Computers Security General

Showing 1 - 12 of 160 results

Search Titles

Below Are Your Selected Attending Tradeshow


IP Address Management: Principles and Practice

IP Address Management:...

by Timothy Rooney
  • Published in 2011
  • 448
Schneier on Security

Schneier on Security

by Bruce Schneier
  • Published in 2008
  • 336
The Best of 2600: A Hacker Odyssey

The Best of 2600: A Ha...

by Emmanuel Goldstein
  • Published in 2008
  • 888
Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography

Hardware-Based Compute...

by Roger R. Dube
  • Published in 2008
  • 256
Modern Cryptanalysis: Techniques for Advanced Code Breaking

Modern Cryptanalysis:...

by Christopher Swenson
  • Published in 2008
  • 264
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking

The CEH Prep Guide: Th...

by Ronald L. Krutz, Russell Dean Vines
  • Published in 2007
  • 768
Information Security Governance: A Practical Development and Implementation Approach

Information Security G...

by Krag Brotby
  • Published in 2009
  • 220
Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition

Security Engineering:...

by Ross J. Anderson
  • Published in 2008
  • 1088
Unauthorised Access - Physical Penetration Testing For IT Security Teams

Unauthorised Access -...

by Wil Allsopp
  • Published in 2009
  • 308
Security for Ubiquitous Computing

Security for Ubiquitou...

by Frank Stajano
  • Published in 2002
  • 268
Security Standards in a Web + 2.0 World - AStandards-Based Approach

Security Standards in...

by Carlos Curtis Solari
  • Published in 2009
  • 296
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Hacking Point of Sale:...

by Slava Gomzin
  • Published in 2014
  • 312

Showing 1 - 12 of 160 results

loading