Free Delivery Over $100
10356 books were found.
The papers present four families of public key cryptosystems that have the potential to resist quantum computers:... Read More >>
Read More >>
Presents the academic community with a broad range of international findings in online consumer protection. This... Read More >>
Provides practical steps for producing secure information systems, targeted at the highest levels in the organization.... Read More >>
RFID Security: Techniques, Protocols and System-On-Chip Design is an edited book covering fundamentals, security... Read More >>
Best practices for securing networks with FWSM Understand the differences between PIX/ASA firewall and FWSM... Read More >>
The Only Book for Analyzing and Mitigating Mobile Malicious Code! Read More >>
Privacy in statistical databases is a discipline whose purpose is to provide solutions to the tension between the... Read More >>
This is a book about SPAM, e-SCAMs and how to be safe from them. Here is a book written in a simple style and straight... Read More >>
Although a high - commendation accuracy can indicate a user's favorite items, there is a fault in that - ly similar... Read More >>
This text introduces a complete and concise view of network security. It provides in-depth theoretical coverage... Read More >>
The BACnet standard [1] defines a communication protocol for information exchange between components of a distributed... Read More >>
Offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards,... Read More >>
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks... Read More >>
Taking a non-nonsense look at identity theft, one of the world's most renowned security experts explains what consumers... Read More >>
Wireless Mesh Networks (WMN) is a promising technology that will play an increasingly important role in the next... Read More >>
This book constitutes the best papers of the 4th International Conference on E-business and Telecommunication Networks,... Read More >>
Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology.... Read More >>
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals,... Read More >>
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means:... Read More >>
Defining key threats an average household computer might face, and offering strategies to turn novice and basic... Read More >>