Free Delivery Over $100
10346 books were found.
Successful business continuity requires the creation of and adherence to a plan that ensures an organisation's critical... Read More >>
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field,... Read More >>
Data warehousing and data mining provide techniques for collecting information from distributed databases and for... Read More >>
Read More >>
Discusses wireless security issues from physical layer to application layer. This book identifies important vulnerabilities... Read More >>
It has been established that TNF receptor associated factors (TRAFs) are critical signaling mediators for not only... Read More >>
Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting... Read More >>
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference... Read More >>
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using... Read More >>