Security related eBooks
English | ISBN: 3319166638 | 2015 | 502 pages | PDF | 23 MB Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by...
( Category:Security related Date:24 Apr 2015 )
English | 2015 | ISBN: 3662467380 | 107 pages | PDF | 9,3 MB Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in vario...
( Category:Security related Date:24 Apr 2015 )
2013 | 242 Pages | ISBN: 1849693609 | EPUB + PDF | 4 MB + 5 MB The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can...
( Category:Security related Date:22 Apr 2015 )
2000 | 201 Pages | ISBN: 1852332433 | PDF | 9 MB Biometric identity verification (BIV) offers a radical alternative to passports, PIN numbers, ID cards and driving licences. It uses physiological or b...
( Category:Security related Date:20 Apr 2015 )
English | June 15, 2009 | ISBN: 1420069845 | 358 Pages | PDF | 9 MB Twenty-five years ago, how many people were thinking about the internet on a daily basis? Now you can find everything, including tec...
( Category:Security related Date:19 Apr 2015 )
English | April 7, 2015 | ASIN: B00VU1TNXS | 108 Pages | PDF | 5 MB In this study two distributed denial of service attacks were captured and the characteristics of the attacks were used to detect bot...
( Category:Security related Date:19 Apr 2015 )
English | Oct 12, 2004 | ISBN: 1587201232 | 816 Pages | CHM | 11 MB Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks...
( Category:Security related Date:18 Apr 2015 )
English | Feb 15, 2001 | ISBN: 1580531768 | 219 Pages | PDF | 4 MB Here's a practical book that introduces fundamental network security concepts, principles, and terms. It helps you identify the best ...
( Category:Security related Date:15 Apr 2015 )
2003 | ISBN: 0764540483 | 2nd Edition | PDF | 430 pages | 7.8 Mb What an amazing world we live in! Almost anything you can imagine can be researched, compared, admired, studied, and in many cases, bou...
( Category:Security related Date:13 Apr 2015 )
English | 2010 | 372 Pages | ISBN: 1430233427 | PDF | 24 MB iOS Forensic Analysis provides an in-depth look at investigative processes for the iPhone, iPod Touch, and iPad devices. The methods and pro...
( Category:Security related Date:12 Apr 2015 )
English | April 7, 2015 | ASIN: B00VTRO6PS | 27 Pages | PDF | 1.4 MB Download http://longfiles.com/xfeidoml0c0j/100_Internet.rar.html http://onmirror.com/sfdivx22qfwd/100_Internet.rar.html...
( Category:Security related Date:12 Apr 2015 )
English | ISBN: 1118896696 | 2015 | 360 pages | PDF | 22 MB Similar to unraveling a math word problem, Security Intelligence: A Practitioner s Guide to Solving Enterprise Security Challenges guides yo...
( Category:Security related Date:09 Apr 2015 )
2006 | pages: 242 | ISBN: 1584884738 | PDF | 1,6 mb Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to informatio...
( Category:Security related Date:09 Apr 2015 )
2006 | pages: 214 | ISBN: 1860946348 | PDF | 8,6 mb A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse...
( Category:Security related Date:06 Apr 2015 )
English | 2008 | ISBN: 3540794379 | PDF | pages: 461 | 27,7 mb The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security I...
( Category:Security related Date:05 Apr 2015 )