Free Delivery Over $100
10356 books were found.
Network Admission Control (NAC) uses the network infrastructure to enforce security policy compliance on all devices... Read More >>
Read More >>
Data warehousing and data mining provide techniques for collecting information from distributed databases and for... Read More >>
Company network administrators are compelled today to aggressively pursue a robust network security regime. This... Read More >>
The Ultimate Reference & Learning Guide for the Internet Professional! In depth and current overview of common challenges... Read More >>
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest... Read More >>
Offers 125 concise and practical hacks, including information for Windows administrators, hacks for wireless networking... Read More >>
Delivers techniques for anticipating and identifying software security problems. Reviewing the design and coding... Read More >>
Network Admission Control (NAC) is designed to prohibit or restrict access to the secured internal network from... Read More >>
The average user has little idea of the severity of security threats to the Windows Vista OS or how those threats... Read More >>
Covering technologies used to search for vulnerabilities on websites from a hacker's point of view, this book on... Read More >>
Grid computing is widely regarded as a technology of immense potential in both industry and academia. Yet many enterprises... Read More >>
The Advanced Computer Systems Conference was held in October 2006, in Miedzyzdroje, Poland. This book contains a... Read More >>
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere,... Read More >>
La guiá esencial para Seguridad y conceptos de auditoria SAP Con 75 elementos esenciales de seguridad, preguntas... Read More >>
The IT Security Governance Guidebook with Security Program Metrics on downloadable resources provides clear and... Read More >>
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks... Read More >>
Details both the management and technical skill and tools required to develop an effective vulnerability management... Read More >>
The 27th Annual International Cryptology Conference was held in Santa Barbara, California, in August 2007. The conference... Read More >>
Critical Information Infrastructures starts with some basic definitions and assumptions on the topic. It goes on... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
Constitutes the papers of the Third International Conference on E-business and Telecommunication Networks, ICETE... Read More >>