Rich Campagna; Sibbu Iyer; Ashwin...
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are...
In Worm, one of the world's biggest selling authors of narrative non-fiction returns to bestselling form.
Cimato, Stelvio; Yang, Ching-Nung
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first...
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. Thsi title present the information for the examiners in an easy...
To home, business or free to our stores. Click for more info.
| || || |
Available through Foyles Online Marketplace only
Currently out of stock
|Click & Collect:|
Order now to collect from 2pm today. In stock items only. Click for more info.
| || || |
Currently out of stock in all stores.
Stores - out of stock
|New & Used:|
Our marketplace sellers will deliver to your chosen address. Click for more info.
In stock at one or more sellers.
|Buy - Select Seller|
Jajodia, Sushil; McGregor, Graeme W.;...
Dear readers, Although it is well-known that confidentiality, integrity and availability are highÂ level objectives of information security, much of the attention in...
An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and...
Presents an introduction to biometrics or the study of recognizing individuals based on their unique physical or behavioral traits, as they relate to computer security. This book begins with the...
Microsoft Press; Roberta Bragg
Includes the tools and features exam candidates want most, including in-depth, self-paced training based on exam content; exam tips; and a robust testing suite.
Computer security is fast becoming the top concern of every Fortune 1000 company. Eric Greenberg walks the reader through a detailed, individualized needs analysis, technology choices, and cost implications using...
Suitable for the professional system administrators who need to securely deploy Microsoft Vista in their networks, this work helps readers learn about the security features of Vista, how to safely...
Cachin, Christian; Camenisch, Jan
These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C- ference. The conference was organized by members of the IBM Zurich Research Laboratory in...
Blyth, Andrew; Sutherland, Iain
This book contains the proceedings of the Second European Conference on Computer Network Defence, which took place in December 2006. The conference focused on the...
I would like to welcome all the participants to the 3rd International Conference on Information Security and Cryptology (ICISC 2000). It is sponsored by the Korea...
Bernstein, Daniel J.; Buchmann,...
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next...
From the original hard cover edition:
In the modern age of almost universal computer usage, practically every individual in a technologically developed...
Koblitz, NEAL; Menezes, A.J.; Wu, Y.-H.
From the reviews: "This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for...