Network security books

10062 books were found.

Enterprise Cloud Security and Governance

Enterprise Cloud Security and Governance

Author: Adrian Pruteanu ,  Zeal Vora
ISBN: 9781788299558
Format: Undefined
$93.12

Modern day businesses and enterprises are moving to cloud simply to improve efficiency and speed, achieve flexibility...  Read More >>

Privacy in the Digital Age: Digital Communication and Personal Data

Privacy in the Digital Age: Digital Communication and...

Author: Nil Çokluk ,  Nurat Kara
ISBN: 9786257606790
Format: Paperback
$50.13

With the transition to the information age, a large amount of personal data has begun to be collected through technology....  Read More >>

International Conference on Cyber Security, Privacy and Networking (ICSPN 2022)

International Conference on Cyber Security, Privacy...

Author: Nadia Nedjah ,  Gregorio Martínez Pérez
ISBN: 9783031220173
Format: Paperback
$517.47

This book covers selected high-quality research papers presented in the International Conference on Cyber Security,...  Read More >>

A Proactive Network Surveillance Framework

A Proactive Network Surveillance Framework

Author: Maninder Singh
ISBN: 9782534887944
Format: Paperback
$116.16

Network security paradigm should be the one that permeates the enterprise, including people, processes and technology....  Read More >>

Rust for Network Programming and Automation (Edition-1)

Rust for Network Programming and Automation (Edition-1)...

Author: Brian Anderson
ISBN: 9788196228538
Format: Book
$158.37

Automate Network Infrastructure, Optimize Network Performance, and Analyze Packets with Rust Ecosystem Rust for...  Read More >>

Information Security and Cryptology: 18th International Conference, Inscrypt 2022, Beijing, China, December 11–13, 2022, Revised Selected Papers

Information Security and Cryptology: 18th International...

Author: Yi Deng ,  Moti Yung
ISBN: 9783031265525
Format: Paperback
$181.10

This book constitutes the refereed proceedings of the 18th International Conference on Information Security and...  Read More >>

Computer Security. ESORICS 2022 International Workshops: CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26–30, 2022, Revised Selected Papers

Computer Security. ESORICS 2022 International Workshops:...

Author: Sokratis Katsikas ,  Frédéric Cuppens
ISBN: 9783031254598
Format: Paperback
$194.04

This book constitutes the refereed proceedings of seven International Workshops which were held in conjunction with...  Read More >>

Privacy, Security And Forensics in The Internet of Things (IoT)

Privacy, Security And Forensics in The Internet of Things...

Author: Reza Montasari ,  Fiona Carroll
ISBN: 9783030912208
Format: Paperback
$388.10

This book provides the most recent security, privacy, technical and legal challenges in the IoT environments. This ...  Read More >>

Ubiquitous Security: Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28–31, 2022, Revised Selected Papers

Ubiquitous Security: Second International Conference,...

Author: Guojun Wang ,  Kim-Kwang Raymond Choo
ISBN: 9789819902712
Format: Paperback
$232.85

This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie,...  Read More >>

Windows APT Warfare: Identify and prevent Windows APT attacks effectively

Windows APT Warfare: Identify and prevent Windows APT...

Author: Sheng-Hao Ma ,  Ziv Chang
ISBN: 9781804618110
Format: Paperback
$118.77

Windows APT Warfare assists you in understanding the inner workings of Windows systems and carrying out APT attacks....  Read More >>

Advanced Communication and Intelligent Systems: First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers

Advanced Communication and Intelligent Systems: First...

Author: Rabindra Nath Shaw ,  Marcin Paprzycki
ISBN: 9783031250873
Format: Paperback
$284.60

This book constitutes selected papers presented at the First International Conference on Advanced Communication...  Read More >>

Content Distribution for Mobile Internet: A Cloud-based Approach

Content Distribution for Mobile Internet: A Cloud-based...

Author: Zhenhua Li ,  Yafei Dai
ISBN: 9789811969812
Format: Hardback
$388.10

Content distribution, i.e., distributing digital content from one node to another node or multiple nodes, is the...  Read More >>

Trading in Local Energy Markets and Energy Communities: Concepts, Structures and Technologies

Trading in Local Energy Markets and Energy Communities:...

Author: Miadreza Shafie-khah ,  Amin Shokri Gazafroudi
ISBN: 9783031214011
Format: Hardback
$362.22

This book presents trading in local energy markets and communities.  Read More >>

Cost Estimating Framework for U.S. Marine Corps Joint Cyber Weapons

Cost Estimating Framework for U.S. Marine Corps Joint...

Author: Bradley Wilson ,  Thomas Goughnour
ISBN: 9781977410207
Format: Paperback
$66.00

To help improve leadership decisionmaking related to the costs of offensive cyber operations acquisition, the authors...  Read More >>

Decision and Game Theory for Security: 13th International Conference, GameSec 2022, Pittsburgh, PA, USA, October 26–28, 2022, Proceedings

Decision and Game Theory for Security: 13th International...

Author: Fei Fang ,  Haifeng Xu
ISBN: 9783031263682
Format: Paperback
$168.16

 Read More >>

Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization

Cybersecurity Blue Team Strategies: Uncover the secrets...

Author: Kunal Sehgal ,  Nikolaos Thymianis
ISBN: 9781801072472
Format: Paperback
$92.37

This book will help you understand how a blue team is formed and why it is crucial for businesses. You'll learn...  Read More >>

Power Systems Cybersecurity: Methods, Concepts, and Best Practices

Power Systems Cybersecurity: Methods, Concepts, and...

Author: Hassan Haes Alhelou ,  Nikos Hatziargyriou
ISBN: 9783031203596
Format: Hardback
$388.10

This book covers power systems cybersecurity. In order to enhance overall stability and security in wide-area cyber-physical...  Read More >>

The Gentrification of the Internet: How to Reclaim Our Digital Freedom

The Gentrification of the Internet: How to Reclaim Our...

Author: Jessa Lingel
ISBN: 9780520395565
Format: Paperback
$27.95

How we lost control of the internet—and how to win it back. The internet has become a battleground. Although it...  Read More >>

Fusion of Machine Learning Paradigms: Theory and Applications

Fusion of Machine Learning Paradigms: Theory and Applications...

Author: Ioannis K. Hatzilygeroudis ,  George A. Tsihrintzis
ISBN: 9783031223709
Format: Hardback
$336.35

This book aims at updating the relevant computer science-related research communities, including professors, researchers,...  Read More >>

Access Control Models and Architectures For IoT and Cyber Physical Systems

Access Control Models and Architectures For IoT and...

Author: Maanak Gupta ,  Smriti Bhatt
ISBN: 9783030810917
Format: Paperback
$336.35

This was developed by the authors to provide an overall broader perspective and grounded approach to solve access...  Read More >>

Security and Privacy in Communication Networks: 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings

Security and Privacy in Communication Networks: 18th...

Author: Fengjun Li ,  Kaitai Liang
ISBN: 9783031255373
Format: Paperback
$284.60

They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain,...  Read More >>

Information Security Applications: 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24–26, 2022, Revised Selected Papers

Information Security Applications: 23rd International...

Author: Ilsun You ,  Taek-Young Youn
ISBN: 9783031256585
Format: Paperback
$168.16

This book constitutes the revised selected papers from the 23rd International Conference on Information Security...  Read More >>

Hacking With Kali Linux: The Complete Beginner's Guide about Kali Linux for Beginners (Step by Step Guide to Learn Kali Linux for Hackers)

Hacking With Kali Linux: The Complete Beginner's Guide...

Author: Michael Lee
ISBN: 9781998901869
Format: Paperback
$52.67

Are you interested in finding new and effective ways to keep your system safe and secure? Do you want to make sure...  Read More >>

Microsoft Defender for Endpoint in Depth: Take any organization's endpoint security to the next level

Microsoft Defender for Endpoint in Depth: Take any organization's...

Author: Paul Huijbregts ,  Joe Anich
ISBN: 9781804615461
Format: Paperback
$131.97

Gain an in-depth understanding of Microsoft Defender 365, explore its features, and learn successful implementation...  Read More >>

Triangle Mesh Watermarking and Steganography

Triangle Mesh Watermarking and Steganography

Author: Hang Zhou ,  Kejiang Chen
ISBN: 9789811977190
Format: Hardback
$388.10

Besides, the flexible data structure of 3D geometry provides enough space to embed secret information, making it...  Read More >>

Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List