Security related eBooks
2010 | pages: 302 | ISBN: 3642143121 | PDF | 2,6 mb Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confid...
( Category:Security related Date:02 Apr 2015 )
2013 | 408 Pages | ISBN: 1118380932 | EPUB, MOBI, PDF (Repost) | 9 MB + 5 MB + 33 MB Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before th...
( Category:Security related Date:02 Apr 2015 )
Published: 2012-07-03 | ISBN: 0071772499 | EPUB + MOBI | 464 pages | 8 MB Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and ...
( Category:Security related Date:30 Mar 2015 )
2011 | ISBN: 1118026470 | PDF | 2 edition | 914 pages | 13 Mb The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organization...
( Category:Security related Date:30 Mar 2015 )
English | June 11, 1997 | ISBN: 1565922697 | 332 Pages | PDF | 3 MB Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy...
( Category:Security related Date:29 Mar 2015 )
2011 | 816 Pages | ISBN: 0132775069 | PDF | 14 MB Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security. In recent years, the need for education in computer...
( Category:Security related Date:28 Mar 2015 )
Published: 2014-06-17 | ISBN: 3319042823 | PDF | 420 pages | 14 MB This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Pr...
( Category:Security related Date:28 Mar 2015 )
2006 | pages: 288 | ISBN: 0849330459 | PDF | 2,3 mb Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a m...
( Category:Security related Date:27 Mar 2015 )
English | Nov 17, 2003 | ISBN: 0131014056 | 672 Pages | CHM | 6 MB Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. ...
( Category:Security related Date:26 Mar 2015 )
2006 | pages: 389 | ISBN: 1846281938 | PDF | 2,1 mb Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is in...
( Category:Security related Date:26 Mar 2015 )
2015 | ISBN: 1118194632 | English | 224 pages | PDF | 3 MB A comprehensive and practical guide to security organization and planning in industrial plants Download http://longfiles.com/smlo0pzxm27h/111...
( Category:Security related Date:25 Mar 2015 )
Published: 2013-11-15 | ISBN: 1466567007 | PDF | 314 pages | 11 MB Physical layer security has recently become an emerging technique to complement and significantly improve the communication security ...
( Category:Security related Date:25 Mar 2015 )
English | Apr 15, 2005 | ISBN: 1593270461 | 312 Pages | CHM | 7 MB There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels ov...
( Category:Security related Date:25 Mar 2015 )
2006 | pages: 234 | ISBN: 0387302360 | PDF | 10,8 mb Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger...
( Category:Security related Date:24 Mar 2015 )
2007 | pages: 338 | ISBN: 1846289831 | PDF | 5,3 mb Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained over...
( Category:Security related Date:23 Mar 2015 )