Network security books

10346 books were found.

Information Systems Security: 5th International Conference, ICISS 2009 Kolkata, India, December 14-18, 2009 Proceedings

Information Systems Security: 5th International Conference,...

Author: Atul Prakash ,  Indranil Sen Gupta
ISBN: 9783642107719
Format: Paperback
$219.12

The management of services and operations in today’s organizations are - coming increasingly dependent on their...  Read More >>

Advances in Computer Science, Information Security and Privacy: 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings

Advances in Computer Science, Information Security and...

Author: Anupam Datta
ISBN: 9783642106217
Format: Paperback
$190.08

This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held...  Read More >>

Creeping Failure: How We Broke the Internet and What We Can Do to Fix It

Creeping Failure: How We Broke the Internet and What...

Author: Jeffrey Hunker
ISBN: 9781299259812
Format: Electronic book text
$189.60

The Internet is often called a superhighway, but it may be more analogous to a city: an immense tangle of streets,...  Read More >>

Testowanie Bezpiecze?stwa Aplikacji Internetowych. Receptury

Testowanie Bezpiecze?stwa Aplikacji Internetowych. Receptury...

Author: Paco Hope ,  Ben Walther
ISBN: 9781306795876
Format: Electronic book text
$31.65

Poznaj i wykorzystaj mechanizmy testowania zabezpiecze?, a nikt nie prze?lizgnie si? przez Twoj? witryn?!Jak zainstalowa?...  Read More >>

Nokia Network Security Solutions Handbook

Nokia Network Security Solutions Handbook

Author: Kyle X Hourihan ,  Daniel Kligerman
ISBN: 9781281056078
Format: Electronic book text
$327.10

 Read More >>

Penetration Tester's Open Source Toolkit

Penetration Tester's Open Source Toolkit

Author: Jay Beale ,  Roelof Temmingh, B.Eng
ISBN: 9781281035561
Format: Electronic book text
$327.10

A penetration tester must be creative enough to think outside of the box to determine the best attack vector into...  Read More >>

Metasploit Toolkit for Penetration Testing

Metasploit Toolkit for Penetration Testing

Author: David Maynor
ISBN: 9781281112583
Format: Electronic book text
$332.38

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for...  Read More >>

Above the Clouds: Managing Risk in the World of Cloud Computing

Above the Clouds: Managing Risk in the World of Cloud...

Author: Kevin T McDonald
ISBN: 9781282529090
Format: Electronic book text
$121.44

 Read More >>

Hacking Exposed Web Applications

Hacking Exposed Web Applications

Author: Joel Scambray
ISBN: 9781282905337
Format: Electronic book text
$132.00

 Read More >>

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Applied Cryptography for Cyber Security and Defense:...

Author: Hamid R Nemati (University of North Carolina, USA) ,  Hamid R Nemati (University of North Carolina, USA)
ISBN: 9781282895195
Format: Electronic book text
$570.24

This book is written for professionals who want to improve their understanding about how to bridge the gap between...  Read More >>

Hacking Exposed Wireless

Hacking Exposed Wireless

Author: Johnny Cache ,  Joshua Wright
ISBN: 9781282736283
Format: Electronic book text
$131.97

 Read More >>

Trust Modeling and Management in Digital Environments: From Social Concept to System Development

Trust Modeling and Management in Digital Environments:...

Author: Zheng Yan ,  Zheng Yan
ISBN: 9781282500426
Format: Electronic book text
$855.36

Trust Modeling and Management in Digital Environments: From Social Concept to System Development examines how reliance...  Read More >>

Security in Virtual Worlds, 3D Webs, and Immersive Environments

Security in Virtual Worlds, 3D Webs, and Immersive Environments...

Author: Alan Rea (Western Michigan University, USA)
ISBN: 9781283024440
Format: Electronic book text
$475.20

Although one finds much discussion and research on the features and functionality of Rich Internet Applications...  Read More >>

Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices

Personal Data Privacy and Protection in a Surveillance...

Author: Christina Akrivopoulou (Aristotle University of Thessaloniki, Greece) ,  Athanasios Psygkas (Yale Law School, USA)
ISBN: 9781283024334
Format: Electronic book text
$475.20

In recent years, with rapidly advancing technology and a more globalized culture, the importance of privacy has...  Read More >>

Ict Acceptance, Investment and Organization

Ict Acceptance, Investment and Organization

Author: Salam Abdallah (Abu Dhabi University, UAE) ,  Fayez Ahmad Albadri (ADMA-OPCO, Abu Dhabi, UAE)
ISBN: 9781282923188
Format: Electronic book text
$475.20

The Arab world exhibits its own values and beliefs and poses specific challenges that are reflected on its practices...  Read More >>

Surviving Cyberwar

Surviving Cyberwar

Author: Richard Stiennon
ISBN: 9781282607842
Format: Electronic book text
$113.49

 Read More >>

It Security Metrics: A Practical Framework for Measuring Security & Protecting Data: A Practical Framework for Measuring Security & Protecting Data

It Security Metrics: A Practical Framework for Measuring...

Author: Lance Hayden
ISBN: 9781282702592
Format: Electronic book text
$131.97

 Read More >>

Encryption for Digital Content

Encryption for Digital Content

Author: Aggelos Kiayias ,  Serdar Pehlivanoglu
ISBN: 9781282980853
Format: Undefined
$366.96

This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems...  Read More >>

Artificial Higher Order Neural Networks for Computer Science and Engineering

Artificial Higher Order Neural Networks for Computer...

Author: Ming Zhang (Christopher Newport University, USA Hong Kong Polytechnic University, Hong Kong Hong Kong Polytechnic University, Hong Kong)
ISBN: 9781282563650
Format: Electronic book text
$475.20

Artificial neural network research is one of the promising new directions for the next generation of computers and...  Read More >>

Computational Gas-Solids Flows and Reacting Systems

Computational Gas-Solids Flows and Reacting Systems...

Author: Sreekanth Pannala (Oak Ridge National Laboratory, USA) ,  Madhava Syamlal (National Energy Technology Laboratory, USA)
ISBN: 9781282905665
Format: Electronic book text
$475.20

Gas-solids reactors, which often constitute critical steps of energy and chemical conversion processes, are in desperate...  Read More >>

Trust and Technology in a Ubiquitous Modern Environment

Trust and Technology in a Ubiquitous Modern Environment...

Author: Dominika Latusek (Kozminski Business School, Poland) ,  Alexandra Gerbasi (California State University Northridge, USA)
ISBN: 9781282572614
Format: Electronic book text
$475.20

In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences....  Read More >>

Serious Game Design and Development

Serious Game Design and Development

Author: Janis Cannon-Bowers ,  Clint Bowers (University of Central Florida, USA)
ISBN: 9781282563681
Format: Electronic book text
$475.20

The increasing use of games in learning has drawn the attention of numerous disciplines within the scientific community...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List