Electronic Books

Total Books: 1 - 20 /27
Applied Cryptography and Network Security

The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...

Lee mas
Applied Cryptography and Network Security

The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...

Lee mas
Certification and Security in Inter-Organizational E-Services

This collection of papers offers real-life application experiences, research results and methodological proposals of direct ...

Lee mas
Computer Network Security

As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...

Lee mas
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...

Lee mas
Cryptology and Network Security (vol. # 3810)

Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...

Lee mas
Data Security : Technical and Organizational Protection Measures against Data Loss and Computer Crime / Thomas H. Lenhard

Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...

Lee mas
Data and Applications Security XIX

Constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...

Lee mas
Foundations of Computer Security

Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...

Lee mas
Fundamental Networking in Java

This book is an in-depth learning and teaching resource for the understanding and programming of TCP/IP networking in Java. ...

Lee mas
Guide to Wireless Network Security

Guide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...

Lee mas
Hardening Windows

Hardening is the process of protecting a system against unknown threats. System administrators harden against that which ...

Lee mas
IT Security Controls : A Guide to Corporate Standards and Frameworks / Virgilio Viegas, Oben Kuyucu

Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...

Lee mas
Intrusion Detection Systems

Sٍheds new light on defense alert systems against computer and network intrusions. It also covers integrating intrusion ...

Lee mas
Intrusion Detection and Correlation

INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...

Lee mas
Journal on Data Semantics XI

The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one way or another, addresses ...

Lee mas
Managing Large-Scale Service Deployment : 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings

This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...

Lee mas
Network Security, Firewalls, and VPNs ; Third Edition / J. Michael Stewart; Denise Kinsey

Provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s ...

Lee mas
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
Practical Internet Security

Practical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within ...

Lee mas
Total Books: 1 - 20 /27