We found {count} results


Showing 1 - 12 of 161 Results

Out of stock online

Not available in stores

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do…read more

Trade Paperback

$24.36

$26.99

save 9%

In stock online

Not available in stores

Kevin David Mitnick was cyberspace's most wanted hacker. Mitnick could launch missiles or cripple the world's financial markets with a single phone call - or so went the myth. The FBI, phone companies, bounty hunters, even fellow hackers pursued him over the Internet and through cellular…read more

Ships within 1-2 weeks

Not available in stores

Robert Sedgewick has thoroughly rewritten and substantially expanded and updated his popular work to provide current and comprehensive coverage of important algorithms and data structures. Christopher Van Wyk and Sedgewick have developed new C++ implementations that both express the methods in a…read more

Trade Paperback

$64.83

$64.89

save 0%

In stock online

Not available in stores

Routing is what makes the Internet tick, and is one of the most significant networking technologies today. Part I of this book defines Internet routing in general, and discusses a variety of protocols in addition to OSPF. As an introduction to Internet routing, Moy describes both unicast and…read more

In stock online

Not available in stores

From describing the special demands of multimedia systems, to exploring the integration of multimedia technologies on the Internet, this comprehensive book examines the design challenges and future direction of multimedia computing and communications. DLC: Multimedia systems.read more

Out of stock online

Not available in stores

Streaming video, the enabling technology behind Internet-based TV, represents a tremendous opportunity for Internet entrepreneurs, corporate IT departments, and others who would like to be on the cutting edge of this fast growing industry. With an emphasis on integrating pay-per-view services into…read more

In stock online

Not available in stores

The Computer Dictionary provides in-depth, complete definitions on data communications, PC hardware and Internet terms. The definitions are more than simple descriptions. These detailed explanations can span as much as several pages to exhaustively define the term.read more

Hardcover

$291.83

In stock online

Not available in stores

This unique text, for both the first year graduate student and the newcomer to the field, provides in-depth coverage of the basic principles of data communications and covers material which is not treated in other texts, including phase and timing recovery and echo cancellation. Throughout the…read more

Hardcover

$284.95

In stock online

Not available in stores

The rapid development of the Internet, coupled with increasing security requirements in information networks, databases, systems, and other information resources has led to the development of this book. Networking Security and Standards responds to increasing security needs in the marketplace by…read more

Hardcover

$86.54

$105.99

save 18%

Ships within 1-2 weeks

Not available in stores

TCP/IP Illustrated , an ongoing series covering the many facets of TCP/IP, brings a highly-effective visual approach to learning about this networking protocol suite. TCP/IP Illustrated, Volume 2 contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more…read more

Ships within 1-2 weeks

Not available in stores

Cryptography is a core component of computer security, as it is both the lock and combination or key that can help protect an organization's data. Easily read by non-specialists, yet still systematic and comprehensive enough to offer cryptographic meat for those with some understanding of the…read more

Trade Paperback

$51.53

$57.99

save 11%

Ships within 1-2 weeks

Not available in stores

Every computer crime leaves tracks—you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene. Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer…read more