Security related eBooks
English | Feb 10, 2015 | ASIN: B00TGRY2P2 | 115 Pages | EPUB/MOBI/AZW3/PDF (Converted) | 2 MB The Concise Guide to Certified Ethical Hacker - version 8 is a compact study guide for those pursuing the ...
( Category:Security related Date:26 Feb 2015 )
English | Feb 17, 2015 | ASIN: B00TQBXQ8W | 9 Pages | EPUB/MOBI/AZW3/PDF (Converted) | 2 MB Remove virus from your computer in a easy simple and fun way. Download http://longfiles.com/g4f5l37405si/Rem...
( Category:Security related Date:26 Feb 2015 )
English | 2008 | ISBN: 1402085109 | 258 Pages | PDF | 4 MB Optical and photonic systems and devices have significant potential for homeland security. "Optical Imaging Sensors and Systems for Homeland ...
( Category:Security related Date:26 Feb 2015 )
English | 2005 | ISBN: 0863415253 | 328 Pages | PDF | 1 MB This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless ...
( Category:Security related Date:23 Feb 2015 )
English | 2005 | ISBN: 0387250913 | 476 Pages | PDF | 22 MB Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-confere...
( Category:Security related Date:21 Feb 2015 )
2014 | ISBN: 1430266767 | English | 194 pages | EPUB | 1 MB Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal i...
( Category:Security related Date:21 Feb 2015 )
English | 2003 | ISBN: 0849308887 | 849 Pages | PDF | 18 MB The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks , moves ahead of the pack of books about digital security by...
( Category:Security related Date:20 Feb 2015 )
English | 2011 | ISBN: 1439821488 | 476 Pages | PDF | 3 MB Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets...
( Category:Security related Date:20 Feb 2015 )
2014 | ISBN-10: 3662456109 | 596 pages | PDF | 10 MB The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of C...
( Category:Security related Date:20 Feb 2015 )
2014 | ISBN-10: 3662456079 | 552 pages | PDF | 8 MB The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cr...
( Category:Security related Date:20 Feb 2015 )
English | Sep 3, 2009 | ISBN: 0071626751 | 432 Pages | PDF | 3 MB Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities. Fully updated to cover the latest security issues, 24 Deadly...
( Category:Security related Date:20 Feb 2015 )
2015 | 568 Pages | ISBN: 1447166531 | PDF | 9 MB This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communication...
( Category:Security related Date:18 Feb 2015 )
2014 | 260 Pages | ISBN: 3319135171 | PDF | 13 MB The Future Internet envisions a move toward widespread use of services as a way of networked interaction. However, while the technologies for developi...
( Category:Security related Date:18 Feb 2015 )
2014 | 84 Pages | ISBN: 3319136283 | PDF | 2 MB This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-inte...
( Category:Security related Date:18 Feb 2015 )
2003 | 685 Pages | ISBN: 3642077137 | PDF | 8 MB This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer securit...
( Category:Security related Date:16 Feb 2015 )