Free Delivery Over $100
10359 books were found.
Shows Webmasters, managers, designers and developers how to build secure Web sites and Web applications, enabling... Read More >>
people who are just interested in how things work have finally been able to learn a little bit about computer viruses.... Read More >>
Read More >>
Die Entwicklung und Analyse von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Grosse Beruhmtheit... Read More >>
Der vorliegende Band zum Sicherheitsrisiko Informationstechnik und damit zur Informatiksicherheit spiegelt Positionen... Read More >>
Dieses Buch solI weder eine streng wissenschaftliche Abhandlung uber das Thema Computerviren darstellen, noch solI... Read More >>
Deutsche Hacker im Sold des KGB, Computervirus blockiert Groj3rechner, Student schleuste Computervirus ein, Bundesbahn-Computer... Read More >>
Dr. Heiko Lippold Prof. Dr. Paul Schmitz Dr. Heinrich Kersten I XII VORWORT Mit der immer stlirkeren Verbreitung... Read More >>
Vorwort Der vorliegende Band enthalt die Vortragsmanuskripte der 1. Deutschen Konferenz tiber Computersicherheit,... Read More >>
Wiirde es Ihnen gefaIlen, wenn ein verborgener Virus in einem Textverarbeitungsprogramm von XYZ-Software aile Ihre... Read More >>
Prof. Dr. Paul Schmitz Dr. Heiko Lippold x VORWORT 'Infonnationssicherheit' ist im umfassenden Sinn das Ziel, Ergebnis... Read More >>
Dieser Programmierleitfaden enthält eine Beschreibung aller Befehle der Norton Utilities (Version 4 und 4.5) einschließlich... Read More >>
<p>This professional book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy... Read More >>
<p>The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics,... Read More >>
A revised introduction to the Linux operating system for beginning hackers and penetration testers. A revised introduction... Read More >>
Find security holes before the bad guys do. Break into the world of vulnerability research-or expand your cybersecurity... Read More >>
Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach.... Read More >>
Cryptographic definitions are often abstract and complex, making them challenging for beginners to understand and... Read More >>
In today’s rapidly evolving technological landscape, managing artificial intelligence effectively is crucial for... Read More >>
This book features high-quality research papers presented at the 6th International Conference on Computational Intelligence... Read More >>
This book features selected papers from the International Conference on Information Technology and Intelligence... Read More >>