Free Delivery Over $100
10356 books were found.
Roland Steidle untersucht, wie Assistenzsysteme in einem verteilten System datenschutzkonform gestaltet werden konnen.... Read More >>
This is CISO Security Program Metrics. It provides tools for the CISO to help get their job done effectively, efficiently,... Read More >>
The importance of auditing at both the server and network level and how to create trust relationships and domains... Read More >>
Shows readers how to strengthen the weak spots they find in their network's armor. This book enables readers discover... Read More >>
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures... Read More >>
Read More >>
Sheds light on practice design, deployment, and maintenance of an ISA Server 2004 Environment. This book provides... Read More >>
These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme... Read More >>
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean... Read More >>
With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi and the growing interest in the... Read More >>
Showing you how to regain control of your life, this book teaches how to keep private information private, stop... Read More >>
Constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM... Read More >>
Attempts to show you how to walk-the-walk and talk-the-talk of the elusive underworld of the Internet, home to millions... Read More >>
Written by one of the foremost experts on PHP security in the world, this book focuses on providing the readers... Read More >>
Intended for those working in the field of cyber-security, this book helps the readers understand the growing threat... Read More >>
Spyware may collect information about a computer user's activities and transmit that information to someone else.... Read More >>
The CISO Toolkit is a collection of books and software for the Chief Information Security Officer (CISO) of a substantial... Read More >>
Incorporating readings of Heaney's elegies, pastoral eclogues and sonnets, this book presents a formal analysis... Read More >>
Talks about the process of preparing and deploying open source host integrity monitoring software, specifically,... Read More >>
Provides a single source of information covering the depth needed to build a secure SLES 9 platform. Provides step-by-step... Read More >>
Includes a coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.... Read More >>
For courses focusing on Windows Server 2003 and MCSE/MSCA Certification. The only academic certification series... Read More >>