Rich Campagna; Sibbu Iyer; Ashwin...
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are...
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. Thsi title present the information for the examiners in an easy...
To home, business or free to our stores. Click for more info.
| || || |
Available through Foyles Online Marketplace only
Currently out of stock
|Click & Collect:|
Order now to collect from 11am today. In stock items only. Click for more info.
| || || |
Currently out of stock in all stores.
Stores - out of stock
|New & Used:|
Our marketplace sellers will deliver to your chosen address. Click for more info.
In stock at one or more sellers.
|Buy - Select Seller|
An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and...
Suitable for the professional system administrators who need to securely deploy Microsoft Vista in their networks, this work helps readers learn about the security features of Vista, how to safely...
Cachin, Christian; Camenisch, Jan
These are the proceedings of Eurocrypt 2004, the 23rd Annual Eurocrypt C- ference. The conference was organized by members of the IBM Zurich Research Laboratory in...
I would like to welcome all the participants to the 3rd International Conference on Information Security and Cryptology (ICISC 2000). It is sponsored by the Korea...
Blyth, Andrew; Sutherland, Iain
This book contains the proceedings of the Second European Conference on Computer Network Defence, which took place in December 2006. The conference focused on the...
Computer security is fast becoming the top concern of every Fortune 1000 company. Eric Greenberg walks the reader through a detailed, individualized needs analysis, technology choices, and cost implications using...
Koblitz, NEAL; Menezes, A.J.; Wu, Y.-H.
From the reviews: "This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for...
Stefan Schackow; Bilal Haidar
This book is intended for developers who are already familiar with and have a solid understanding of ASP. NET 1. 1 and ASP. NET 2. 0 security concepts, especially in...
Emmett Dulaney; James M. Stewart;...
CompTIA is revising the popular Security+ exam for the first time since it launched in 2002. This kit includes the key Sybex titles for the new CompTIA Security+ exam:...
Hadi Nahari; Ronald L. Krutz
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking...
Comprehensive Group Policy Coverage, including Windows Server 2008 and Vista SP1 This new edition of Group Policy: Management, Troubleshooting, and Security has been revised, renamed, and fully updated to...
Erdal Cayirci; Chunming Rong; Albert...
This advanced book is a comprehensive guide to security issues in wireless ad hoc and sensor networks. The book is organized into two main sections. The first, gives...
Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings that can ...