Free Delivery Over $100
10356 books were found.
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup... Read More >>
Read More >>
For over seven years, computer networking and security instructor and consultant, Dru Lavigne, meticulously documented... Read More >>
Constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS... Read More >>
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet... Read More >>
The Security+ Guide to Network Security Fundamentals Second Edition Update is designed to provide updated information... Read More >>
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search,... Read More >>
Ethical dilemmas and security challenges have emerged rapidly alongside the accelerated evolution of information... Read More >>
Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders... Read More >>
The only forensic analysis book covering Macintosh OS X, iPods, and iPhones Read More >>
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs,... Read More >>
Find out how to use the fortress built into Vista Assess your risk, protect your kids, and keep phishers out of... Read More >>
Suitable for IT professionals managing enterprise security, this book allows readers to assess vulnerabilities,... Read More >>
Offers a presentation of link layer security issues in wireless local area networks (WLANs), wireless personal area... Read More >>
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain... Read More >>
This title eases the research burden, develops investigative protocols, and pulls together data into a comprehensive... Read More >>
The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties... Read More >>
Describes the advances in securing group communications. This book focuses on tailoring the security solution to... Read More >>
ENISA is proud to be working with eema, TeleTrusT, NASK (the Polish research and development organization and leading... Read More >>