Free Delivery Over $100
10356 books were found.
Der Sammelband präsentiert die Ergebnisse zweier Simulationsstudien im Rahmen des Forschungsprojekts ""Multimedialer... Read More >>
Since the cyber attacks are made with the use of global informational infrastructure they could be organized from... Read More >>
Addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed... Read More >>
Read More >>
Kostensenkungen, E?zienzsteigerungen und die Erhöhung der Flexibilität hinsichtlich zukünftiger Anforderungen ist... Read More >>
A guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics,... Read More >>
Features the real world cases of botnet attacks to underscore the need for action. This title explains botnet fundamentals... Read More >>
Explores technologies and applications needed to overcome security issues in wireless and handheld communications... Read More >>
Suitable for beginners in security, this textbook simplifies the difficult concepts of cryptography and network... Read More >>
Power analysis attacks allow the extraction of secret information from smart cards. In all these applications, the... Read More >>
Network participants are required to observe predefined steps called security protocols, whose proof of correctness... Read More >>
Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it... Read More >>
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security... Read More >>
Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art... Read More >>
David Godschalk untersucht Ursachen und Entstehungsbedingungen von Rechtsverstößen wie Computersabotage, Betrug... Read More >>
Der Einsatz von Intrusion-Detection-Systeme zum Schutz vor Angriffen von IT-Systemen ist häufig von Fehlalarmen... Read More >>
The RadioBSD Crier: 2007/01 brings you a 24-page article on managing FreeBSD and NetBSD IPFW, IPFW2, and IP6FW firewalls.... Read More >>
VoIP is a communications technology that is prone to attacks such as SPIT, Voicemail Brute forcing, Caller ID Spoofing,... Read More >>
Faculty of Advanced Technology, University of Glamorgan, Wales, UK Read More >>