Free Delivery Over $100
10359 books were found.
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together... Read More >>
The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge... Read More >>
This volume provides information for creating and implementing a successful security and disaster recovery plan.... Read More >>
From an industry insider--a close look at high-performance, end-to-end switching solutionsLoad balancers are fast... Read More >>
Provides firewall information on the personal firewall software applications available for the non expert firewall... Read More >>
Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. Read More >>
Includes the developments in: security protocols; secure software engineering; mobile agent security; e-commerce... Read More >>
This revised edition offers professionals an up-to-date and comprehensive understanding of the technologies that... Read More >>
Read More >>
Coverage of the cryptographic classes in .NET - analysis of the .NET security model. Read More >>
A guide to protecting your computer(s) on the Internet. It shows you how to keep your computer safe in the hotel... Read More >>
"Reviewing the threats to Windows PC such as what hackers know about your computer and the Internet, and how they... Read More >>
Shows you how to avoid security problems the right way. Read More >>
Government regulation and new legislation, coupled with technology, have the potential to change the nature of the... Read More >>
"A 3-book boxed set which comes packaged with a Wallet-Sized CD containing a printable HTML version of all three... Read More >>
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how... Read More >>
With more businesses shifting emphasis towards the Internet, new ways of protecting transacting parties are needed... Read More >>
This book focuses on a critical aspect of the Cisco IOS - access lists, which are central to securing routers and... Read More >>
A self-study resource for Microsoft exam 70-227. Read More >>
This is an authoritative security handbook from the CERT Coordination Center, the oldest computer security response... Read More >>
Using a problem-oriented approach, this book walks you through almost everything from protecting against network... Read More >>
Presents the process of setting up a secure E-commerce Web site. This book includes implementation examples for... Read More >>
In December 1999, more than forty members of government, industry, and academia assembled at the Hoover Institution... Read More >>