Rich Campagna; Sibbu Iyer; Ashwin...
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are...
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. Thsi title present the information for the examiners in an easy...
To home, business or free to our stores. Click for more info.
Despatched in 2 business days.
|Add to Basket|
|Click & Collect:|
Order now to collect from 2pm today. In stock items only. Click for more info.
Currently out of stock in all stores.
Stores - out of stock
|New & Used:|
Our marketplace sellers will deliver to your chosen address. Click for more info.
| || || |
Kayem, Anne V. D. M.; Akl, Selim G.;...
Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to...
An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and...
Suitable for the professional system administrators who need to securely deploy Microsoft Vista in their networks, this work helps readers learn about the security features of Vista, how to safely...
Cachin, Christian; Camenisch, Jan
This book constitutes the refereed proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2004, held in...
This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Information Security and Cryptology, ICISC 2000,...
Blyth, Andrew; Sutherland, Iain
This book contains the proceedings of the Second European Conference on Computer Network Defence, which took place in December 2006. The conference focused on the...
Geeks on Call America Inc.
The boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. This book helps you build that all-important first line...
Computer security is fast becoming the top concern of every Fortune 1000 company. Eric Greenberg walks the reader through a detailed, individualized needs analysis, technology choices, and cost implications using...
Ed Robinson; Michael Bond
This resource is an end-to-end guide, with clear prescriptive guidance for best practices, application design, and coding techniques for Windows and Web-based applications. It makes writing secure applications easier than...
"Create apps that are safe from hacking, attacks, and security breaches" --Cover.
Stephen Charles Edge; William Barker;...
Written in part as a companion to the SANS Institute course for Mac OS X, this title contains details on Mac OS X security information and offers walkthroughs on securing...
Samuel C. McQuade
An encyclopedia that examines various aspects of the mysterious world of cybercrime. It includes articles that address: terminology, definitions and social constructs of crime; national infrastructure security vulnerabilities and capabilities;...