Security related eBooks
Published: 2014-06-17 | ISBN: 3319042823 | PDF | 420 pages | 14 MB This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Pr...
( Category:Security related Date:28 Mar 2015 )
2006 | pages: 288 | ISBN: 0849330459 | PDF | 2,3 mb Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a m...
( Category:Security related Date:27 Mar 2015 )
English | Nov 17, 2003 | ISBN: 0131014056 | 672 Pages | CHM | 6 MB Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. ...
( Category:Security related Date:26 Mar 2015 )
2006 | pages: 389 | ISBN: 1846281938 | PDF | 2,1 mb Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is in...
( Category:Security related Date:26 Mar 2015 )
2015 | ISBN: 1118194632 | English | 224 pages | PDF | 3 MB A comprehensive and practical guide to security organization and planning in industrial plants Download http://longfiles.com/smlo0pzxm27h/111...
( Category:Security related Date:25 Mar 2015 )
Published: 2013-11-15 | ISBN: 1466567007 | PDF | 314 pages | 11 MB Physical layer security has recently become an emerging technique to complement and significantly improve the communication security ...
( Category:Security related Date:25 Mar 2015 )
English | Apr 15, 2005 | ISBN: 1593270461 | 312 Pages | CHM | 7 MB There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels ov...
( Category:Security related Date:25 Mar 2015 )
2006 | pages: 234 | ISBN: 0387302360 | PDF | 10,8 mb Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger...
( Category:Security related Date:24 Mar 2015 )
2007 | pages: 338 | ISBN: 1846289831 | PDF | 5,3 mb Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained over...
( Category:Security related Date:23 Mar 2015 )
2009 | pages: 248 | ISBN: 3540795383 | PDF | 16,8 mb Based on the paradigm of model-driven security, the authors of this book show how to systematically design and realize security-critical applicatio...
( Category:Security related Date:23 Mar 2015 )
English | Jan 28, 2015 | ISBN: 3319150863 | ISBN-13: 978-3319150864 | 406 Pages | PDF | 40 MB This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Informatio...
( Category:Security related Date:23 Mar 2015 )
2015 | ISBN: 1118194632 | English | 224 pages | PDF | 3 MB A comprehensive and practical guide to security organization and planning in industrial plants Features Basic definitions related to plant se...
( Category:Security related Date:22 Mar 2015 )
2001 | pages: 274 | ISBN: 0849301165 | PDF | 4,5 mb In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security...
( Category:Security related Date:20 Mar 2015 )
Springer | ISBN: 3540730915 | 2007 | PDF | 117 pages | 3 MB Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in vario...
( Category:Security related Date:20 Mar 2015 )
English | Nov 12, 2005 | ISBN: 157820318X | ISBN-13: 978-1578203185 | 608 Pages | PDF | 16 MB Security is too important to be left in the hands of just one department or employee-it's a concern of an ...
( Category:Security related Date:20 Mar 2015 )