Rich Campagna; Sibbu Iyer; Ashwin...
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are...
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. Thsi title present the information for the examiners in an easy...
To home, business or free to our stores. Click for more info.
| || || |
Available through Foyles Online Marketplace only
Currently out of stock
|Click & Collect:|
Order now to collect from 11am tomorrow. In stock items only. Click for more info.
| || || |
Currently out of stock in all stores.
Stores - out of stock
|New & Used:|
Our marketplace sellers will deliver to your chosen address. Click for more info.
In stock at one or more sellers.
|Buy - Select Seller|
Koblitz, NEAL; Menezes, A.J.; Wu, Y.-H.
From the reviews: "This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for...
Hadi Nahari; Ronald L. Krutz
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking...
Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings that can ...
David L. Prowse
Learn, prepare, and practice for CompTIA Security+ SY0-301 exam success with this CompTIA Authorized Cert Guide from Pearson IT Certification, a leader in IT...
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third...
"Steal this Computer Book: What They Wont Tell You About the Internet" is a book about computers/software.
Sean Smith; John Marchesini
"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging ...
Network security is not simply about building impenetrable walls - determined attackers will eventually overcome traditional defenses. The most effective computer...
In today's hyper-connected society, understanding the mechanisms of trust is crucial. Issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system.
Stuart McClure; Joel Scambray; George...
This fully updated edition of the longest-selling, most successful computer security book worldwide features an all-new "5 Deployments" approach
Richard A. Clarke; Robert K. Knake
Brian Svidergol; Robbie Allen
Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and...
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? This book helps you to learn about the common threats and...