You're in Computer Books
See Matches in:
Narrow Search Results
Best Seller | This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences EuroCybersec 2021 held in Nice France in October 2021. The 9 papers presented together with 1 invited paper... more | go to store |
Advances in Information Security: E-Commerce Security and Privacy (Paperback) Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are one to establish the state of the art of and set the course for future research in information security and two to serve... more | $118.72 $102.83 FREE shipping go to store |
Cciso Certified Chief Information Security Officer All-In-One Exam Guide (Paperback) Take the challenging CCISO exam with confidence using the comprehensive information contained in this effective study guide. CCISO Certified Chief Information Security Officer All-in-One Exam Guide provides 100% coverage of all five CCISO domains. For... more | FREE shipping go to store |
CISM Certified Information Security Manager All-in-One Exam Guide Second Edition ISBN-10 1264268319 ISBN-13 9781264268313 Gregory Peter H. 2 edition 656 pages Publisher: McGraw Hill Binding: Paperback About the Author Peter H. Gregory CRISC CISM CISA... more | $34.01 $29.69 go to store |
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy ACISP 2013 held in Brisbane Australia in July 2013. The 28 revised full papers presented were carefully selected from 78... more | $74.99 $53.59 FREE shipping go to store |
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2022) held at Institute of Engineering & Management Kolkata India during February 23-25 2022. The book... more | go to store |
This book constitutes the refereed proceedings of the 5th International Conference on Multimedia Communications Services and Security MCSS 2012 held in Krakow Poland in May/June 2012. The 37 revised full papers presented were carefully reviewed and... more | $82.77 $64.28 FREE shipping go to store |
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology held in Seoul Korea in December 2010. The 28 revised full papers presented were carefully selected... more | $45.18 $38.55 FREE shipping go to store |
9781337102063. Pre-Owned: Good condition. Trade paperback. 6th ed. Language: English. Pages: 656. Trade paperback (US). Glued binding. 656 p. Mindtap Course List. Master the latest technology and developments from the field with the book specifically... more | FREE shipping go to store |
Information Security and Cryptography: Scion: A Secure Internet Architecture (Paperback) Describes one of the most promising future Internet architectures Focuses on the development of a working prototype Suitable for practitioners researchers and graduate students more | FREE shipping go to store |
1 Introduction References 2 Cyber Threats and the Security Risks They Pose to National Security: An Assessment of Cybersecurity Policy in the United Kingdom Abstract Introduction The Most Prevalent Cyber Threats The UK Cyber Landscape How Cyber Threats... more | go to store |
The Handbook of Information Security for Advanced Neuroprosthetics (Paperback) How does one ensure information security for a computer that is entangled with the structures and processes of a human brain - and for the human mind that is interconnected with such a device? The need to provide information security for... more | go to store |
Healthcare Information Security and Privacy (Paperback Used 9780071831796 0071831797) Healthcare Information Security and Privacy ISBN-10 0071831797 ISBN-13 9780071831796 Murphy Sean P. P. 1 edition 560 pages Publisher: McGraw Hill Binding: Paperback Publisher s Note: Products purchased from Third Party sellers are not guaranteed by the... more | go to store |
While Computer Security is a broader term which incorporates technologies protocols standards and policies to ensure the security of the computing systems including the computer hardware software and the information stored in it Cyber Security is a... more | $79.20 $66.99 FREE shipping go to store |
Pre-Owned Dictionary of Computer and Internet Terms 9780764141058 Presents various innovations in computer science and technology. This book features more than 3 200 computer-related terms with clear and succinct definitions. It offers information on Windows Vista networking data storage video computer security and... more | $5.00 $4.50 FREE shipping go to store |
Car-to-X (C2X) communication in terms of Car-to-Car (C2C) and Car-to-Infrastructure (C2I) communication aims at increasing road safety and traffic efficiency by exchanging foresighted traffic information. Thereby security and privacy are regarded as an... more | $107.81 $52.39 FREE shipping go to store |
Premier Reference Source: Analyzing Security Trust and Crime in the Digital World (Hardcover) In the digital era information is the most valuable resource and protecting one s assets is a constant struggle for both individuals and organizations. Analyzing Security Trust and Crime in the Digital World explores techniques and technologies used to... more | $195.00 $139.90 FREE shipping go to store |
Optimization of Iov Security with Trust Model (Paperback) IoV is gaining popularity after VANET in developing Intelligent transportation system. Technological development in the field of automobiles have enabled vehicles to gather manage and store traffic-related information to avoid road incidents [1].... more | $31.00 $27.05 go to store |
Hacking Web Apps: Detecting and Preventing Web Application Security Problems (Paperback) How can an information security professional keep up with all of the hacks attacks and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most... more | $61.46 $29.96 go to store |
This book provides insights into issues of SCADA security. Chapter 1 discusses how potential attacks against traditional IT can also be possible against SCADA systems. Chapter 2 gives background information on SCADA systems their architectures and main... more | $125.00 $111.47 FREE shipping go to store |
Intrusion Detection System using datamining techniques (Paperback) Security is a big issue for all networks including defense and government infrastructure. Attacks on network infrastructure are threats against the information security. The Intrusion detection system (IDS) is one that scans incoming data activities... more | $64.00 $52.92 FREE shipping go to store |
Ads related to mindtap information security 1 term