Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Influences on the Adoption of Multifactor Authentication by Martin C. Libicki 9780833052353
£22.72Apologies but we at Booksplease don't have a full description for this book.Book InformationISBN 9780833052353Author Martin C. LibickiFormat PaperbackPage Count 62Imprint RANDPublisher RAND -
Anti-Virus Tools and Techniques for Computer by W. Timothy Polk 9780815513643
RRP: £19.99£18.10Anti-Virus Tools & Techniques for ComputerBook InformationISBN 9780815513643Author W. Timothy PolkFormat HardbackPage Count 108Imprint William Andrew PublishingPublisher William Andrew PublishingWeight(grams) 440g -
Security Strategies in Linux Platforms and Applications by Michael Jang 9780763791896
RRP: £78.99£76.72PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book... -
CCTV for Security Professionals by Alan Matchett 9780750673037
RRP: £69.99£62.70CCTV for Security Professionals provides the information necessary to design the ideal CCTV system. The chapters are stand-alone sources of information on their subjects and are presented in logical sequence to guide the reader from basic principles to... -
CCTV Surveillance: Video Practices and Technology by Herman Kruegle 9780750677684
RRP: £80.99£74.33This revision of the classic book on CCTV technology, CCTV Surveillance, provides a comprehensive examination of CCTV, covering the applications of various systems, how to design and install a system, and how to choose the right hardware. Taking into... -
Home Security: Alarms, Sensors and Systems by Vivian Capel 9780750635462
RRP: £47.99£43.08As crime rates soar every householder looks at ways to protect their home and its contents. This practical guide, in straightforward language, spells out the simple steps you can take to guard your home. It shows how burglars work, and how to thwart them... -
Advances in Cryptology - CRYPTO '89: Proceedings by Gilles Brassard 9780387973173
£53.28CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series... -
Understanding Intrusion Detection through Visualization by Stefan Axelsson 9780387276342
£94.71Computer security - the protection of data and computer systems from intentional, malicious intervention - is attracting increasing attention. Much work has gone into development of tools to detect ongoing or already perpetrated attacks, but a key... -
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication by Andreas Uhl 9780387234021
£94.90Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume... -
Practical Anonymity: Hiding in Plain Sight Online by Peter Loshin 9780124104044
RRP: £20.99£18.96For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking... -
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Field Guide for Linux Systems by Cameron H. Malin 9780124095076
RRP: £13.99£12.98Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any... -
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice by Steve Winterfeld 9780124047372
RRP: £23.99£16.49The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive... -
Integrating Python with Leading Computer Forensics Platforms by Chet Hosmer 9780128099490
RRP: £41.50£37.43Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be... -
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers by Matthew Metheny 9780128097106
RRP: £54.99£50.18Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing... -
Theoretical and Experimental Methods for Defending Against DDoS Attacks by Iraj Sadegh Amiri 9780128053911
RRP: £47.99£43.08Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource... -
Contemporary Digital Forensic Investigations of Cloud and Mobile Applications by Kim-Kwang Raymond Choo 9780128053034
RRP: £73.99£66.97Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic... -
Cyber Guerilla by Jelle Van Haaster 9780128051979
RRP: £34.99£31.73Much as Che Guevara's book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. ... -
Data Breach Preparation and Response: Breaches are Certain, Impact is Not by Kevvie Fowler 9780128034514
RRP: £50.99£45.70Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents... -
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis by Brett Shavers 9780128033401
RRP: £43.99£39.59Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book... -
Building an Intelligence-Led Security Program by Allan Liska 9780128021453
RRP: £47.99£43.08As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security... -
Building a Practical Information Security Program by Jason Andress 9780128020425
RRP: £50.99£45.70Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not... -
The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues by Ryan Ko 9780128015957
RRP: £87.99£79.90Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security... -
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings by Ronald Cramer 9783642289132
£51.57This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131... -
Computer Safety, Reliability, and Security: 30th International Conference, SAFECOMP 2011, Naples, Italy, September 19-22, 2011, Proceedings by Francesco Flammini 9783642242694
£49.95This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011. The 34 full papers presented together were carefully reviewed and... -
Information Hiding: 13th International Conference, IH 2011, Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers by Tomas Filler 9783642241772
£48.77This book contains the thoroughly refereed post-conferernce proceedings of the 13th Information Hiding Conference, IH 2011, held in Prague, Czech Republic, in May 2011. Included in this volume are 23 carefully reviewed papers that were selected out of... -
Information Security Practice and Experience: 7th International Conference, ISPEC 2011, Guangzhou, China, May 30-June 1, 2011, Proceedings by Feng Bao 9783642210303
£49.80This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were... -
Progress in Cryptology - AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings by Daniel J. Bernstein 9783642126772
£49.72Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from... -
Autonomic and Trusted Computing: 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings by Juan M. Gonzalez Nieto 9783642027031
£48.34ThisvolumecontainstheproceedingsofATC2009,the6thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Brisbane, A- tralia, during July 7-9, 2009. The... -
Information Hiding: 10th International Workshop, IH 2008, Sana Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers by Kaushal Solanki 9783540889601
£48.85th It is our great pleasure to present this volume of the proceedings of the 10 edition of Information Hiding (IH 2008). The conference was held in Santa Barbara - the Ame- can Riviera, California, USA, during May 19-21, 2008. It was organized by three... -
Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings by Tzong-Chen Wu 9783540858843
£50.10The 11th Information Security Conference (ISC 2008) was held in Taipei, T- wan, September 15-18,2008. ISC is an annual international conference covering researchintheoryandapplicationsofinformationsecurity.Itwas?rstinitiatedas a workshop(ISW) in Japan in... -
Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings by Steven Galbraith 9783540855033
£49.37This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting... -
Financial Cryptography and Data Security: 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers by Gene Tsudik 9783540852292
£48.77This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico, in January 2008. The 16 revised full papers and 9 revised short... -
Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings by Reihaneh Safavi-Naini 9783540850922
£48.34This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, Canada, in August 2008. The 14 papers presented in this volume were carefully reviewed and selected from 43 submissions... -
Information Security and Cryptology: Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers by Dingyi Pei 9783540794981
£50.28The Third SKLOIS Conference on Information Security and Cryptology (- scrypt2007)wasorganizedbytheStateKeyLaboratoryofInformationSecurity of the Chinese Academy of Sciences in cooperation with Qinhai University for Nationalities. This international... -
Cryptographic Hardware and Embedded Systems - CHES 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings by Pascal Paillier 9783540747345
£49.72This book constitutes the refereed proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2007. The 31 revised full papers cover side channels, low resources, hardware attacks and countermeasures, special... -
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers by Kaisa Nyberg 9783540710387
£50.02This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, held in Lausanne, Switzerland in February 2008. The 26 revised full papers presented together with 4 short papers were... -
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings by Nikita Borisov 9783540706298
£48.19The 8thPrivacyEnhancing TechnologiesSymposium washeldat the Katholieke Universiteit Leuven during July 23-25,2008.This year completed the transition from workshop to symposium, with a printed proceedings published before the symposium. PETS remains a... -
Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings by Yi Mu 9783540699712
£49.95The 13th Australasian Conference on Information Security and Privacy (ACISP 2008) was held at Wollongong, Australia, during July 7-9, 2008. The conference was sponsored by the Centre for Computer and Information Security of the University of Wollongong... -
Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings by Hiroshi Yoshiura 9783540476993
£49.56This book constitutes the refereed proceedings of the First International Workshop on Security, IWSEC 2006, held in Kyoto, Japan in October 2006. The 30 revised full papers presented were carefully reviewed and selected from 147 submissions.Book... -
Cryptographic Hardware and Embedded Systems - CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings by Louis Goubin 9783540465591
£49.68This book constitutes the refereed proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006, held in Yokohama, Japan in October 2006. The 32 revised full papers presented together with three invited talks...