Free Delivery Over $100
10356 books were found.
<p>Identify, manage, and counter security threats with the Cisco Security Monitoring, Analysis, and Response System... Read More >>
Read More >>
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional... Read More >>
Offers a look at network security. This book guides readers step-by-step through the 'stack' - the seven layers... Read More >>
The book to which I was asked by the editors to write a foreword is an interesting collection of contributions.... Read More >>
This insider’s guide examines computer security from the hacker's perspective, demonstrating how a security system... Read More >>
Covers the economics of cyber security and the intersection of privacy and information security. This title introduces... Read More >>
Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e.,... Read More >>
Furthermore, the exploding use of Web technologies for corporate intranets and Internet sites has escalated security... Read More >>
Helps you understand Cisco Security Monitoring, Analysis, and Response System that reduces your security risks and... Read More >>
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion... Read More >>
A companion guide for the Cisco Networking Academy Program. It is designed as a portable desk reference to be used... Read More >>
For advanced information security courses on disaster recovery With real world examples, this text provides... Read More >>
A comprehensive reference for understanding security risks, mitigations and best practices as they apply to the... Read More >>
Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall... Read More >>
Thomas Wölfls Modell erlaubt erstmals neben der Herleitung von Schlüsselauthentizität auch die Ableitung von Attributauthentizität... Read More >>
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement... Read More >>
Protect your network with self-regulating network security solutions that combat both internal and external threats.... Read More >>
Corporate IT security strategies are only as good as the employee's awareness of his or her role in maintaining... Read More >>
Constitutes the refereed post-proceedings of the 12th International Workshop on Security Protocols, April 2004.... Read More >>
Offers the busy network administrator with solutions to securing the wireless network. This book provides the basic... Read More >>