Free Delivery Over $100
10346 books were found.
Covers chapters presented at WEIS 2009. This book features topics that include identity theft, modeling uncertainty's... Read More >>
Covering every angle of the subject, this is a cutting-edge text presenting IT and non-IT facets of insider threats... Read More >>
With a focus on the technical issues related to digital privacy and information management, this book is an in-depth... Read More >>
The Internet is often called a superhighway, but it may be more analogous to a city: an immense tangle of streets,... Read More >>
Constitutes the post-conference proceedings of the Second International Workshop on Critical Information Infrastructures... Read More >>
Constitutes the proceedings of the First International ICST Workshop, SEWCN 2009, held in Athens, Greece, in September... Read More >>
Designed to prepare students for the Microsoft MCSE Certification Exam numbered 70-299 and for the challenges they... Read More >>
The papers handle topics such as access control, privacy of web based search, anonymus webs of trust, security attacks,... Read More >>
This unique and practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating... Read More >>
The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers... Read More >>
"There is a newer version of this book, updated for software version 9.x and later. Look for ISBN 978-0983660750.... Read More >>
Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
IT Security Management provides an insight on how to create and stimulate a team of passionate IT security professionals,... Read More >>
Actual letters written to the leading hackers' magazine For 25 years, 2600: The Hacker Quarterly has given voice... Read More >>
Constitutes the refereed proceedings of the 16th EUNICE/IFIP TC 6.6 Workshop on Networked Services and Applications,... Read More >>
Read More >>
ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past... Read More >>
Featuring TWO wireless certifications covered in ONE book along with a definitive source of reference knowledge,... Read More >>
Lists the dangerous hacks and exploits specific to networks, and presents the anatomy of these attacks including... Read More >>
Constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography,... Read More >>
The challenge of securing U.S. Department of Defense (DoD) information systems has grown significantly. A new approach... Read More >>