Free Delivery Over $100
10356 books were found.
Reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network.... Read More >>
Examines the decision making process and health seeking patterns of low-income young women with unplanned pregnancies... Read More >>
The 16 revised full papers and 9 revised short papers presented together with 5 poster papers, 2 panel reports,... Read More >>
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference... Read More >>
Teaches Google searching basics. This book lets you explore Google's Web-based Interface, build Google queries,... Read More >>
An invaluable reference discussing the Generic Authentication Architecture (GAA), its infrastructure, usage and... Read More >>
Online Predators is a guide for parents who want to know if their child is at risk due to information they share... Read More >>
Originally released in 1996, Netcat is a networking program designed to read and write data across both Transmission... Read More >>
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held... Read More >>
Read More >>
Constitutes the refereed proceedings of the 12th International Conference on Information and Communications Security,... Read More >>
<p>This book constitutes the refereed proceedings of the Second International Conference on Information Systems... Read More >>
Constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in... Read More >>
<p>This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and... Read More >>
<p>This volume constitutes the refereed proceedings of 11 international workshops held as part of OTM 2010 in Hersonissos,... Read More >>
<p>This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application... Read More >>
Constitutes the refereed post-conference proceedings of the 4th International Conference on Information Security... Read More >>
Constitutes the post-conference proceedings of the Second International Workshop on Critical Information Infrastructures... Read More >>
Constitutes the refereed proceedings of the Second International Conference on Network-Based Information Systems,... Read More >>
<p>This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network... Read More >>
Constitutes the refereed proceedings of the 7th International Conference on Wired/Wireless Internet Communications,... Read More >>