Rich Campagna; Sibbu Iyer; Ashwin...
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are...
In Worm, one of the world's biggest selling authors of narrative non-fiction returns to bestselling form.
Cimato, Stelvio; Yang, Ching-Nung
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first...
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. Thsi title present the information for the examiners in an easy...
To home, business or free to our stores. Click for more info.
| || || |
Available through Foyles Online Marketplace only
Currently out of stock
|Click & Collect:|
Order now to collect from 11am tomorrow. In stock items only. Click for more info.
| || || |
Currently out of stock in all stores.
Stores - out of stock
|New & Used:|
Our marketplace sellers will deliver to your chosen address. Click for more info.
In stock at one or more sellers.
|Buy - Select Seller|
From the original hard cover edition:
In the modern age of almost universal computer usage, practically every individual in a technologically developed...
Koblitz, NEAL; Menezes, A.J.; Wu, Y.-H.
From the reviews: "This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for...
Hadi Nahari; Ronald L. Krutz
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking...
Yuri Diogenes; Jim Harrison; Mohit...
Details the features and capabilities of Microsoft[registered] Forefront[registered] Threat Management Gateway (TMG). This title helps you discover how to: implement TMG; integrated security features; analyze your Web and perimeter security...
Fred C. Piper; Sean Murphy
A clear and informative introduction to the science of codebreaking, explaining what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned.
Michael Sikorski; Andrew Honig
More than 100 malicious computer attacks (malware) occur every second. The skills required to analyze and assess these attacks quickly are in high demand. The authors' extensive real-world experience provides...
Ben-Ari, Erez; Amara, Rainier
Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings that can ...
David L. Prowse
Learn, prepare, and practice for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Cert Guide from Pearson IT Certification, a leader in IT...
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third...