Rich Campagna; Sibbu Iyer; Ashwin...
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are...
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. Thsi title present the information for the examiners in an easy...
To home, business or free to our stores. Click for more info.
| || || |
Available through Foyles Online Marketplace only
Currently out of stock
|Click & Collect:|
Order now to collect from 5pm today. In stock items only. Click for more info.
| || || |
Currently out of stock in all stores.
Stores - out of stock
|New & Used:|
Our marketplace sellers will deliver to your chosen address. Click for more info.
In stock at one or more sellers.
|Buy - Select Seller|
Koblitz, NEAL; Menezes, A.J.; Wu, Y.-H.
From the reviews: "This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for...
Hadi Nahari; Ronald L. Krutz
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking...
Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings that can ...
David L. Prowse
Learn, prepare, and practice for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Cert Guide from Pearson IT Certification, a leader in IT...
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third...
"Steal this Computer Book: What They Wont Tell You About the Internet" is a book about computers/software.
Sean Smith; John Marchesini
"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging ...
Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer...
In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system.
Stuart McClure; Joel Scambray; George...
This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new "5 Deployments" approach
Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This book introduces you...
Michael Ligh; Steven Adair; Blake...
A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of...
Provides you with fundamental knowledge of information security in both theoretical and practical aspects. This title covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and...