- کتب و مجلات «608 عنوان»
- همه (885)
- مقاطع تحصیلی (1)
- کتب و مجلات (608)
- نرم افزار (266)
- فیلمهای آموزشی (11)
Cloud Security and Privacy
Beautiful Security
Data-Driven Security
Android Security Internals
Advanced API Security
UMTS Security
End-to-End Network Security
LTE Security
Hyper-V Security
Security Monitoring
How well does your enterprise stand up against today’s sophisticated security threats? In this book, security experts from Cisco Systems demonstrate h ...
Cloud Security and Privacy
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? No ...
Beautiful Security
In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems i ...
Enterprise Mac Security: Mac OS ...
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, secu ...
BackTrack 4: Assuring Security ...
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...
Managing Risk and Information S ...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to in ...
Cyber Security Policy Guidebook
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple l ...
Information Security The Comple ...
Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information ...
Computer Security – ESORICS 201 ...
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013 ...
The Manager’s Guide to Web Appl ...
The Manager’s Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written ...
Data-Driven Security
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This caref ...
Computer Security Handbook, 6th ...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
Advanced API Security
Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs. API adoption i ...
UMTS Security
Can you afford not to read this book?…The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and ...
Router Security Strategies: Sec ...
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separat ...
End-to-End Network Security
End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highl ...
Wireless and Mobile Networks Se ...
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with ...
WiMAX Security and Quality of S ...
WiMAX is the first standard technology to deliver true broadbandmobility at speeds that enable powerful multimedia applicationssuch as Voice over Inte ...
LTE Security
Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security su ...
Nmap 6: Network Exploration and ...
Master the basic scanning techniques for port scanning and host discovery. Perform security checks to web applications, mail servers and databases. Le ...
The Practice of Network Securit ...
Network security is not simply about building impenetrable walls â determined attackers will eventually overcome traditional defenses. The most effe ...
Advances in Security of Informa ...
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecN ...
Hyper-V Security
Keeping systems safe and secure is a new challenge for Hyper-V Administrators. As critical data and systems are transitioned from traditional hardware ...
Building the Infrastructure for ...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This boo ...