Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management.
Bemærk: Kan ikke leveres før jul.
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively.
Bemærk: Kan ikke leveres før jul.
In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road.
Bemærk: Kan ikke leveres før jul.
"Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future"--Back cover.
Bemærk: Kan ikke leveres før jul.
This book is one of the first to cover SAT-solvers and how they can be used in cryptanalysis. It includes chapters on finite field linear algebra and the equicomplexity of matrix operations.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book describes trends in email scams and offers tools and techniquesto identify such trends.
Bemærk: Kan ikke leveres før jul.
This book describes trends in email scams and offers tools and techniquesto identify such trends.
Bemærk: Kan ikke leveres før jul.
This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more.
Bemærk: Kan ikke leveres før jul.
Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art software security design principles, methodology, and concrete programming techniques they need to build secure software systems.
Bemærk: Kan ikke leveres før jul.
This book first offers a baseline in identity, including coverage of identity concepts, the laws of identity, and the identity metasystem. It then details Windows CardSpace: what it is, where it could be used, where it should be used, and how to implement it.
Bemærk: Kan ikke leveres før jul.
Presents information on the use of several algebraic techniques in analyzing the AES. This book is useful for academic and industry researchers in cryptology as well as for advanced-level students.