Network security books

10346 books were found.

Economics of Information Security and Privacy

Economics of Information Security and Privacy

Author: Tyler Moore ,  David Pym
ISBN: 9781441969668
Format: Hardback
$498.96

Covers chapters presented at WEIS 2009. This book features topics that include identity theft, modeling uncertainty's...  Read More >>

Insider Threats in Cyber Security

Insider Threats in Cyber Security

Author: Christian W Probst ,  Jeffrey Hunker
ISBN: 9781441971340
Format: Undefined
$65.87

Covering every angle of the subject, this is a cutting-edge text presenting IT and non-IT facets of insider threats...  Read More >>

Privacy and Anonymity in Information Management Systems

Privacy and Anonymity in Information Management Systems...

Author: Jordi Nin ,  Javier Herranz
ISBN: 9781849962391
Format: Undefined
$65.87

With a focus on the technical issues related to digital privacy and information management, this book is an in-depth...  Read More >>

Economics of Information Security and Privacy

Economics of Information Security and Privacy

Author: Tyler Moore ,  David Pym
ISBN: 9781441969682
Format: Undefined
$65.87

Covers chapters presented at WEIS 2009. This book features topics that include identity theft, modeling uncertainty's...  Read More >>

Creeping Failure: How We Broke the Internet and What We Can Do to Fix It

Creeping Failure: How We Broke the Internet and What...

Author: Jeffrey Hunker
ISBN: 9780771041488
Format: Hardback
$68.51

The Internet is often called a superhighway, but it may be more analogous to a city: an immense tangle of streets,...  Read More >>

Critical Information Infrastructures Security

Critical Information Infrastructures Security

Author: Javier Lopez ,  Bernhard H Mmerli
ISBN: 9783540891741
Format: Undefined
$65.87

Constitutes the post-conference proceedings of the Second International Workshop on Critical Information Infrastructures...  Read More >>

Security in Emerging Wireless Communication and Networking Systems

Security in Emerging Wireless Communication and Networking...

Author: Qijun Gu ,  Wanyu Zang
ISBN: 9783642115561
Format: Undefined
$65.87

Constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September...  Read More >>

70-299 MCSE Guide to Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70-299 MCSE Guide to Implementing and Administering...

Author: Diane Barrett ,  Bill Ferguson
ISBN: 9781423903000
Format: Mixed media product
$298.19

Designed to prepare students for the Microsoft MCSE Certification Exam numbered 70-299 and for the challenges they...  Read More >>

Privacy Enhancing Technologies: 10th International Symposium, PETS 2010, July 21-23, 2010, Berlin, Germany, Proceedings

Privacy Enhancing Technologies: 10th International Symposium,...

Author: Mikhail Atallah ,  Nicholas Hopper
ISBN: 9783642145261
Format: Paperback
$219.12

The papers handle topics such as access control, privacy of web based search, anonymus webs of trust, security attacks,...  Read More >>

802.11 Wireless Networks: Security and Analysis

802.11 Wireless Networks: Security and Analysis

Author: Alan Holt ,  Chi-Yu Huang
ISBN: 9781849962742
Format: Hardback
$261.36

This unique and practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating...  Read More >>

Handbook of FPGA Design Security

Handbook of FPGA Design Security

Author: Ted Huffmire ,  Cynthia Irvine
ISBN: 9789048191567
Format: Hardback
$340.56

The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers...  Read More >>

The Accidental Administrator: Cisco ASA Security Appliance: A Step-by-Step Configuration Guide

The Accidental Administrator: Cisco ASA Security Appliance:...

Author: Don R. Crawley
ISBN: 9781449596620
Format: Paperback
$105.60

"There is a newer version of this book, updated for software version 9.x and later. Look for ISBN 978-0983660750....  Read More >>

Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Digital Forensics for Network, Internet, and Cloud Computing:...

Author: Terrence V. Lillard ((Linux+, CISSP)) ,  Craig Schiller
ISBN: 9781597495370
Format: Paperback
$184.67

Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network...  Read More >>

Transactions on Data Hiding and Multimedia Security V

Transactions on Data Hiding and Multimedia Security...

Author: Yun Q. Shi
ISBN: 9783642142970
Format: Paperback
$190.08

Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,...  Read More >>

IT Security Management: IT Securiteers - Setting up an IT Security Function

IT Security Management: IT Securiteers - Setting up...

Author: Alberto Partida ,  Diego Andina
ISBN: 9789048188819
Format: Hardback
$340.56

IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals,...  Read More >>

Dear Hacker: Letters to the Editor of ""2600""

Dear Hacker: Letters to the Editor of ""2600""

Author: Emmanuel Goldstein
ISBN: 9780470620069
Format: Hardback
$79.07

Actual letters written to the leading hackers' magazine For 25 years, 2600: The Hacker Quarterly has given voice...  Read More >>

Networked Services and Applications - Engineering, Control and Management: 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010, Proceedings

Networked Services and Applications - Engineering, Control...

Author: Finn Arve Aagesen ,  Svein J. Knapskog
ISBN: 9783642139703
Format: Paperback
$248.16

Constitutes the refereed proceedings of the 16th EUNICE/IFIP TC 6.6 Workshop on Networked Services and Applications,...  Read More >>

Network Security Auditing

Network Security Auditing

Author: Chris Jackson
ISBN: 9781587053528
Format: Paperback
$184.80

 Read More >>

Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings

Applied Cryptography and Network Security: 8th International...

Author: Jianying Zhou ,  Moti Yung
ISBN: 9783642137075
Format: Paperback
$282.48

ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past...  Read More >>

CWNA Certified Wireless Network Administrator & CWSP Certified Wireless Security Professional All-in-One Exam Guide (PW0-104 & PW0-204)

CWNA Certified Wireless Network Administrator & CWSP...

Author: Tom Carpenter
ISBN: 9780071713887
Format: Mixed media product
$211.17

Featuring TWO wireless certifications covered in ONE book along with a definitive source of reference knowledge,...  Read More >>

Seven Deadliest Network Attacks

Seven Deadliest Network Attacks

Author: Stacy Prowell (Senior Member of the CERT technical staff and Chief Scientist at STAR* Lab) ,  Rob Kraus (CISSP, C|EH, MCSE; Senior Security Consultant for Solutionary, Inc.)
ISBN: 9781597495493
Format: Paperback
$65.87

Lists the dangerous hacks and exploits specific to networks, and presents the anatomy of these attacks including...  Read More >>

Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, Proceedings

Public Key Cryptography - PKC 2010: 13th International...

Author: Phong Q. Nguyen ,  David Pointcheval
ISBN: 9783642130120
Format: Paperback
$282.48

Constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography,...  Read More >>

Wireless Internet Security: Architecture and Protocols

Wireless Internet Security: Architecture and Protocols...

Author: James Kempf
ISBN: 9780511754739
Format: Undefined
$620.40

 Read More >>

Implications of Aggregated DOD Information Systems for Information Assurance Certification and Accreditation

Implications of Aggregated DOD Information Systems for...

Author: Eric Landree ,  Daniel Gonzales
ISBN: 9780833049483
Format: Paperback
$52.80

The challenge of securing U.S. Department of Defense (DoD) information systems has grown significantly. A new approach...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List