Free Delivery Over $100
10356 books were found.
The authors explore the strategic significance, market requirements, and possibilities of leveraging Standards Based... Read More >>
Although Mobile and Wireless Networking eliminates many of the problems associated with traditional wired networks,... Read More >>
As the diffusion and use of technology applications have accelerated in organizational and societal domains, behavioral... Read More >>
Contains the papers presented at the seventeenth annual Safety-critical Systems Symposium, held at Brighton, UK,... Read More >>
In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker... Read More >>
Constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security,... Read More >>
Constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008,... Read More >>
This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences... Read More >>
<p>This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application... Read More >>
Constitutes the proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, Japan,... Read More >>
Constitutes the post-workshop proceedings of the 10th International Workshop on Information Hiding, IH 2008, held... Read More >>
Over 40 million Americans have seen Dateline NBC's ongoing To Catch a Predator series, with an average of 11 million... Read More >>
Addresses citizens' perceptions of information systems. This book seeks to deliver relevant overviews and recommendations... Read More >>
Read More >>
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people, suits... Read More >>
IPv6 Security Protection measures for the next Internet Protocol As the world’s networks migrate to... Read More >>
This authoritative guide on computer network security covers current security solutions and best practices in both... Read More >>
"This lab manual, when used with the main text, ""Security+ Guide to Network Security Fundamentals, Third Edition""... Read More >>
If you are on a mission to change the way government works, particularly in the national security arena, this is... Read More >>
This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+... Read More >>
What Kevvie Fowler has done here is truly amazing: He has defined, established, and documented SQL server forensic... Read More >>
Focuses on the security updates provided as part of Windows Server 2003 Service Pack 1 and the Windows Server 2003... Read More >>
Personalisierte Dienstleistungen setzen eine Weitergabe persönlicher Daten zwischen Dienstleistern voraus. Der Autor... Read More >>
Cyber Crime Fighters: Tales from the Trenches offers one of the most insightful views of the latest criminal threats... Read More >>