Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 17

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud... more...

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and... more...

This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to determine whether the private cloud security solution is appropriate for their organization from a business and technical perspective, to... more...

A comprehensive guide to advanced sensor networking technologies, this handbook provides in-depth coverage of sensor networking theory, technology, and practice as it relates to established technologies as well as recent advances. It explores practical solutions to a wide range of sensor networking issues. Prominent experts address the immediate and long-term challenges in sensor networking hardware, wireless communication protocols,... more...

Computer generated holograms have numerous commercial applications from enhancing 3D WWW pages and dealing with anti-piracy to the creation of Hollywood quality video games and virtual reality situations. This text is a comprehensive look at basic holographic principles, commercial applications, and the digital techniques used in creating them. Future directions, such as holographic neural networks and 3-D "virtual" web pages are also discussed. This... more...


This new edition of the best-selling book gives a complete overview of the electronic commerce environment. It has been revised and completely updated to reflect the most recent trends in security, EDI, B2B, dotcoms, and online trading. Covering everything from fundamental encryption issues to future trends, this comprehensive guide provides a thorough study of electronic commerce and the tools needed to conduct business on the Internet.

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management... more...

This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their... more...

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux... more...

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the... more...