Security related eBooks
2013 | ISBN: 1451651058, 1451650515 | 253 pages | EPUB | 3 MB Social networks are the defining cultural movement of our time, empowering us in constantly evolving ways. We can all now be reporters, al...
( Category:Security related Date:23 Sep 2013 )
2013 | ISBN-10: 144197721X | 216 pages | PDF | 3,7 MB The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm...
( Category:Security related Date:10 Sep 2013 )
English | ISBN: 0124078141 | 2013 | 256 pages | PDF, EPUB | 12 MB Cyber Warfare has become a global problem threatening governments, corporations and individuals. This new domain of warfare is not onl...
( Category:Security related Date:07 Sep 2013 )
2013 | 342 Pages | ISBN: 111816881X | PDF | 9 MB The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundam...
( Category:Security related Date:05 Sep 2013 )
English | ISBN: 3319013505 | 2013 | 125 pages | PDF | 4 MB This brief presents the challenges and solutions for VANETs security and privacy problems occurring in mobility management protocols includin...
( Category:Security related Date:30 Aug 2013 )
2013 | ISBN-10: 1849685967 | 324 pages | EPUB, PDF | 7,4 MB Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement pr...
( Category:Security related Date:26 Aug 2013 )
2013 | ISBN-10: 1449343147 | 152 pages | EPUB, PDF | 17 MB The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provi...
( Category:Security related Date:08 Aug 2013 )
2013 | ISBN-10: 1449343147 | 152 pages | EPUB, PDF | 17.7 MB The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide pro...
( Category:Security related Date:08 Aug 2013 )
2013 | ISBN-10: 1449338968 | 1020 pages | EPUB, PDF | 57 MB This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Junip...
( Category:Security related Date:07 Aug 2013 )
2012 | English | PDF | 6.52 Mb | 248 Pages Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be use...
( Category:Security related Date:05 Aug 2013 )
2013 | ISBN-10: 0124114830 | 96 pages | PDF | 6,5 MB Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is conce...
( Category:Security related Date:30 Jul 2013 )
2013 | ISBN-10: 1133727948 | 584 pages | PDF | 29 MB "Guide To Network Defense And Countermeasures, International Edition" provides a thorough guide to perimeter defense fundamentals, including intrus...
( Category:Security related Date:24 Jul 2013 )
2010 | English | PDF | 27 Mb | 436 Pages Programmers: protect and defend your Web apps against attack! You may know ASP.NET, but if you don't understand how to secure your applications, you need this ...
( Category:Security related Date:21 Jul 2013 )
InTeOpP | 2013 | ISBN: 9535111764 9789535111764 | 155 pages | PDF | 5 MB This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges tha...
( Category:Security related Date:19 Jul 2013 )
English | ISBN: 1118163826 | 2012 | 696 pages | PDF |40 MB An authoritative guide to investigating high¨Ctechnology crimes Internet crime is seemingly ever on the rise, making the need for a comprehens...
( Category:Security related Date:15 Jul 2013 )