We found 29 results for “


Showing 1 - 12 of 29 Results

Out of stock online

Not available in stores

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are…

Ships within 1-2 weeks

Not available in stores

Cryptography is a core component of computer security, as it is both the lock and combination or key that can help protect an organization's data. Easily read by non-specialists, yet still systematic and comprehensive enough to offer cryptographic meat for those…

In stock online

Not available in stores

In stock online

Not available in stores

The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database…

In stock online

Not available in stores

This book constitutes the refereed proceedings of the First International Conference on Information and Communication Security, ICICS '97, held in Beijing, China in November 1997. The 37 revised full papers presented were selected from a total of 87 submissions.…

Paperback

$24.36 online

$26.99

save 9%

In stock online

Not available in stores

Kevin David Mitnick was cyberspace's most wanted hacker. Mitnick could launch missiles or cripple the world's financial markets with a single phone call - or so went the myth. The FBI, phone companies, bounty hunters, even fellow hackers pursued him over the…

In stock online

Not available in stores

The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack "adequate" protection of privacy. If enforced as written, the…

Paperback

$51.23 online

$57.99

save 11%

Ships within 1-2 weeks

Not available in stores

Every computer crime leaves tracks—you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene. Computers have always been susceptible to unwanted intrusions, but as the…

In stock online

Not available in stores

This book constitutes the thoroughly revised post-conference proceedings of the Second International Conference on Financial Cryptography, FC '98, held in Anguilla, British West Indies, in February 1998. The 28 revised papers presented were carefully selected…

Ships within 1-3 weeks

Not available in stores

On March 23, 1996, a The Day After...in Cyberspace exercise with approximately 60 participants was conducted at RAND's Washington D.C. offices. The purpose was to generate suggestions and options regarding research and development initiatives to enhance the…

In stock online

Not available in stores

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information…

In stock online

Not available in stores

The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters is useful to both users and network professionals; later chapters deal with topics relevant mostly to…