Tomeki

Explore Books on
internet security measures

1-24 of 465 Books

View The Hacker Crackdown By Bruce Sterling
Cover of The Hacker Crackdown by bruce sterling

The Hacker Crackdown

By Bruce Sterling

View The Cuckoo’s Egg By Clifford Stoll
Cover of The Cuckoo’s Egg by clifford stoll

The Cuckoo’s Egg

By Clifford Stoll

View Financial Cryptography and Data Security By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff
Cover of Financial Cryptography and Data Security by jeremy clark,sarah meiklejohn,peter y. a. ryan,dan wallach,michael brenner,kurt rohloff

Financial Cryptography and Data Security

By Jeremy Clark,Sarah Meiklejohn,Peter Y. A. Ryan,Dan Wallach,Michael Brenner,Kurt Rohloff

View The web application hacker's handbook By Dafydd Stuttard,Dafydd Stuttard
Cover of The web application hacker's handbook by dafydd stuttard,dafydd stuttard

The web application hacker's handbook

By Dafydd Stuttard,Dafydd Stuttard

View Katie.com By Tarbox, Katherine.,Katherine Tarbox,Katherine Tarbox
Cover of Katie.com by tarbox, katherine.,katherine tarbox,katherine tarbox

Katie.com

By Tarbox, Katherine.,Katherine Tarbox,Katherine Tarbox

View Google Hacks By Tara Calishain,Rael Dornfest
Cover of Google Hacks by tara calishain,rael dornfest

Google Hacks

By Tara Calishain,Rael Dornfest

View Wireless Mobile Internet Security By Man Young Rhee
Cover of Wireless Mobile Internet Security by man young rhee

Wireless Mobile Internet Security

By Man Young Rhee

View Critical Incident Management By Alan B. Sterneckert
Cover of Critical Incident Management by alan b. sterneckert

Critical Incident Management

By Alan B. Sterneckert

View Cyber Security and Privacy By Frances Cleary,Massimo Felici
Cover of Cyber Security and Privacy by frances cleary,massimo felici

Cyber Security and Privacy

By Frances Cleary,Massimo Felici

View The Future of the Internet-And How to Stop It By Jonathan L. Zittrain
Cover of The Future of the Internet-And How to Stop It by jonathan l. zittrain

The Future of the Internet-And How to Stop It

By Jonathan L. Zittrain

View Building Internet Firewalls By D. Brent Chapman,Elizabeth D. Zwicky
Cover of Building Internet Firewalls by d. brent chapman,elizabeth d. zwicky

Building Internet Firewalls

By D. Brent Chapman,Elizabeth D. Zwicky

View Wireless Internet security By James Kempf
Cover of Wireless Internet security by james kempf

Wireless Internet security

By James Kempf

View Mobile Internet Security By Ilsun You,Hsing-Chung Chen,Vishal Sharma,Igor Kotenko
Cover of Mobile Internet Security by ilsun you,hsing-chung chen,vishal sharma,igor kotenko

Mobile Internet Security

By Ilsun You,Hsing-Chung Chen,Vishal Sharma,Igor Kotenko

View Risks and Security of Internet and Systems By Frédéric Cuppens,Nora Cuppens,Jean-Louis Lanet,Axel Legay
Cover of Risks and Security of Internet and Systems by frédéric cuppens,nora cuppens,jean-louis lanet,axel legay

Risks and Security of Internet and Systems

By Frédéric Cuppens,Nora Cuppens,Jean-Louis Lanet,Axel Legay

View Chinese Cybersecurity and Defense By Daniel Ventre
Cover of Chinese Cybersecurity and Defense by daniel ventre

Chinese Cybersecurity and Defense

By Daniel Ventre

View Routledge Companion to Global Cyber-Security Strategy By Scott N. Romaniuk,Mary Manjikian
Cover of Routledge Companion to Global Cyber-Security Strategy by scott n. romaniuk,mary manjikian

Routledge Companion to Global Cyber-Security Strategy

By Scott N. Romaniuk,Mary Manjikian

View Trust in cyberspace By Fred B. Schneider
Cover of Trust in cyberspace by fred b. schneider

Trust in cyberspace

By Fred B. Schneider

View The death of the Internet By Markus Jakobsson
Cover of The death of the Internet by markus jakobsson

The death of the Internet

By Markus Jakobsson

View Practical UNIX Security By Simson Garfinkel,Gene Spafford
Cover of Practical UNIX Security by simson garfinkel,gene spafford

Practical UNIX Security

By Simson Garfinkel,Gene Spafford

View Cyber Security Education By Greg Austin

Cyber Security Education

Cyber Security Education

By Greg Austin

View Anonymous Communication Networks By Kun Peng
Cover of Anonymous Communication Networks by kun peng

Anonymous Communication Networks

By Kun Peng

View The dotCrime Manifesto By Phillip Hallam-Baker
Cover of The dotCrime Manifesto by phillip hallam-baker

The dotCrime Manifesto

By Phillip Hallam-Baker

View Security and Privacy Issues in Sensor Networks and IoT By Priyanka Ahlawat,Mayank Dave

Security and Privacy Issues in Sensor Networks and IoT

Security and Privacy Issues in Sensor Networks and IoT

By Priyanka Ahlawat,Mayank Dave

View Intelligent Mobile Malware Detection By Tony Thomas,Roopak Surendran,Teenu S. John,Mamoun Alazab

Intelligent Mobile Malware Detection

Intelligent Mobile Malware Detection

By Tony Thomas,Roopak Surendran,Teenu S. John,Mamoun Alazab