1-24 of 356 Books

Advanced Computing and Systems for Security
By Rituparna Chaki,Agostino Cortesi,Khalid Saeed,Nabendu Chaki

Security in Computing and Communications
By Sabu M. Thampi,Sanjay Madria,Guojun Wang,Danda B. Rawat,Jose M. Alcaraz Calero

The net delusion
By Evgeny Morozov,E. Morozov,Eduardo G. Murillo

Security protocols
By Bruce Christianson,Bruno Crispo,James A. Malcolm,Michael Roe

Privacy Technologies and Policy
By Manel Medina,Andreas Mitrakas,Kai Rannenberg,Erich Schweighofer,Nikolaos Tsouroulas
Mobile access safety
Mobile access safety
By Dominique Assing

Information Systems Security and Privacy
By Olivier Camp,Edgar Weippl,Christophe Bidan,Esma Aïmeur

802.1X port-based authentication
By Edwin Lyle Brown
Integrating a Usable Security Protocol into User Authentication Services Design Process
Integrating a Usable Security Protocol into User Authentication Services Design Process
By Ahmed Seffah,Christina Braz,Syed Naqvi

Cisco ISE for BYOD and Secure Unified Access
By Jamey Heary

Access Control, Security, and Trust
By Shiu-Kai Chin,Susan Beth Older

Broadband Access
By Steven Scott Gorshe,Dilip Krishnaswamy,Starr, Thomas,Stefano Galli,Arvind Raghavan

Penetration tester's open source toolkit
By Jeremy Faircloth

Research in Attacks, Intrusions and Defenses
By Angelos Stavrou,Herbert Bos,Georgios Portokalidis

Information security architecture
By Jan Killmeyer Tudor

Identity Management for Internet of Things
By Parikshit N. Mahalle,Poonam N. Railkar

Engineering Secure Software and Systems
By Jan Jürjens

Multivariate public key cryptosystems
By Jintai Ding,Jason E. Gower,Dieter Schmidt

Understanding and applying cryptography and data security
By Adam J. Elbirt

Mechanics of user identification and authentication
By Dobromir Todorov

Implementing 802.1X Security Solutions for Wired and Wireless Networks
By Jim Geier