Free Delivery Over $100
10356 books were found.
The first test prep guide for the new ISC2 Certified Secure Software Lifecycle Professional exam The CSSLP (Certified... Read More >>
Intended for anyone from the mobile user to a student or professional working in a wireless environment, this title... Read More >>
Virtualization is becoming extremely important: organizations can run multiple instances of a variety of operating... Read More >>
Read More >>
The papers in this s- tion deal with provenance access control, access control model for collaborative editors,... Read More >>
Covers the various aspects of intrusion detection and response systems. This book not only covers the developments... Read More >>
This volume contains the 12 papers presented at the WISTP 2009 conference, held in Brussels, Belgium in September... Read More >>
A hands-on guide to implementing Cisco ASA (Adaptive Security Appliance) Read More >>
<p>This is one of the first books to provide an overview of trust management for open service-oriented environments.... Read More >>
<p>This volume constitutes the refereed proceedings of 11 international workshops held as part of OTM 2010 in Hersonissos,... Read More >>
The objective of computer security varies and can include protection of information from theft or corruption, or... Read More >>
This book provides a solid ground for researchers approaching the topic of privacy in location-based applications... Read More >>
Our best weapons against invasions of privacy are knowledge of the issues and action to protect ourselves. Risky... Read More >>
<p>This book constitutes the refereed proceedings of the 28th International Conference on Computer Safety, Reliability,... Read More >>
What constitutes an identity, how do new technologies affect identity, how do we manage identities in a globally... Read More >>
Udo Bub, Klaus-Dieter Wolfenstetter Angesichts der Dynamik des technologischen Wandels und der umfassenden Verbreitung... Read More >>
This textbook provides a framework for thinking about security, with attention to specific types of security problems... Read More >>
Complete Hands-On Help for Securing VMware vSphere and Virtual Infrastructure by Edward Haletky, Author of the Best... Read More >>
Cloud computing has emerged as a popular way for corporations to save money that would otherwise go into their IT... Read More >>
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the... Read More >>
For undergraduate and graduate network security courses. This book aims to provide comprehensive knowledge of... Read More >>