>
This book constitutes the refereed proceedings of the 5th International Workshop on Security, IWSEC 2010, held in... Read More >>
Constitutes the refereed proceedings of the 6th International Conference on Information Systems Security, ICISS... Read More >>
Constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China, in December... Read More >>
Constitutes the refereed proceedings of the 12th International Conference on Distributed Computing and Networking,... Read More >>
This book constitutes the refereed proceedings of the 16th EUNICE/IFIP TC 6.6 Workshop on Networked Services and... Read More >>
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure... Read More >>
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory... Read More >>
The book provides a simple and clean explanation of how to effectively utilize the tools and introduces a four-step... Read More >>
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional... Read More >>
Read More >>
Dissertation Universität Regensburg, 2010 Read More >>
The fourth edition of Principles of Information Security explores the field of information security and assurance... Read More >>
<p>This is the first technical book exclusively focused on spyware/adware. It also includes defensive techniques.... Read More >>