Transnational Security
Microsoft Azure Security
Untangle Network Security
Learning Puppet Security
Web Security
Security Intelligence
Mobile Application Security
Data Analysis For Network Cyber ...
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering sys ...
Android Security: Attacks and D ...
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security ...
Aspect-Oriented Security Harden ...
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML langu ...
Transnational Security
Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing ...
Microsoft Dynamics AX 2012 R3 S ...
Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakehold ...
Microsoft Azure Security
Microsoft Azure Security helps you ensure that all your applications and services stay secure and safe from any threats. Starting with a quick tour th ...
Untangle Network Security
Untangle NG Firewall simplifies network security because of its easy configuration and user-friendly interface. These attributes, in addition to its l ...
Security Planning: An Applied A ...
This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan ...
Guide to Computer Network Secur ...
This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communicatio ...
Distributed Networks: Intellige ...
For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized comm ...
Learning Puppet Security
As application and server environments become more complex, managing security and compliance becomes a challenging situation. By utilizing Puppet and ...
Cryptography and Network Securi ...
William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unma ...
Web Security
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of ...
Security Intelligence
Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through ...
Security in Wireless Sensor Net ...
This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to ...
Railway Infrastructure Security
This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railw ...
Visual Cryptography for Image P ...
This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application ...
Cyber Security: Analytics, Tech ...
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation ...
Implementing Cisco IOS Network ...
Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second EditionFoundation learning for the CCNA Security IINS 640-554 exam Imp ...
Mobile Application Security
Secure today’s mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this p ...
Building A Home Security System ...
Arduino is an open source micro-controller built on a single circuit board that is capable of receiving sensory input from the environment and control ...
CompTIA Security+ Training Kit
Ace your preparation for the skills measured by CompTIA Security+ Exam SY0-301. Work at your own pace through a series of lessons and reviews that ful ...
CCNA Security 210-260 Official ...
CCNA Security 210-260 Official Cert Guide CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specificall ...
Financial Cryptography and Data ...
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Secu ...
Maximum Linux Security, 2nd Edi ...
Linux continues to gain acceptance as a high-level operating system that’s ready for serious corporate enterprise-level computing. When running Intern ...