Security related eBooks
2014 | 188 Pages | ISBN: 3319082302 | PDF | 19 MB How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect ...
( Category:Security related Date:18 Nov 2014 )
2014 | 593 Pages | ISBN: 3662436159 | PDF | 21 MB This volume presents recent research in cyber security, and reports how organizations can gain competitive advantages by applying the different securi...
( Category:Security related Date:12 Nov 2014 )
2014 | ISBN-10: 1482250969 | 576 pages | PDF | 7 MB By exploiting the synergies among available data, information fusion can reduce data traffic, filter noisy measurements, and make predictions and in...
( Category:Security related Date:06 Nov 2014 )
Published: 2012-06-22 | ISBN: 1849517428 | PDF + EPUB + MOBI | 268 pages | 14 MB Over 70 recipes to master the most widely used penetration testing framework More than 80 recipes/practicaltasks that w...
( Category:Security related Date:06 Nov 2014 )
2014 | ISBN: 1484203682 | English | 180 pages | PDF | 4 MB In nontechnical language and engaging style, 10 Don ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exact...
( Category:Security related Date:01 Nov 2014 )
English | 2014 | ISBN: 1430266767 | 194 pages | PDF | 5,5 MB Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal ...
( Category:Security related Date:01 Nov 2014 )
English | 2014 | ISBN: 1482209039 | 472 pages | PDF | 4,8 MB The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices now co...
( Category:Security related Date:10 Oct 2014 )
English | ASIN: B00KFM16JW | 2014 | 59 pages | PDF | 2 MB Protect your privacy and use the internet safely! Dont let news about internet risks deter you from taking full advantage of its benefits! The...
( Category:Security related Date:15 Sep 2014 )
English | ISBN: 1449325750 | 2013 | PDF | 422 pages | 42 MB Windows 8 is quite different than previous Microsoft operating systems, but its still eminently hackable. With this book, you ll learn how t...
( Category:Security related Date:09 Sep 2014 )
English | ISBN: 111864767X | 2014 | PDF | 504 pages | 9,8 MB Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide. Security professionals remain in high demand. The Certif...
( Category:Security related Date:09 Sep 2014 )
2014 | ISBN-10: 0000 | 730 pages | PDF | 62 MB Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has lo...
( Category:Security related Date:06 Sep 2014 )
English | 2013 | ISBN: 146659201X | 360 pages | PDF | 5,3 MB Conflict and Cooperation in Cyberspace: The Challenge to National Security brings together some of the worlds most distinguished military l...
( Category:Security related Date:03 Sep 2014 )
English | 2014 | ISBN: 1482207060 | 500 pages | PDF | 5,6 MB In today¡¯s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements...
( Category:Security related Date:02 Sep 2014 )
English | ISBN: 1466564121 | 2014 | 261 pages | PDF | 5 MB The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion...
( Category:Security related Date:02 Sep 2014 )
English | ISBN: 1466576987 | 2014 | 418 pages | PDF | 43 MB Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algor...
( Category:Security related Date:02 Sep 2014 )