Free Delivery Over $100
10356 books were found.
For undergraduate and graduate network security courses. This book aims to provide comprehensive knowledge of... Read More >>
Helps you discover how technology is affecting your business, and why typical security mechanisms are failing to... Read More >>
Intended for researchers in wireless and computer technology, as well as graduate students, this book covers in... Read More >>
Read More >>
ISA 2009 was a succ- sor of the First International Workshop on Information Assurance in Networks (IAN 2007, Jeju-island,... Read More >>
Adopting an approach that favors full disclosure, ""The Rootkit Arsenal"" presents the most accessible, timely,... Read More >>
Identifies key attributes of cyber analysis and warning capabilities, and compares these attributes with US-CERT's... Read More >>
<p>This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and... Read More >>
This text introduces a complete and concise view of network security. It provides in-depth theoretical coverage... Read More >>
This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network... Read More >>
security incidents in the security security equipment at the perception regarding security on the Internet in Spanish... Read More >>
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009),... Read More >>
Cet ouvrage (2e edition actualisee et augmentee) presente les fondements theoriques de la virologie informatique,... Read More >>
Drupal is an open source framework and content management system that allows users to create and organize content,... Read More >>
Network access control (NAC) is how you manage network security when your employees, partners, and guests need to... Read More >>
Implementing Cisco IOS Network Security (IINS) is a Cisco-authorized, self-paced learning tool for CCNA® Security... Read More >>
This book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants,... Read More >>
Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt... Read More >>
The book ranges from the relevant security technologies to a systematic analysis of security risks all the way to... Read More >>