We found 29 results for “


Showing 1 - 12 of 29 Results

Out of stock online

Not available in stores

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are…

Out of stock online

Not available in stores

Cryptography is a core component of computer security, as it is both the lock and combination or key that can help protect an organization's data. Easily read by non-specialists, yet still systematic and comprehensive enough to offer cryptographic meat for those…

In stock online

Not available in stores

This volume contains the latest accounts of research supported by the European Commission in human-computer interaction and presented at a workshop on Human Comfort and Security in October 1995. Topics of the papers include: removing usability barrier, user…

Paperback

$45.10 online

$51.99

save 13%

In stock online

Not available in stores

"Avi Rubin does a great job of explaining the motivations behind many security solutions, as well as providing practical information about how you can solve real-world problems. White-Hat Security Arsenal is an invaluable resource--a judicious mix of practical…

Ships within 1-3 weeks

Not available in stores

On March 23, 1996, a The Day After...in Cyberspace exercise with approximately 60 participants was conducted at RAND's Washington D.C. offices. The purpose was to generate suggestions and options regarding research and development initiatives to enhance the…

In stock online

Not available in stores

The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack "adequate" protection of privacy. If enforced as written, the…

Paperback

$20.95

Out of stock online

Not available in stores

Kerberos authentication offers a proven, non-proprietary solution for maximizing the security of virtually any computing system without compromising performance. This is the first authoritative, accessible guide to Kerberos for both users and administrators.…

In stock online

Not available in stores

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997. The 37 revised full papers presented were selected from a total of 87 submissions.…

Hardcover

$261.32 online

$280.00

save 6%

In stock online

Not available in stores

First Published in 2000. Routledge is an imprint of Taylor & Francis, an informa company.

In stock online

Not available in stores

This book constitutes the thoroughly revised post-conference proceedings of the Second International Conference on Financial Cryptography, FC '98, held in Anguilla, British West Indies, in February 1998. The 28 revised papers presented were carefully selected…

In stock online

Not available in stores

This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997. The 23 full papers presented were carefully selected from 44 submissions and…

In stock online

Not available in stores

Fast becoming the electronic payment method of choice for many major financial companies today, SET (secure electronic transactions) is a unique new protocol that allows credit card information to be safely and securely transmitted over the Internet. Here's a…