Showing 85 - 96 of 164 results

Search For

Below Are Your Selected Attending Tradeshow


Computer Security 2e Chapter 17

Computer Security 2e C...

by Dieter Gollmann
Computer Security 2e Chapter 13

Computer Security 2e C...

by Dieter Gollmann
Computer Security 2e Chapter 3

Computer Security 2e C...

by Dieter Gollmann
Implementing IPsec: Making Security Work on VPNs, Intranets, and Extranets

Implementing IPsec: Ma...

by Elizabeth Kaufman, Andrew Newman
  • Published in 1999
  • 271
The Best of 2600: A Hacker Odyssey Collector's Edition

The Best of 2600: A Ha...

by Emmanuel Goldstein
  • Published in 2009
  • 912
Wireless Security Essentials: Defending Mobile Systems from Data Piracy

Wireless Security Esse...

by Russell Dean Vines
  • Published in 2002
  • 368
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

The Web Application Ha...

by Dafydd Stuttard, Marcus Pinto
  • Published in 2007
  • 768
The Death of the Internet

The Death of the Inter...

by Markus Jakobsson
  • Published in 2012
  • 386
Public Key Cryptography: Applications and Attacks

Public Key Cryptograph...

by Lynn Margaret Batten
  • Published in 2013
  • 224
Reliability and Availability of Cloud Computing

Reliability and Availa...

by Randee Adams, Randee Adams
  • Published in 2012
  • 352
Cyber Security Policy Guidebook

Cyber Security Policy...

by Joseph Weiss, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt
  • Published in 2012
  • 288
Unmasking the Social Engineer: The Human Element of Security

Unmasking the Social E...

by Christopher Hadnagy
  • Published in 2014
  • 256

Showing 85 - 96 of 164 results

loading