ANDEN DEL AF MIRRIN BANK-TRILOGIEN ⭐️⭐️⭐️⭐️⭐️ “Jeg tog mig selv i at sidde på kanten af stolen ude af stand til at komme videre af bare spænding.” Christina Røn, www.dinboganmelder.dk... Læs mere
"Du læser ikke om os i aviserne, Du ser aldrig reklame for vores produkter i blade eller på tv. Vi er nærmest usynlige", lyder det fra en direktør.... Læs mere
A nuts-and-bolts explanation of cryptography from a leading expert in information security.
A clear and informative introduction to the science of codebreaking, explaining what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned.
A guide to the Snort version 2.6. It offers coverage ranging from packet inspection to optimizing Snort for speed to using the advanced features of Snort to defend even the largest and most congested enterprise networks.
Helps you determine if you have what it takes to keep hackers out of your network. This title features twenty real-life security incidents that test computer forensics and response... Læs mere
Conveys to administrators and developers the tricks of the trade that can help them avoid serious security breaches. It covers both background theory and practical step-by-step instructions for protecting a server that runs Linux.
Identifies the main drivers of e-government, assesses the responses of Canada's public sector, and sketches out the major challenges and choices. This book is of interest to those studying or working in the world of public sector management and e-governance.
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style.
Presents the primary hardware-based computer security approaches in an easy to read format. Provides... Læs mere