Free Delivery Over $100
10356 books were found.
<p>This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE... Read More >>
<p>This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held... Read More >>
<p>This book constitutes the refereed proceedings of the 9th International Conference on Distributed Computing and... Read More >>
<p>This book responds to the growing need to secure critical infrastructure by creating a starting place for new... Read More >>
<p>This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network... Read More >>
<p>This volume constitutes the refereed proceedings of 11 international workshops held as part of OTM 2010 in Hersonissos,... Read More >>
<p>This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security,... Read More >>
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers... Read More >>
Read More >>
The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless... Read More >>
"A follow up to the 5th report, ""HL 165-I, session 2006-07"" and the ""Government response"" (Cm 7234)." Read More >>
This book introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in... Read More >>
<p>This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume... Read More >>
SSL Remote Access VPNs An introduction to designing and configuring SSL virtual private networks Jazib... Read More >>
Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study... Read More >>
Der Begriff Trusted Computing umschreibt eine Reihe neuer Ansätze zur Verbesserung der Computersicherheit durch... Read More >>
""Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than... Read More >>
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust... Read More >>
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network... Read More >>
Comprehensive Group Policy Coverage, including Windows Server 2008 and Vista SP1 This new edition of Group Policy:... Read More >>