Security related eBooks
English | 24 Oct. 2013 | ISBN: 3319014323 | 196 Pages | EPUB | 2.44 MB In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk...
( Category:Security related Date:06 Apr 2017 )
English | 19 Dec. 2016 | ISBN: 1484216849 | 268 Pages | EPUB | 1.39 MB Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while sta...
( Category:Security related Date:06 Apr 2017 )
by Josh Datko English | 2014 | ISBN: 1783986042 | 159 Pages | True PDF | 4.25 MB If you have some experience with the BeagleBone or similar embedded systems and want to learn more about security and p...
( Category:Security related Date:06 Apr 2017 )
by John Ewart English | 2014 | ISBN: 1783983043 | 214 Pages | True PDF | 2.41 MB If you have some understanding of IT infrastructure principles and are ready to find out what Chef is all about, then t...
( Category:Security related Date:06 Apr 2017 )
English | 21 May 2017 | ISBN: 3319536338 | 141 Pages | PDF | 1.65 MB This book offers a comparative perspective on data protection and cybersecurity in Europe. In light of the digital revolution and t...
( Category:Security related Date:04 Apr 2017 )
English | 3 Jan. 2013 | ISBN: 1447145429 | 548 Pages | EPUB (True) | 3.23 MB This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offerin...
( Category:Security related Date:01 Apr 2017 )
English | 15 Apr. 2013 | ISBN: 1461472040 | 248 Pages | EPUB (True) | 2.03 MB Imagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total...
( Category:Security related Date:31 Mar 2017 )
English | PDF | 2017 | 66 Pages | ISBN : 3319537970 | 914.95 KB This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a functio...
( Category:Security related Date:31 Mar 2017 )
English | PDF | 2017 | 409 Pages | ISBN : 3319565486 | 27.32 MB This book constitutes the thoroughly refereed post-workshop proceedings of the 17th International Workshop on Information Security Appli...
( Category:Security related Date:30 Mar 2017 )
English | 14 Mar. 2017 | ISBN: 1893939758 | 408 Pages | PDF | 40.42 MB Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark ...
( Category:Security related Date:26 Mar 2017 )
English | 7 Nov. 2013 | ISBN: 3319023896 | 316 Pages | EPUB (True) | 3.39 MB This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the ...
( Category:Security related Date:25 Mar 2017 )
English | 30 Jun. 2013 | ISBN: 1461473934 | 56 Pages | PDF | 1.62 MB Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal comput...
( Category:Security related Date:25 Mar 2017 )
English | 9 Mar. 2017 | ISBN: 149878514X | 337 Pages | PDF | 4.07 MB The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendation...
( Category:Security related Date:23 Mar 2017 )
English | 2016 | ISBN: 1593276699 | 304 Pages | EPUB | 19,7 MB You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more i...
( Category:Security related Date:22 Mar 2017 )
English | 11 Aug. 2010 | ISBN: 3642147054 | 356 Pages | PDF | 4 MB This volume contains papers presented at the 5th International Conference on Mat- matical Methods, Models and Architectures for Compu...
( Category:Security related Date:21 Mar 2017 )