Security related eBooks
English | Mar 16, 2015 | ISBN: 0071827633 | 560 Pages | PDF (Converted) | 36.5 MB Exploit and defend against the latest wireless network attacks. Learn to exploit weaknesses in wireless network enviro...
( Category:Security related Date:28 Feb 2015 )
English | 2012-06-21 | ISBN: 3642296556 | PDF | 370 pages | 4 MB In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bi...
( Category:Security related Date:28 Feb 2015 )
English | 2012 | ISBN: 1439893136 | 504 pages | PDF | 12 MB Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference a...
( Category:Security related Date:28 Feb 2015 )
English | 2005 | ISBN: 1591403464 | 364 Pages | PDF | 7 MB Includes high-quality research papers and industrial and practice articles in the areas of mobile commerce security and payment from academic...
( Category:Security related Date:28 Feb 2015 )
English | Feb 10, 2015 | ASIN: B00TGRY2P2 | 115 Pages | EPUB/MOBI/AZW3/PDF (Converted) | 2 MB The Concise Guide to Certified Ethical Hacker - version 8 is a compact study guide for those pursuing the ...
( Category:Security related Date:26 Feb 2015 )
English | Feb 17, 2015 | ASIN: B00TQBXQ8W | 9 Pages | EPUB/MOBI/AZW3/PDF (Converted) | 2 MB Remove virus from your computer in a easy simple and fun way. Download http://longfiles.com/g4f5l37405si/Rem...
( Category:Security related Date:26 Feb 2015 )
English | 2008 | ISBN: 1402085109 | 258 Pages | PDF | 4 MB Optical and photonic systems and devices have significant potential for homeland security. "Optical Imaging Sensors and Systems for Homeland ...
( Category:Security related Date:25 Feb 2015 )
English | 2005 | ISBN: 0863415253 | 328 Pages | PDF | 1 MB This book provides an introduction to trusted computing technology and its applications. As computers are increasingly embedded and wireless ...
( Category:Security related Date:23 Feb 2015 )
English | 2005 | ISBN: 0387250913 | 476 Pages | PDF | 22 MB Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-confere...
( Category:Security related Date:21 Feb 2015 )
2014 | ISBN: 1430266767 | English | 194 pages | EPUB | 1 MB Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal i...
( Category:Security related Date:21 Feb 2015 )
English | 2003 | ISBN: 0849308887 | 849 Pages | PDF | 18 MB The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks , moves ahead of the pack of books about digital security by...
( Category:Security related Date:20 Feb 2015 )
English | 2011 | ISBN: 1439821488 | 476 Pages | PDF | 3 MB Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets...
( Category:Security related Date:19 Feb 2015 )
2014 | ISBN-10: 3662456109 | 596 pages | PDF | 10 MB The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of C...
( Category:Security related Date:19 Feb 2015 )
2014 | ISBN-10: 3662456079 | 552 pages | PDF | 8 MB The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cr...
( Category:Security related Date:19 Feb 2015 )
English | Sep 3, 2009 | ISBN: 0071626751 | 432 Pages | PDF | 3 MB Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities. Fully updated to cover the latest security issues, 24 Deadly...
( Category:Security related Date:19 Feb 2015 )