Rich Campagna; Sibbu Iyer; Ashwin...
The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are...
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. Thsi title present the information for the examiners in an easy...
To home, business or free to our stores. Click for more info.
Despatched in 1 business day.
|Add to Basket|
|Click & Collect:|
Order now to collect from 8pm today. In stock items only. Click for more info.
Currently out of stock in all stores.
Stores - out of stock
|New & Used:|
Our marketplace sellers will deliver to your chosen address. Click for more info.
| || || |
Kayem, Anne V. D. M.; Akl, Selim G.;...
Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to...
An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and...
Clark, Champ III; Chaffin, Larry;...
Suitable for IT professionals managing enterprise security, this book allows readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. It includes topics such...
Blyth, Andrew; Sutherland, Iain
This book contains the proceedings of the Second European Conference on Computer Network Defence, which took place in December 2006. The conference focused on the...
Suitable for the professional system administrators who need to securely deploy Microsoft Vista in their networks, this work helps readers learn about the security features of Vista, how to safely...
This book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Information Security and Cryptology, ICISC 2000, held in ...
Rubin, Paul H.; Lenard, Thomas M.
The current debate over privacy presents some of the most complex policy-making challenges we have seen in some time. While data on consumers have long been used for...
We live our lives online - banking, shopping, working, dating - but have we become complacent? This book exposes the shocking truth about what lurks behind our computers: an underground...
Virtualization creates difficult challenges for forensic investigations. This title offers a view into the world of virtualized environments and the implications they have on forensic investigations. It explains the process...
Stephen Charles Edge; William Barker;...
Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X...
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third...