|
|
|
|
|
Wireless Security Essentials: Defending Mobile Systems from Data PiracyProtect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,... | | | | |
|
Handbook of Data Intensive Computing
This handbook is carefully edited book – contributors are worldwide experts in
the field of data intensive computing and their applications. The scope of the
book includes leading edge data intensive computing architectures and systems,
innovative storage, virtualization, and parallel processing technologies applied in... | | | | Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |
|
Windows 10 All-In-One For Dummies
The most comprehensive guide to Windows 10, updated with the latest enhancements
If you're new to Windows 10 and want an authoritative and accessible guide to the basics of the widely used operating system, Windows 10 All-in-One For Dummies is the book for you. Written by trusted Windows expert Woody Leonhard,... | | | | Using Social Media for Global Security
Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!
During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and... |
|
|
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 |