Télécharger le livre :  Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems
Ajouter à ma liste d'envies
This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its...

Editeur : Springer
Parution : 2013-09-30
Collection : SpringerBriefs in Electrical and Computer Engineering
ePub

52,74
Télécharger le livre :  Security Patterns
Ajouter à ma liste d'envies
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security...

Editeur : Wiley
Parution : 2013-07-12
Collection : Wiley Software Patterns Series
ePub

Offre spéciale   -25%  45,20€  
33,99
Télécharger le livre :  Hands-On Oracle Application Express Security
Ajouter à ma liste d'envies
An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and...

Editeur : Wiley
Parution : 2013-04-09

PDF, ePub

Offre spéciale   -25%  21,40€  
15,99
Télécharger le livre :  Wireless Mobile Internet Security
Ajouter à ma liste d'envies
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless...

Editeur : Wiley
Parution : 2013-03-27

PDF, ePub

Offre spéciale   -9%  105,95€  
95,99
Télécharger le livre :  Secrets and Lies
Ajouter à ma liste d'envies
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses...

Editeur : Wiley
Parution : 2013-03-12

PDF, ePub

Offre spéciale   -23%  26,00€  
19,99
Télécharger le livre :  Public Key Cryptography
Ajouter à ma liste d'envies
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and...

Editeur : Wiley-IEEE Press
Parution : 2013-01-08
Collection : IEEE Press Series on Information and Communication Networks Security
PDF, ePub

Offre spéciale   -9%  88,95€  
80,99
Télécharger le livre :  Mastering Windows Network Forensics and Investigation
Ajouter à ma liste d'envies
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement...

Editeur : Sybex
Parution : 2012-07-30

PDF, ePub

Offre spéciale   -24%  51,30€  
38,99
Télécharger le livre :  Cryptography Engineering
Ajouter à ma liste d'envies
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned...

Editeur : Wiley
Parution : 2012-07-16

PDF, ePub

Offre spéciale   -25%  49,00€  
36,99
Télécharger le livre :  The Death of the Internet
Ajouter à ma liste d'envies
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize...

Editeur : Wiley-IEEE Computer Society Pr
Parution : 2012-07-09
Collection : IEEE Press
PDF, ePub

Offre spéciale   -9%  76,95€  
69,99
Télécharger le livre :  Predicting Malicious Behavior
Ajouter à ma liste d'envies
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and...

Editeur : Wiley
Parution : 2012-05-25

PDF, ePub

Offre spéciale   -23%  47,00€  
35,99
Télécharger le livre :  Software Safety and Security
Ajouter à ma liste d'envies
Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol...

Editeur : SAGE Publications Ltd
Parution : 2012-05-15

PDF

117,98
Télécharger le livre :  Cyber Security Policy Guidebook
Ajouter à ma liste d'envies
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on...

Editeur : Wiley
Parution : 2012-03-29

PDF, ePub

Offre spéciale   -9%  96,95€  
87,99
Télécharger le livre :  The Web Application Hacker's Handbook
Ajouter à ma liste d'envies
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users....

Editeur : Wiley
Parution : 2011-08-30

PDF, ePub

Offre spéciale   -24%  51,00€  
38,99
Télécharger le livre :  The Art of Deception
Ajouter à ma liste d'envies
The world's most infamous hacker offers an insider's view of thelow-tech threats to high-tech securityKevin Mitnick's exploits as a cyber-desperado and fugitive form oneof the most exhaustive FBI manhunts in history and have spawneddozens of articles, books, films, and...

Editeur : Wiley
Parution : 2011-08-04

PDF, ePub

15,61
Télécharger le livre :  The Art of Deception
Ajouter à ma liste d'envies
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films,...

Editeur : Wiley
Parution : 2011-08-04

PDF, ePub

Offre spéciale   -19%  16,00€  
12,99
Télécharger le livre :  Microsoft Windows Security Essentials
Ajouter à ma liste d'envies
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand...

Editeur : Sybex
Parution : 2011-06-03

PDF, ePub

Offre spéciale   -24%  34,20€  
25,99
Télécharger le livre :  Computer Viruses For Dummies
Ajouter à ma liste d'envies
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. ...

Editeur : For Dummies
Parution : 2011-05-09

PDF, ePub

Offre spéciale   -21%  16,40€  
12,99
Télécharger le livre :  Web Commerce Security
Ajouter à ma liste d'envies
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce...

Editeur : Wiley
Parution : 2011-05-04

PDF, ePub

Offre spéciale   -24%  51,30€  
38,99
Télécharger le livre :  IP Address Management
Ajouter à ma liste d'envies
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and...

Editeur : Wiley-IEEE Press
Parution : 2011-04-20
Collection : IEEE Press Series on Network and Service Management
ePub

Offre spéciale   -10%  129,95€  
116,99
Télécharger le livre :  The Shellcoder's Handbook
Ajouter à ma liste d'envies
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that...

Editeur : Wiley
Parution : 2011-02-16

PDF, ePub

Offre spéciale   -23%  47,00€  
35,99
<< < 910111213 >